Image Steganalysis with Binary Similarity Measures

Size: px
Start display at page:

Download "Image Steganalysis with Binary Similarity Measures"

Transcription

1 EURASIP Journal on Appled Sgnal Processng 25:7, c 25 Hndaw Publshng Corporaton Image Steganalyss wth Bnary Smlarty Measures İsmal Avcıbaş DepartmentofElectroncsEngneerng, Uludağ Unversty, 659 Bursa, Turkey Emal: avcbas@uludag.edu.tr Mehd Kharraz Department of Electrcal and Computer Engneerng, Polytechnc Unversty, Brooklyn, NY 2, USA Emal: mehd@ss.poly.edu Nasr Memon Department of Computer and Informaton Scence, Polytechnc Unversty, Brooklyn, NY 2, USA Emal: memon@poly.edu.tr Bülent Sankur Departmentof Electrcaland ElectroncsEngneerng, Boğazç Unversty, İstanbul, Turkey Emal: bulent.sankur@boun.edu.tr Receved 4 March 24; Revsed May 25; Recommended for Publcaton by Mauro Barn We present a novel technque for steganalyss of mages that have been subjected toembeddng by steganographc algorthms. The seventh and eghth bt planes n an mage are used for the computaton of several bnary smlarty measures. The basc dea s that the correlaton between the bt planes as well as the bnary texture characterstcs wthn the bt planes wll dffer between a stego mage and a cover mage. These telltale marks are used to construct a classfer that can dstngush between stego and cover mages. We also provde expermental results usng some of the latest steganographc algorthms. The proposed scheme s found to have complementary performance vs-à-vs Fard s scheme n that they outperform each other n alternate embeddng technques. Keywords and phrases: steganography, steganalyss, unversal steganalyss.. INTRODUCTION Steganography refers to the scence of nvsble communcaton, where communcaton between two partes s undetectable by an eavesdropper. Ths s qute dfferent from cryptography, where the goal s to make the content of the communcatons naccessble to an eavesdropper. In contrast, steganographc technques strve to hde the very presence of the message or communcaton tself from an observer. The subject s best explaned n terms of the prsoner s problem [2], where Alce and Bob are two nmates who wsh to communcate n order to hatch an escape plan. However, all communcaton between them s examned by the warden, Wendy, who wll put them n soltary confnement at the slghtest suspcon of covert communcaton. Specfcally, n the general model for steganography we have Alce wshng to send a secret message m to Bob. In order to do so, she embeds m nto a cover object c, to obtan the stego object s. The stego object s then sent through the publc channel. In a pure steganography framework, the technque for embeddng the message s unknown to Wendy and shared as a secret between Alce and Bob. However, t s generally not consdered as good practce to rely on the secrecy of the algorthm tself. In prvate key steganography Alce and Bob share a secret key, whch s used to embed the message. The secret key, for example, can be a password used to seed a pseudorandom number generator to select pxel locatons n an mage cover object for embeddng the secret message (possbly encrypted). Wendy has no knowledge about the secret key that Alce and Bob share, although she s aware of the algorthm that they could be employng for embeddng messages. In publc key steganography, Alce and Bob have prvate-publc key pars and know each other s publc key. As stated above, the goal of steganography s to communcate securely n a completely undetectable manner, such that an adversary should not be able to dfferentate n any sense between cover objects (objectsnot contanng anysecret

2 275 EURASIP Journal on Appled Sgnal Processng message) and stego objects (objects contanng a secret message). In ths context, steganalyss s the set of technques that try to defeat the very purpose of steganography, by detectng the presence of hdden communcaton. Thus steganalyss ams to dstngush between cover objects and stego objects. The art of steganalyss s becomng ncreasngly more mportant n computer forenscs, for screenng and trackng documents that are suspect of crmnal actvtes, and for nformaton securty to prevent leakage of unauthorzed data. Conversely, steganalyss can be used to assess the weaknesses of steganographc algorthms. In the past few years we have wtnessed a great expanson n felds of steganography and steganalyss. Several new steganography methods are beng proposed each year, most of whch are followed by new and mproved steganalyss technques for ther detecton. The steganalyss technques proposed n the lterature could be categorzed nto two groups. Frst we have technque-specfc steganalyss methods, whch attack a specfc embeddng algorthm, such as the approach proposed n [3]. The secondtype oftechnquess blndto the embeddng method and could be used wth any embeddng algorthm. They are called unversal steganalyss technques. It s the second category that we wll be lookng at n ths paper. For a revew on current steganography and steganalyss technques the reader s referred to [3, 4, 5, 6, 7, 8]. As demonstrated prevously n [9, ], the embeddng process on a document leaves statstcal artfacts, whch could be used to dstngush between stego and cover versons. The argument that watermarkng and steganography leave telltale effects s common to all the steganalytcal methods. For example, Harmsen and Pearlman [5] assume that steganography affects the hstograms of the mages, whch they measure va the center of gravty of the characterstc functon of the RGB probablty densty functons (pdf). Fard assumes that correlaton across wavelets bands s affected [], whle Avcbas et al. demonstrate that mage qualty metrcs are perturbed [9]. Frdrch et al. assume that hstogram of DCT coeffcents are modfed, as n [3, 6], and that the lossless compresson capacty of the LSB plane s dmnshed, as n [8]. In ths paper, n order to capture these statstcal artfacts and hence to determne the presence of hdden messages, we propose a set of bnary smlarty measures between successve bt planes. The basc dea s that, the correlaton between the bt planes as well as the bnary texture characterstcs wthn the bt planes wll dffer between a stego mage and a cover mage. The seventh and eghth bt planes, and possbly others, are used to calculate these bnary smlarty measures. The proposed technque does not need a reference mage and t works wth both spatal and transform-doman embeddng. The method s smlar to that n [, 9], n that t explots ntrnsc statstcal propertes of mages to reveal the presence of steganographc content. The rest of ths paper s organzed as follows. In Secton 2 we revew bnary smlarty measures. In Secton 3 we descrbe our steganalyss technque. In Secton 4 we gve smulaton results and conclude wth a bref dscusson n Secton SIMILARITY MEASURES ON BINARY IMAGES In the proposed steganalyss scheme we nvestgate statstcal features extracted from the lower-order bt planes of mages for the presence of hdden messages. Snce each bt plane s also a bnary mage, we start by consderng smlarty measures between two bnary mages. We assume that any steganographc manpulaton on an mage wll alter the patterns n the neghborhood of a bt n ts bt plane as well as across the bt planes. In other words, the planar-quantal bt patterns wll be affected. An evdence of such telltale effect can be found n the probablty of bt transtons. One mght argue f straghtforward bt plane correlatons cannot be used for the steganalyss purpose. However, the evdence of any change s too weak f we measure only bt correlatons across bt planes. In ths study, we have found that t s more relevant to make comparsons based on bnary texture statstcs.letx ={x,k, k =,..., K} be the sequences of bts representng the K neghborhood pxels (K = 4and ncludes N, W, S, ande neghbors), where the ndex runs over all the mage pxels. We assume mages of sze M N. Let us defne the 5-pont stencl functon χ r,s as follows: fx r = andx s =, 2 fx r = andx s =, χ r,s = 3 fx r = andx s =, 4 fx r = andx s =, based upon whch we now defne the agreement varable for the pxel x as α j = K k= δ(χ,k, j), j =,...,4,K = 4, where δ(m, n) s the Kronecker delta functon, whch s defned as { } m = n δ(m, n) =. Obvously the α j m n functons denote the central pxel-neghbor pxel transton types. The accumulated agreements are defned as a = MN c = MN α, b = MN α 3, d = MN α 2, α 4. These four varables {a, b, c, d} can be nterpreted as the onestep co-occurrence values of a bnary mage. Usng the above defntons, several bnary mage smlarty measures can be defned as shown n Table. A good revew of smlarty measures can be found n []. Almost all the measures n Table have an ntutve nterpretaton; for example, the ffth measure dm 5, Sokal and Sneath s smlarty measure 4, yelds the condtonal probablty that LSBs of seventh bt plane s n the same state ( or ) gven the state of the LSBs n the eghth bt plane. The measure s an average over both states actng as predctors and t has a range of to. In ths table, the measures dm to dm are obtaned for seventh and eghth bt planes of the mage, separately. These measures form an adaptaton of the classcal bnary strng smlarty measures, such as n Sokal and Sneath [2]. () (2)

3 Image Steganalyss wth Bnary Smlarty Measures 275 Table : Bnary smlarty measures. Smlarty measure Descrpton Smlarty measure Descrpton Sokal and Sneath smlarty measure Sokal and Sneath smlarty measure 2 Kulczynsk smlarty measure Sokal and Sneath smlarty measure 3 Sokal and Sneath smlarty measure 4 Sokal and Sneath smlarty measure 5 dm = m 7th m 8th,where 2(a + d) m = 2(a + d)+b + c dm 2 = m 7th 2 m 8th 2,where a m 2 = a +2(b + c) dm 3 = m 7th 3 m 8th 3,where m 3 = a b + c dm 4 = m 7th 4 m 8th 4,where m 4 = a + d b + c dm 5 = m 7th 5 m 8th 5,where a/(a + b)+a/(a + c)+d/(b + d)+d/(c + d) m 5 = 4 dm 6 = m 7th 6 m 8th 6,where ad m 6 = (a + b)(a + c)(b + d)(c + d) Varance dssmlarty measure Bnary mnmum hstogram dfference Bnary absolute hstogram dfference dm = m 7th m 8th,where b + c m = 4(a + b + c + d) 4 dm = mn(pn, 7 pn) 8 dm 2 = Bnary mutual entropy dm 3 = Bnary Kullback-Lebler dstance Ojala mnmum hstogram dfference n= 4 pn 7 p8 n n= dm 4 = 4 pn 7 log pn 8 n= 4 n= p 7 n log p7 n p 8 n 5 dm 5 = mn(s 7 n, S 8 n) n= Ocha smlarty measure Bnary Lance and Wllams nonmetrc dssmlarty measure Pattern dfference dm 7 = m 7th 7 m 8th 7,where ( )( ) a a m 7 = a + b a + c dm 8 = m 7th 8 m 8th 8,where m 8 = b + c 2a + b + c dm 9 = m 7th 9 m 8th 9,where bc m 9 = (a + b + c + d) 2 Ojala absolute hstogram dfference 5 dm 6 = S 7 n S8 n n= 5 Ojala mutual entropy dm 7 = S 7 n log S 8 n Ojala Kullback-Lebler dstance n= 5 dm 8 = S 7 n log S7 n S 8 n n= There are three categores of smlarty measures derved from these scores. () The frst group conssts of the computed smlarty, =,...,, across the 7th and 8th bt planes. () The second group conssts of hstogram and entropc features. We frst normalze the hstograms of the agreement scores for the bt planes (ndcated by the superscrpt b): dfferences, dm = m 7th p b j = m 8th α j j α j, b = 7, 8. (3) Based on these normalzed four-bn hstograms, we defne the mnmum hstogram dfference dm and the absolute hstogram dfference measure dm 2, bnary mutual entropy dm 3, and bnary Kullback Lebler dstance dm 4, as also gven n Table. () The thrd set of measures dm 5,..., dm 8 are somewhat dfferent n that we use the neghborhood-weghtng mask proposed by Ojala [3].Foreachbnarymageweobtan a 52-bn hstogram based on the weghted neghborhood, where the score s gven by S = 7 = x 2 by weghtng Fgure : The weghtng pattern of the neghbors n the computaton of Ojala score. For example, the score becomes S = = 4 n the example where E, N, NE bts are and all other bts are. the eght-drectonal neghbors as shown n Fgure. Defnng S 7 n as the count of the nth hstogram bn n the 7th bt plane and S 8 n the correspondng one n the 8th plane, after normalzng these 52-bn hstograms, we can defne Ojala mnmum hstogram dfference dm 5 and Ojala absolute hstogram dfference measure dm 6, Ojala mutual entropy dm 7, and Ojala Kullback-Lebler dstance dm 8 as gven n Table. In Fgure 2 we show how Stools algorthm modfes the LSB and 7-8 bt plane correlatons n terms of the Ojala Kullback-Lebler dstance (measure dm 8 n Table )asa functon of embedded message sze. In the actve warden case where message has to be embedded robustly, deeper bt plane

4 2752 EURASIP Journal on Appled Sgnal Processng dm kb kb 2kB 3kB 6kB kb Message sze BP 78 BP 67 BP 56 Fgure 2: Varaton of the Ojala Kullback-Lebler dstance as a functon of embedded message sze n the Stools steganographc method. (Legend: BP 78 means bt planes 7 and 8, etc.) dm ORG B.2kB 2kB 5kB Message length BP 78 BP 67 BP 56 Fgure 4: Varaton of the bt plane correlatons, measured wth the measure dm 7, the Ojala entropy, as a functon of embedded message length for F5 algorthm. dm ORG Watermark strength BP 78 BP 67 BP 56 Fgure 3: Varaton of the bt plane correlatons, measured wth the Ojala entropy measure dm 8, as a functon of embeddng strength n Dgmarc [6] algorthm ORG kb.2kb 2kB 5kB Message length dm 7 dm 8 dm 9 Fgure 5: Varaton of dm 7, dm 8, dm 9 measures across 7-8 bt planes as a functon of embedded message length for F5 algorthm. correlatons (5-6 bt planes) should be taken nto account. In Dgmarc [4] example, as shown n Fgure 3, we see the same monotonc trend n the Ojala entropy measure (dm 8 n Table ) as a functon of watermark strength. In Fgure 4, the effects of the F5 [5] embeddng algorthm on the 5-6 bt planes (dm 7, the Ojala entropy n Table ) are llustrated. Fnally, varatons of dm 7, dm 8, dm 9 measures n Table across 7-8 bt planes as a functon of embedded message length for F5 [5] algorthm are shown n Fgure STEGANALYSIS TECHNIQUE BASED ON BINARY MEASURES We hypothesze that bnary smlarty measures between bt planes wll dffer n ther patterns between clean and stego mages, that s, the statstcs wll be modfed as a consequence of message embeddng. Ths s the bass of our steganalyzer that ams to classfy mages as stego and cover mages. In fact, embeddng nformaton n any bt plane

5 Image Steganalyss wth Bnary Smlarty Measures 2753 modfes the correlaton between that plane and ts contguous neghbors. For example, for LSB steganography, one expects a decreased smlarty between the seventh and the eghth bt planes of the mage as compared to ts unmarked verson, due to randomzaton of the eghth plane. Hence, smlarty measures between these two LSBs should yeld hgher scores n a clean mage as compared to a stego mage, as the embeddng process destroys the preponderance of bt-par matches. Note that the same procedure generalzes qute easly to detect messages n any other bt plane. Furthermore, our results ndcate that we can even buld steganalyzer for non-lsb embeddng technques lke the recent F5 algorthm [5]. Ths s because a technque lke F5 (and many other robust watermarkng technques, whch can be used for steganography n an actve warden framework [2]) results n the modfcaton of the correlaton between bt planes. Classfer desgn We have used support vector machnes (SVM) classfer [6]. In support vector machne (SVM) [7], the underlyng dea rests on the mnmzaton of the tranng set error, or the maxmzaton of the summed dstances between the separatng hyperplane and the subset of closest data ponts (the support vectors). For the tranng feature sets (m, y ), =,..., N, y [, ], the feature vector m les on a hyperplane gven by w T m + b =, where w s the normal to the hyperplane. A set of feature vectors s sad to be optmally separated f no errors occur and the dstance between the closest vectors to the hyperplane s maxmal. The dstance d(w, b; m) ofafeaturevectorm from the hyperplane (w, b) s d(w, b; m) = w T m + b / w. The optmal hyperplane s obtaned by maxmzng ths margn. There are a number of avalable mplementatons of SVM. We have used the freely avalable Lbsvm [8]package. The classfer tranng and testng procedures are as follows. () An equal number of marked (wth varyng message lengths) and unmarked mages are randomly chosen for the desgn step. Snce the number of embeddable mages vares as a functon of both the message sze and the steganographc algorthm, the number of stego mages wth a gven message length used n the marked category of the tranng set s determned wth ther emprcal statstcs n mnd. For example, gven a specfc method, f there are twce as many mages wth % message lengths as compared to 5% messages, then the tranng set wll contan twce as many mages wth % message as mages wth 5% messages. (2) The traned classfer s then tested aganst the remanng set of unseen unmarked and marked mages whch conssts of mages wth % embeddng, 5% embeddng,..., denoted respectvely as,,... (3) The above procedure s repeated 5 tmes, resultng n 5dfferent classfers and the average of the classfer performances s computed. Table 2: The number of mages n the database gven the message length and the embeddng type. The embedded message sze s equal to 384, 92, 384, and 576 bytes, respectvely, for bt/pxel ratos from % to 5%. P (bts/pxel) LSB LSB +/ F5 Outguess Outguess+ (384B) (92B) (384B) (576B) SIMULATION RESULTS 4.. Expermental setup An ntal database consstng of 8 natural mages was used [9].Themageswereconvertedtograyscaleandthe borders around them were cropped, resultng n mages of sze pxels, after whch they were recompressed wth a qualty factor of 75. Ths database was augmented wth the stego versons of these mages usng 5 dfferent embeddng technques, and dfferent message lengths were employed. Snce the actual steganographc capacty of a gven mage s dependent on the content of the mage as well as the embeddng technque used, we used a varety of message lengths to create our dataset Embeddng methods and message lengths The embeddng methods were chosen on the bass of most current steganographc algorthms avalable. The embeddng algorthms used n our experments were LSB, LSB +/, OutGuess, OutGuess+, and F5. The LSB and LSB +/ technques operate n the spatal doman, but wth LSB the leastsgnfcant bt of each pxel value s flpped, whereas wth LSB +/ the pxel values are ncremented or decremented by. The second set of technques whch nclude OutGuess [2], wth + and flags, and F5 [5] operates n the JPEG doman by modfyng the least sgnfcant bt of DCT coeffcents. There are dfferent approaches n the lterature n choosng the length of the stego message beng embedded. Fard [] choosesn n pxels from the central regon of a randomly chosen mage. Another approach s to take constant length messages, say at, 5, or bts. But n both approaches the actual message sze has no proportonalty wth the actual mage sze. In order to avod these problems, we have used the followng approach n defnng the message length: we assumed that p btscouldbeembeddedneach pxel value, regardless of the depth of the pxels, that s, 8 or 24 bt/pxel, where p s a fracton <p<. Thus the message length conssts of a percentage pont of the total number of pxels, and the length s ndependent of the type of mage format, bmp or jpeg, but proportonal to the sze of the mage. Furthermore, snce the szes of all mages n our experments were equal, the actual message lengths were also constant. Thus we consdered four message lengths, %, 5%, %, and 5%, respectvely denoted by the symbols,,, and. Table 2 below shows the arrangement n the

6 2754 EURASIP Journal on Appled Sgnal Processng True postve Fard False postve (a) True postve Fard False postve (b) Fgure 6: Comparson results, n the ROC plots; the sold lnes are from whereas the dashed lnes represent Fard s technque. (a) LSB and (b) LSB +/. database. One can notce that as the message length grows, the number of mages that can be accommodated decreases; n fact, wth methods such as Outguess ths decrease s qute sharp Classfcaton results Statstcs from the orgnal unmarked mages as well as the stego mages were obtaned by computng the bnary smlarty measures, ntroduced n Secton 2. Thus a vector of length 8 was obtaned for each mage. These vectors were then used to tran and test the classfer, where we used 72 marked and 72 unmarked mages n the tranng process. The classfer was traned wth all embeddng percentages from % to 5%. For example n the Outguess, the classfer was presented wth 72 unmarked and 72 marked mages, where the marked mages conssted of 38 mages wth message, 298 wth, and 4 wth. Images wth messages were not used n ths case snce very few of them are avalable. Table 3: Classfcaton results usng SVM. Outguess Outguess+ F5 LSB LSB +/ Accuracy: Accuracy: Accuracy: Accuracy: In Table 3, we gve the test stage classfcaton accuracy. Here accuracy s defned as the area under the ROC curve obtaned from the classfer, where the ROC curves are obtaned by frst desgnng a classfer and then testng the data unseen to the classfer aganst the traned classfer at the same tme movng the separatng hyperplane. As the separatng hyperplane s moved, the false alarm rate changes, and we get the correspondng detecton rate. Also the obtaned ROC curves for each embeddng technque could be seen n Fgures 6 and 7.

7 Image Steganalyss wth Bnary Smlarty Measures Fard True postve False postve (a) True postve Fard False postve (b) True postve Fard False postve (c) Fgure 7: Comparson results, n the ROC plots; the sold lnes are from whereas the dashed lnes represent Fard s technque. (a) F5, (b) Outguess,and(c)Outguess+. The most closely related publcaton to our work s by Fard [] n whch hgher-order statstcs of wavelet components are used for detectng hdden messages. But due to the fact that the results are presented dfferently a drect comparson was not possble. So n order to make a far comparson between the two proposed technques, we have used the publcly avalable matlab scrpt from the webste ( fard/) to calculate the proposed

8 2756 EURASIP Journal on Appled Sgnal Processng feature set, and then used our desgn and testng process on the obtaned features. The results n Fgures 6 and 7 show that the two methods are close compettors n that the proposed method proves superor for the LSB and LSB+/ embeddng technques whle Fard s method proves superor n the case of the F5 and Outguess+/ technques. 5. CONCLUSIONS In ths paper, we have addressed the problem of steganalyss of mages. We have developed a technque for dscrmnatng between cover mages and stego mages obtaned from varous steganographc methods. Our approach s based on the hypothess that steganographc schemes leave telltale evdence between bt planes of lower sgnfcance, whch n turn can be exploted for detecton. The steganalyzer has been nstrumented wth bnary mage smlarty measures and a classfer. Smulaton results wth commercally avalable steganographc technques ndcate that the proposed steganalyzer s effectve n classfyng stego and cover mages. Although tests have been run on LSB-based steganography, ntal results have shown that t can easly generalze to the actve warden case by takng deeper bt plane correlatons nto account. For example as n [9]weareabletodetect Dgmarc [4] when the measures are computed for hghersgnfcance bt planes. After ths proof-of-concept desgn, the stegoanalyzer can be mproved by judcous selecton of the feature set n Table, for example, va SFFS (sequental floatng feature search) algorthm. For the non-lsb technques both mage qualty metrcs [9] and bnary smlarty measures can be used jontly. Fnally, gven the fact that our algorthm and that of Fard [] outperform each other for dfferent steganographc methods and that nether one s unformly superor to the other one, ther complementary role should be exploted, for example, n a decson fuson scheme. ACKNOWLEDGMENTS Ths work was supported by AFRL Grant no. F C-9 and TÜBİTAK-NSF Project no. 2E8. We would also lke to thank Mr. Mke Sosonkn for hs help n codng parts of the proposed steganalyss technque. REFERENCES [] H. Fard, Detectng hdden messages usng hgher-order statstcal models, n Proc. IEEE Internatonal Conference on Image Processng (ICIP 2), vol. 2, pp , Rochester, NY, USA, September 22. [2] G. J. Smmons, The prsoners problem and the sublmnal channel, n Proc. Advances n Cryptology (CRYPTO 83), pp. 5 67, Santa Barbara, Calf, USA, August 983. [3] J. Frdrch, M. Goljan, and D. Hogea, Steganalyss of JPEG mages: breakng the F5 algorthm, n Proc. 5th Internatonal Workshop on Informaton Hdng (IH 2), pp , Noordwjkerhout, the Netherlands, October 22. [4] M. Kharraz, H. T. Sencar, and N. Memon, Image Steganography: Concepts and Practce, Lecture Notes Seres, Insttute for Mathematcal Scences, Natonal Unversty of Sngapore, Sngapore, Republc of Sngapore, 24. [5] J. J. Harmsen and W. A. Pearlman, Steganalyss of addtvenose modelable nformaton hdng, n Securty and Watermarkng of Multmeda Contents V, vol. 52 of Proceedngs of SPIE, pp. 3 42, Santa Clara, Calf, USA, January 23. [6] J. Frdrch, M. Goljan, and R. Du, Steganalyss based on JPEG compatblty, n Multmeda Systems and Applcatons IV, vol. 458 of Proceedngs of SPIE, pp , Denver, Colo, USA, August 2, Specal Sesson on Theoretcal and Practcal Issues n Dgtal Watermarkng and Data Hdng. [7] J. Frdrch, M. Goljan, and R. Du, Detectng LSB steganography n color and gray-scale mages, IEEE Multmeda, vol. 8, no. 4, pp , 2, Specal Issue on Securty. [8] K. Sullvan, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, Steganalyss of spread spectrum data hdng explotng cover memory, n Securty, Steganography, and Watermarkng of Multmeda Contents VII, vol. 568 of Proceedngs of SPIE, pp , San Jose, Calf, USA, January 25. [9] İ. Avcıbaş, N. Memon, and B. Sankur, Steganalyss usng mage qualty metrcs, IEEE Trans. Image Processng, vol. 2, no. 2, pp , 23. [] H. Ozer, İ. Avcıbaş, B. Sankur, and N. Memon, Steganalyss of audo based on audo qualty metrcs, n Securty and Watermarkng of Multmeda Contents V, vol. 52 of Proceedngs of SPIE, pp , Santa Clara, Calf, USA, January 23. [] V. Batagelj and M. Bren, Comparng resemblance measures, n Proc. Internatonal Meetng on Dstance Analyss (DISTAN- CIA 92), Rennes, France, June 992. [2] P. H. A. Sneath and R. R. Sokal, Numercal Taxonomy. The Prncples and Practce of Numercal Classfcaton,W.H.Freeman, San Francsco, Calf, USA, 973. [3] T. Ojala, M. Petkänen, and D. Harwood, A comparatve study of texture measures wth classfcaton based on feature dstrbutons, Pattern Recognton, vol. 29, no., pp. 5 59, 996. [4] PctureMarc, Embed Watermark, v..45, Dgmarc Corporaton. [5] A. Westfeld, F5 a steganographc algorthm: hgh capacty despte better steganalyss, n Proc. 4th Internatonal Workshop on Informaton Hdng (IH ), vol. 237 of Lecture Notes n Computer Scence, pp , Sprnger, Pttsburgh, Pa, USA, Aprl 2, Release 2 was used n experments. [6] T. Haste, R. Tbshran, and J. Fredman, The Elements of Statstcal Learnng, Sprnger, New York, NY, USA, 2. [7] V. Vapnk, The Nature of Statstcal Learnng Theory, Sprnger, New York, NY, USA, 995. [8] cjln/lbsvm/. [9] Images were obtaned from: [2] İsmal Avcıbaş receved the B.S. and M.S. degrees n electroncs engneerng from Uludağ Unversty, Bursa, Turkey, n 992 and 994, respectvely, and the Ph.D. degree n electrcal and electroncs engneerng from Boğazç Unversty, İstanbul, Turkey, n 2. He receved a scholarshp from The Scentfc Councl of Turkey, TUBITAK, BDP Program, and dd research on mage compresson and steganalyss n the Department of Computer and Informaton Scence, Polytechnc Unversty, Brooklyn, NY, n He s currently an Assstant Professor at the Department of Electroncs Engneerng, Uludağ Unversty, Bursa, Turkey. Hs current research nterests are n sgnal processng, data compresson, steganalyss of audo-vsual data, and pattern recognton.

9 Image Steganalyss wth Bnary Smlarty Measures 2757 Mehd Kharraz receved hs B.E. degree n electrcal engneerng from Cty College of New York. He receved hs M.S. degree n electrcal engneerng from the Department of Electrcal and Computer Engneerng at Polytechnc Unversty, Brooklyn, NY, n May 22, and s currently pursung hs Ph.D. Hs current research nterests nclude multmeda and computer securty. Nasr Memon s a Professor n the Computer Scence Department at Polytechnc Unversty, New York. Professor Memon s research nterests nclude data compresson, computerandnetworksecurty,andmultmeda communcaton, computng, and securty. He was an Assocate Edtor for the IEEE Transactons on Image Processng from He s currently an Assocate Edtor for the ACM Multmeda Systems Journal, the IEEE Transactons on Informaton Forenscs and Securty, and the Journal of Electronc Imagng. Bülent Sankur receved hs B.S. degree n electrcal engneerng from Robert College, Istanbul, and completed hs M.S. and Ph.D. degrees at Rensselaer Polytechnc Insttute, NY, USA. He has been teachng at Boğazç (Bosphorus) Unversty n the Department of Electrcal and Electroncs Engneerng. Hs research nterests are n the areas of dgtal sgnal processng, mage and vdeo compresson, bometry, cognton, and multmeda systems. Dr. Sankur has held vstng postons at the Unversty of Ottawa, Techncal Unversty of Delft, and École Natonale Supéreure des Télécommuncatons, Pars. He was the Charman of ICT 96: Internatonal Conference on Telecommuncatons and EUSIPCO 5: The European Conference on Sgnal Processng as well as Techncal Charman of ICASSP.

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Hiding data in images by simple LSB substitution

Hiding data in images by simple LSB substitution Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty

More information

Regularized Discriminant Analysis for Face Recognition

Regularized Discriminant Analysis for Face Recognition 1 Regularzed Dscrmnant Analyss for Face Recognton Itz Pma, Mayer Aladem Department of Electrcal and Computer Engneerng, Ben-Guron Unversty of the Negev P.O.Box 653, Beer-Sheva, 845, Israel. Abstract Ths

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

Homework Assignment 3 Due in class, Thursday October 15

Homework Assignment 3 Due in class, Thursday October 15 Homework Assgnment 3 Due n class, Thursday October 15 SDS 383C Statstcal Modelng I 1 Rdge regresson and Lasso 1. Get the Prostrate cancer data from http://statweb.stanford.edu/~tbs/elemstatlearn/ datasets/prostate.data.

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

CS 3710: Visual Recognition Classification and Detection. Adriana Kovashka Department of Computer Science January 13, 2015

CS 3710: Visual Recognition Classification and Detection. Adriana Kovashka Department of Computer Science January 13, 2015 CS 3710: Vsual Recognton Classfcaton and Detecton Adrana Kovashka Department of Computer Scence January 13, 2015 Plan for Today Vsual recognton bascs part 2: Classfcaton and detecton Adrana s research

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Multigradient for Neural Networks for Equalizers 1

Multigradient for Neural Networks for Equalizers 1 Multgradent for Neural Netorks for Equalzers 1 Chulhee ee, Jnook Go and Heeyoung Km Department of Electrcal and Electronc Engneerng Yonse Unversty 134 Shnchon-Dong, Seodaemun-Ku, Seoul 1-749, Korea ABSTRACT

More information

The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model

The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model Journal of Computer and Communcatons, 04,, -6 Publshed Onlne July 04 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.436/cc.04.906 The Dgtal Fngerprntng Method for Statc Images Based on Weghted

More information

BOOTSTRAP METHOD FOR TESTING OF EQUALITY OF SEVERAL MEANS. M. Krishna Reddy, B. Naveen Kumar and Y. Ramu

BOOTSTRAP METHOD FOR TESTING OF EQUALITY OF SEVERAL MEANS. M. Krishna Reddy, B. Naveen Kumar and Y. Ramu BOOTSTRAP METHOD FOR TESTING OF EQUALITY OF SEVERAL MEANS M. Krshna Reddy, B. Naveen Kumar and Y. Ramu Department of Statstcs, Osmana Unversty, Hyderabad -500 007, Inda. nanbyrozu@gmal.com, ramu0@gmal.com

More information

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT Changqng Zhu 1 Zhwe Wang 2 Y Long 1 Chengsong Yang 2 1 Key Laboratory of Vrtual Geographc Envronment, Nanjng Normal Unversty, Nanjng 210054;2 Insttute

More information

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling Proceedngs of the World Congress on Engneerng and Computer Scence 007 WCECS 007, October 4-6, 007, San Francsco, USA A Fast Fractal Image Compresson Algorthm Usng Predefned Values for Contrast Scalng H.

More information

Natural Language Processing and Information Retrieval

Natural Language Processing and Information Retrieval Natural Language Processng and Informaton Retreval Support Vector Machnes Alessandro Moschtt Department of nformaton and communcaton technology Unversty of Trento Emal: moschtt@ds.untn.t Summary Support

More information

Introduction to Information Theory, Data Compression,

Introduction to Information Theory, Data Compression, Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures

More information

Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms

Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms Reversble Data Hdng Based on Two-level HDWT Coeffcent Hstograms Xu-Ren Luo 1, Chen-Hu Jerry Ln 2 and Te-Lung Y 3 1 Department of Electrcal and Electronc Engneerng, Chung Cheng Insttute of Technology, Natonal

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

Ensemble Methods: Boosting

Ensemble Methods: Boosting Ensemble Methods: Boostng Ncholas Ruozz Unversty of Texas at Dallas Based on the sldes of Vbhav Gogate and Rob Schapre Last Tme Varance reducton va baggng Generate new tranng data sets by samplng wth replacement

More information

arxiv:cs.cv/ Jun 2000

arxiv:cs.cv/ Jun 2000 Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São

More information

A Network Intrusion Detection Method Based on Improved K-means Algorithm

A Network Intrusion Detection Method Based on Improved K-means Algorithm Advanced Scence and Technology Letters, pp.429-433 http://dx.do.org/10.14257/astl.2014.53.89 A Network Intruson Detecton Method Based on Improved K-means Algorthm Meng Gao 1,1, Nhong Wang 1, 1 Informaton

More information

A Bayes Algorithm for the Multitask Pattern Recognition Problem Direct Approach

A Bayes Algorithm for the Multitask Pattern Recognition Problem Direct Approach A Bayes Algorthm for the Multtask Pattern Recognton Problem Drect Approach Edward Puchala Wroclaw Unversty of Technology, Char of Systems and Computer etworks, Wybrzeze Wyspanskego 7, 50-370 Wroclaw, Poland

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Microwave Diversity Imaging Compression Using Bioinspired

Microwave Diversity Imaging Compression Using Bioinspired Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Natural Images, Gaussian Mixtures and Dead Leaves Supplementary Material

Natural Images, Gaussian Mixtures and Dead Leaves Supplementary Material Natural Images, Gaussan Mxtures and Dead Leaves Supplementary Materal Danel Zoran Interdscplnary Center for Neural Computaton Hebrew Unversty of Jerusalem Israel http://www.cs.huj.ac.l/ danez Yar Wess

More information

Support Vector Machines. Vibhav Gogate The University of Texas at dallas

Support Vector Machines. Vibhav Gogate The University of Texas at dallas Support Vector Machnes Vbhav Gogate he Unversty of exas at dallas What We have Learned So Far? 1. Decson rees. Naïve Bayes 3. Lnear Regresson 4. Logstc Regresson 5. Perceptron 6. Neural networks 7. K-Nearest

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

x = , so that calculated

x = , so that calculated Stat 4, secton Sngle Factor ANOVA notes by Tm Plachowsk n chapter 8 we conducted hypothess tests n whch we compared a sngle sample s mean or proporton to some hypotheszed value Chapter 9 expanded ths to

More information

Boostrapaggregating (Bagging)

Boostrapaggregating (Bagging) Boostrapaggregatng (Baggng) An ensemble meta-algorthm desgned to mprove the stablty and accuracy of machne learnng algorthms Can be used n both regresson and classfcaton Reduces varance and helps to avod

More information

GEMINI GEneric Multimedia INdexIng

GEMINI GEneric Multimedia INdexIng GEMINI GEnerc Multmeda INdexIng Last lecture, LSH http://www.mt.edu/~andon/lsh/ Is there another possble soluton? Do we need to perform ANN? 1 GEnerc Multmeda INdexIng dstance measure Sub-pattern Match

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification

Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp.495-507, 2018 Improved Lossless Data Hdng for JPEG Images Based on Hstogram Modfcaton Yang Du 1, Zhaoxa Yn 1, 2, * and Xnpeng Zhang 3 Abstract: Ths

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur Analyss of Varance and Desgn of Experment-I MODULE VII LECTURE - 3 ANALYSIS OF COVARIANCE Dr Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur Any scentfc experment s performed

More information

UNIVERSITY OF TORONTO Faculty of Arts and Science. December 2005 Examinations STA437H1F/STA1005HF. Duration - 3 hours

UNIVERSITY OF TORONTO Faculty of Arts and Science. December 2005 Examinations STA437H1F/STA1005HF. Duration - 3 hours UNIVERSITY OF TORONTO Faculty of Arts and Scence December 005 Examnatons STA47HF/STA005HF Duraton - hours AIDS ALLOWED: (to be suppled by the student) Non-programmable calculator One handwrtten 8.5'' x

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

Statistical analysis using matlab. HY 439 Presented by: George Fortetsanakis

Statistical analysis using matlab. HY 439 Presented by: George Fortetsanakis Statstcal analyss usng matlab HY 439 Presented by: George Fortetsanaks Roadmap Probablty dstrbutons Statstcal estmaton Fttng data to probablty dstrbutons Contnuous dstrbutons Contnuous random varable X

More information

Chapter 5 Multilevel Models

Chapter 5 Multilevel Models Chapter 5 Multlevel Models 5.1 Cross-sectonal multlevel models 5.1.1 Two-level models 5.1.2 Multple level models 5.1.3 Multple level modelng n other felds 5.2 Longtudnal multlevel models 5.2.1 Two-level

More information

Chapter 11: Simple Linear Regression and Correlation

Chapter 11: Simple Linear Regression and Correlation Chapter 11: Smple Lnear Regresson and Correlaton 11-1 Emprcal Models 11-2 Smple Lnear Regresson 11-3 Propertes of the Least Squares Estmators 11-4 Hypothess Test n Smple Lnear Regresson 11-4.1 Use of t-tests

More information

Towards blind detection of low-rate spatial embedding in image steganalysis

Towards blind detection of low-rate spatial embedding in image steganalysis Publshed n IET Image Processng Receved on 20th January 2014 Revsed on 29th Aprl 2014 Accepted on 10th June 2014 Towards blnd detecton of low-rate spatal embeddng n mage steganalyss Farshd Farhat 1,2, Shahrokh

More information

Predictive Analytics : QM901.1x Prof U Dinesh Kumar, IIMB. All Rights Reserved, Indian Institute of Management Bangalore

Predictive Analytics : QM901.1x Prof U Dinesh Kumar, IIMB. All Rights Reserved, Indian Institute of Management Bangalore Sesson Outlne Introducton to classfcaton problems and dscrete choce models. Introducton to Logstcs Regresson. Logstc functon and Logt functon. Maxmum Lkelhood Estmator (MLE) for estmaton of LR parameters.

More information

Kernels in Support Vector Machines. Based on lectures of Martin Law, University of Michigan

Kernels in Support Vector Machines. Based on lectures of Martin Law, University of Michigan Kernels n Support Vector Machnes Based on lectures of Martn Law, Unversty of Mchgan Non Lnear separable problems AND OR NOT() The XOR problem cannot be solved wth a perceptron. XOR Per Lug Martell - Systems

More information

CHAPTER IV RESEARCH FINDING AND ANALYSIS

CHAPTER IV RESEARCH FINDING AND ANALYSIS CHAPTER IV REEARCH FINDING AND ANALYI A. Descrpton of Research Fndngs To fnd out the dfference between the students who were taught by usng Mme Game and the students who were not taught by usng Mme Game

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

BACKGROUND SUBTRACTION WITH EIGEN BACKGROUND METHODS USING MATLAB

BACKGROUND SUBTRACTION WITH EIGEN BACKGROUND METHODS USING MATLAB BACKGROUND SUBTRACTION WITH EIGEN BACKGROUND METHODS USING MATLAB 1 Ilmyat Sar 2 Nola Marna 1 Pusat Stud Komputas Matematka, Unverstas Gunadarma e-mal: lmyat@staff.gunadarma.ac.d 2 Pusat Stud Komputas

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

A Novel Quality Measure for Information Hiding in Images

A Novel Quality Measure for Information Hiding in Images A Novel Qualty Measure for Informaton Hdng n s KA Navas Aravnd M SasKumar M Asstant rofessor G student rofessor College Of Engneerng College of Engneerng Maran Engneerng College Trvandrum,Inda Trvandrum,Inda

More information

Note on EM-training of IBM-model 1

Note on EM-training of IBM-model 1 Note on EM-tranng of IBM-model INF58 Language Technologcal Applcatons, Fall The sldes on ths subject (nf58 6.pdf) ncludng the example seem nsuffcent to gve a good grasp of what s gong on. Hence here are

More information

A New Evolutionary Computation Based Approach for Learning Bayesian Network

A New Evolutionary Computation Based Approach for Learning Bayesian Network Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang

More information

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1 A New Metrc for Qualty Assessment of Dgtal Images Based on Weghted-Mean Square Error Proceedngs of SPIE, vol. 4875, 2002 Kawen Zhang, Shuozhong Wang, and Xnpen Zhang School of Communcaton and Informaton

More information

Statistical machine learning and its application to neonatal seizure detection

Statistical machine learning and its application to neonatal seizure detection 19/Oct/2009 Statstcal machne learnng and ts applcaton to neonatal sezure detecton Presented by Andry Temko Department of Electrcal and Electronc Engneerng Page 2 of 42 A. Temko, Statstcal Machne Learnng

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

Gaussian Mixture Models

Gaussian Mixture Models Lab Gaussan Mxture Models Lab Objectve: Understand the formulaton of Gaussan Mxture Models (GMMs) and how to estmate GMM parameters. You ve already seen GMMs as the observaton dstrbuton n certan contnuous

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Research Article Green s Theorem for Sign Data

Research Article Green s Theorem for Sign Data Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Linear Regression Analysis: Terminology and Notation

Linear Regression Analysis: Terminology and Notation ECON 35* -- Secton : Basc Concepts of Regresson Analyss (Page ) Lnear Regresson Analyss: Termnology and Notaton Consder the generc verson of the smple (two-varable) lnear regresson model. It s represented

More information

Comparative Studies of Law of Conservation of Energy. and Law Clusters of Conservation of Generalized Energy

Comparative Studies of Law of Conservation of Energy. and Law Clusters of Conservation of Generalized Energy Comparatve Studes of Law of Conservaton of Energy and Law Clusters of Conservaton of Generalzed Energy No.3 of Comparatve Physcs Seres Papers Fu Yuhua (CNOOC Research Insttute, E-mal:fuyh1945@sna.com)

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

MDL-Based Unsupervised Attribute Ranking

MDL-Based Unsupervised Attribute Ranking MDL-Based Unsupervsed Attrbute Rankng Zdravko Markov Computer Scence Department Central Connectcut State Unversty New Brtan, CT 06050, USA http://www.cs.ccsu.edu/~markov/ markovz@ccsu.edu MDL-Based Unsupervsed

More information

Temperature. Chapter Heat Engine

Temperature. Chapter Heat Engine Chapter 3 Temperature In prevous chapters of these notes we ntroduced the Prncple of Maxmum ntropy as a technque for estmatng probablty dstrbutons consstent wth constrants. In Chapter 9 we dscussed the

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Supporting Information

Supporting Information Supportng Informaton The neural network f n Eq. 1 s gven by: f x l = ReLU W atom x l + b atom, 2 where ReLU s the element-wse rectfed lnear unt, 21.e., ReLUx = max0, x, W atom R d d s the weght matrx to

More information

Chapter 3 Describing Data Using Numerical Measures

Chapter 3 Describing Data Using Numerical Measures Chapter 3 Student Lecture Notes 3-1 Chapter 3 Descrbng Data Usng Numercal Measures Fall 2006 Fundamentals of Busness Statstcs 1 Chapter Goals To establsh the usefulness of summary measures of data. The

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000 Novel Pre-Compresson Rate-Dstorton Optmzaton Algorthm for JPEG 2000 Yu-We Chang, Hung-Ch Fang, Chung-Jr Lan, and Lang-Gee Chen DSP/IC Desgn Laboratory, Graduate Insttute of Electroncs Engneerng Natonal

More information

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

Which Separator? Spring 1

Which Separator? Spring 1 Whch Separator? 6.034 - Sprng 1 Whch Separator? Mamze the margn to closest ponts 6.034 - Sprng Whch Separator? Mamze the margn to closest ponts 6.034 - Sprng 3 Margn of a pont " # y (w $ + b) proportonal

More information

Statistics II Final Exam 26/6/18

Statistics II Final Exam 26/6/18 Statstcs II Fnal Exam 26/6/18 Academc Year 2017/18 Solutons Exam duraton: 2 h 30 mn 1. (3 ponts) A town hall s conductng a study to determne the amount of leftover food produced by the restaurants n the

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Lecture 12: Classification

Lecture 12: Classification Lecture : Classfcaton g Dscrmnant functons g The optmal Bayes classfer g Quadratc classfers g Eucldean and Mahalanobs metrcs g K Nearest Neghbor Classfers Intellgent Sensor Systems Rcardo Guterrez-Osuna

More information

This column is a continuation of our previous column

This column is a continuation of our previous column Comparson of Goodness of Ft Statstcs for Lnear Regresson, Part II The authors contnue ther dscusson of the correlaton coeffcent n developng a calbraton for quanttatve analyss. Jerome Workman Jr. and Howard

More information

MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN

MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN S. Chtwong, S. Wtthayapradt, S. Intajag, and F. Cheevasuvt Faculty of Engneerng, Kng Mongkut s Insttute of Technology

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Online Classification: Perceptron and Winnow

Online Classification: Perceptron and Winnow E0 370 Statstcal Learnng Theory Lecture 18 Nov 8, 011 Onlne Classfcaton: Perceptron and Wnnow Lecturer: Shvan Agarwal Scrbe: Shvan Agarwal 1 Introducton In ths lecture we wll start to study the onlne learnng

More information

Linear Classification, SVMs and Nearest Neighbors

Linear Classification, SVMs and Nearest Neighbors 1 CSE 473 Lecture 25 (Chapter 18) Lnear Classfcaton, SVMs and Nearest Neghbors CSE AI faculty + Chrs Bshop, Dan Klen, Stuart Russell, Andrew Moore Motvaton: Face Detecton How do we buld a classfer to dstngush

More information

On the Repeating Group Finding Problem

On the Repeating Group Finding Problem The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng

More information

Uncertainty as the Overlap of Alternate Conditional Distributions

Uncertainty as the Overlap of Alternate Conditional Distributions Uncertanty as the Overlap of Alternate Condtonal Dstrbutons Olena Babak and Clayton V. Deutsch Centre for Computatonal Geostatstcs Department of Cvl & Envronmental Engneerng Unversty of Alberta An mportant

More information

CHAPTER IV RESEARCH FINDING AND DISCUSSIONS

CHAPTER IV RESEARCH FINDING AND DISCUSSIONS CHAPTER IV RESEARCH FINDING AND DISCUSSIONS A. Descrpton of Research Fndng. The Implementaton of Learnng Havng ganed the whole needed data, the researcher then dd analyss whch refers to the statstcal data

More information

MAXIMUM A POSTERIORI TRANSDUCTION

MAXIMUM A POSTERIORI TRANSDUCTION MAXIMUM A POSTERIORI TRANSDUCTION LI-WEI WANG, JU-FU FENG School of Mathematcal Scences, Peng Unversty, Bejng, 0087, Chna Center for Informaton Scences, Peng Unversty, Bejng, 0087, Chna E-MIAL: {wanglw,

More information