A Blind Image Watermarking Based on Dual Detector *

Size: px
Start display at page:

Download "A Blind Image Watermarking Based on Dual Detector *"

Transcription

1 JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 25, (2009) A Blind Imge Wtermrking Bsed on Dul Detector * CHIN-PAN HUANG 1, CHI-JEN LIAO 2 AND CHAUR-HEH HSIEH 1 1 Deprtment of Computer nd Communiction Engineering Ming Chun University Toyun, 333 Tiwn 2 Deprtment of Informtion Engineering I-Shou University Kohsiung, 840 Tiwn This pper presents blind imge wtermrking technique bsed on novel detection scheme which contins two detectors iming t the positive ttck nd negtive ttck, respectively. The nlysis on signl processing ttck indictes tht there exist unrelible trnsformed coefficients in the ttcked imge which result in errors of the extrction of wtermrk dt. The novel detection scheme removes the unrelible trnsformed coefficients nd employs the remining relible coefficients for the extrction of embedded wtermrk. The experimentl results indicte the proposed technique improves robustness significntly, s compred to the existing single detector scheme. Keywords: imge wtermrking, ttcks, discrete cosine trnsform, robustness, dul detector 1. INTRODUCTION Digitl wtermrking cn prove to be useful to void the illegl use of digitl medi. Generlly, it cn be clssified into two types: robust wtermrking nd frgile wtermrking. The requirements for robust wtermrking re trnsprency, robustness, security, cpcity, universlity, nd unmbiguousness [1]. Among them, trnsprency nd robustness re most importnt. Trnsprency refers to the perceptul qulity of the imge being protected. In other words, the wtermrk should be invisible over the originl imge. Robustness refers to the bility to detect the wtermrk fter unintentionl ttck, i.e., common signl processing opertions [2]. The technique presented in this pper belongs to the robust type. Depending upon work domin tht wtermrk is embedded in, wtermrking techniques cn be clssified into two ctegories: sptil domin nd trnsform domin [3-15]. Recent efforts re mostly bsed on trnsform-domin becuse it offers better robustness. According to whether the host signl is needed or not during the detection, wtermrking technique cn be roughly ctegorized into two types: non-blind nd blind [16]. Non-blind method requires the originl host in the detection end, wheres blind one does not. The blind methods re more useful thn non-blind becuse the host imge my be not vilble in rel-world scenrios. Generlly, blind methods re often less robust nd lso hrder to implement thn non-blind ones. Mny blind imge wtermrking schemes [16-22] hve been presented recently. Received Februry 26, 2008; revised June 9 & August 4, 2008; ccepted August 22, Communicted by H. Y. Mrk Lio. * This pper ws prtilly supported by the Ntionl Science Council of Tiwn, R.O.C., No. NSC E

2 1724 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH The existing blind schemes cn be roughly clssified into three types [16]: () correltion-bsed; (b) bsed on bsolute modultion of individul primry or secondry elements of n imge; (c) bsed on reltive modultion of pir elements. Most of these schemes focus on embedding strtegy. In ddition, they do not exploit the chrcteristics of the ttcks. In this work, we im t the design of n efficient detection scheme tht tkes signl processing ttcks into ccount. Detection is n inverse process of embedding. Most detection schemes of trnsform-domin wtermrking in the literture use ll trnsformed coefficients of the test ttcked imge to extrct wtermrk. In this pper, the nlysis on the ttcked imges indictes tht there re unrelible trnsformed coefficients which would yield the extrction error of wtermrk dt. To ttck the problem, we develop new detection scheme tht removes the unrelible trnsformed coefficients. The new detection contins two detectors tht re bsed on positive ttck (PA) nd negtive ttck (NA), which re obtined through nlyses nd experiments. The proposed dul-detector scheme is different from the cocktil wtermrking [15] which lso employs two detectors. The cocktil wtermrking is non-blind scheme which embeds two complementry wtermrks, clled positive hiding (PH) nd negtive hiding (NH), into the host imge simultneously. In detection, two corresponding detectors re used to extrct PH nd NH wtermrks. In such cse, t lest one wtermrk survives when ny ttcks occurs. Therefore, the missed detection rte will be reduced nd thus improving robustness significntly. However, if no wtermrk is embedded into the host imge nd the imge suffers from positive ttck or negtive ttck, our previous study [23-25] indicte tht cocktil method will introduce high flse lrm rte. Unlike the cocktil method, in this work we embed only one wtermrk, nd design two detectors to rise the detection rte of wtermrk. These two detectors re minly bsed on chrcteristics of ttcks, which re not directly relted to the embedding scheme like cocktil pproch. The other difference between the cocktil method nd this work is the cocktil scheme [15] is non-blind one. The remining sections re orgnized s follows. The proposed wtermrking system is described in section 2. A single detector lgorithm is first presented. Then novel dul detector scheme bsed on ttck chrcteristics is developed. In section 3, experimentl results with single detector nd our dul detector methods re provided. The conclusions re drwn in section PROPOSED BLIND WATERMARKING The proposed wtermrking system is shown in Fig. 1. The host imge is trnsformed by full-domin DCT. The DC coefficient is discrded, nd the remining twodimensionl AC coefficients re converted into one-dimensionl coefficient sequence F(k) vi zig-zg scnning. The binry wtermrk is embedded into the coefficient sequence. In the detection end, the received wtermrked imge is trnsformed with DCT s in the embedding end, nd the resulting AC coefficients re fed into positive-ttck detector nd negtive-ttck detector simultneously. The lrger response of the two detectors is input to thresholding device. If it is greter thn the detection threshold ρ t, we clim tht the wtermrk exists; otherwise, the wtermrk does not exist. The designs of embedding nd detection re performed on the bove AC coefficient sequence, nd the design detils re described in the following.

3 A BLIND IMAGE WATERMARKING 1725 () Embedding. (b) Detection. Fig. 1. Proposed blind wtermrking system. 2.1 Embedding We clculte reference (estimte) sequence from the AC coefficient sequence F(k) by slide window of (2m + 1); i.e. m F( k) = sign( F( k)) 1 F( k+ j). (1) (2 + 1) m j= m In this work, the slide window length is 5 (m = 2). The binry wtermrk W i is embedded by the following rule: F ( k) = F( k) + sign( W ) α F( k) (2) m i where α is hiding fctor with the vlue between 0 nd 1 (in this work, α = 0.5), sign(x) is sign function, nd F m (k) is the resulting signl with wtermrk embedded. In Eq. (2), if the wtermrk bit to be embedded is 1, F m (k) is the sum of the reference Fk ( ) nd positive embedded energy α F( k) ; otherwise, if the wtermrk bit is 1, F m (k) is the difference of the reference nd α F( k). In detection, the wtermrk cn be esily extrcted by e m m W () i = sign( F ( k) F ( k)). (3) More specificlly, if Fm( k) > Fm( k), the extrcted wtermrk bit is 1; otherwise it is 1. In the bove eqution, Fm ( k ) is the DCT coefficient sequence of the test imge which suffered from ttck; Fm ( k ) is its corresponding reference coefficient sequence, which is clculted using the estimtion scheme in Eq. (1). The bove detection scheme hs been widely used in most blinding wtermrking techniques, which doesn t consider the

4 1726 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH ttck chrcteristics. It employs one detector only, so we refer to it s single detector for comprison purpose. In generl, the length of wtermrk sequence, B L, is much smller thn tht of the medi to be embedded (the AC coefficient sequence), M L. To increse the security nd prevent interction between the successive embedded dt, we expnd rndomly the originl binry wtermrk strem, sequence of {+ 1, 1}, into ternry strem, sequence of {+ 1, 1, 0}. The coefficients corresponding to the symbol 0 re not embedded with wtermrk messge. The length of the ternry strem, T L, is obtined ccording to the rnge of the AC coefficient to be hidden. T L is lrger thn B L but smller thn M L. Fig. 2 illustrtes the pseudo-rndom expnsion using simple exmple, in which wtermrk sequence with length of 3 bits is mpped into ternry strem with length of 10 symbols. It is seen tht the originl wtermrk bits re permuted in the ternry strem. Through this mnner, short wtermrk sequence cn be embedded in long AC coefficient sequence in pseudo-rndom wy, which is controlled by key. Binry wtermrk { 1, + 1} W 0 W 1 W 2 Ternry sequennce{0, 1, + 1} 0 W W W 2 0 Fig. 2. Wtermrk expnsion from binry symbol to ternry symbol. 2.2 Detection As mentioned erlier, detection is n inverse process of embedding. Thus it does not consider the chrcteristics of the ttcks. This pper ims to develop new detection scheme which tkes ttcks into ccount. The ttcks cn be clssified into three ctegories: positive ttck (PA), negtive ttck (NA) nd hybrid ttck (HA) nd they re not imge dependent. Note tht the hybrid (rndom) ttck cn be regrded s combintion of positive nd negtive ttck. The detils of chrcteristics of these ttcks cn be found in our previous works [23-25]. The new scheme ctegorizes the ttcks into positive ttck (PA) nd negtive ttck (NA) nd then design two detectors ccordingly. We cll the detection scheme s dul detector for convenience. The scheme is designed minly bsed on the nlysis of the typicl imge processing ttcks in Tble 1. The ttcks correspond to the signl processing ctegory (noise nd convo filter) of StirMrk benchmrk [21]. Here we summrize the chrcteristics of the ttcks in the following, which re relted directly to this work. The detils cn be found in [24, 25]. Ech signl processing ttck yields in both positive modultion (PM) nd negtive modultion (NM) to the host imge [15, 23-25]. PM (NM) denotes tht the mgnitude of n AC coefficient of the ttcked imge is greter (less) thn tht of the unttcked imge. To chrcterize the ttcks, we employed two mesures to investigte the chrcteristics of the AC coefficient sequence F(k). One is the verge coefficient mgnitude chnge rtio (AMR) before nd fter ttck, nd the other is occurrence frequency (OF) before nd fter ttck. The former mesures the verge ttck energy for whole imge, nd

5 A BLIND IMAGE WATERMARKING 1727 Tble 1. Imge processing ttcks. Imge Processing Functions nd clssifictions 01- Averge (7 7) NA 08- Enhnce Edges (75) PA 02- Blur (75) NA 09- Enhnce Focus PA 03- Gussin Blur (7 7) NA 10- Focus Restortion PA 04- Soften (75) NA 11- Shrpen (50) PA 05- JPEG compression (75) NA 12- Rndom Noise (±16) HA 06- JPEG compression (25) NA 13- Rndom Noise (±8) HA 07- Enhnce Detil PA AMR PA NA AC Coefficient Set 100 () AMR OF (%) 50 PA NA AC Coefficient Set (b) OF. Fig. 3. Results of shrpening opertion.

6 1728 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH AMR PA NA AC Coefficient Unit 100 () AMR OF(%) 50 PA NA AC Coefficient Set (b) OF. Fig. 4. Results of JPEG compression. the lter evlutes the number of coefficients ttcked (clled ttck frequency). Fig. 3 shows the two mesures when imges re suffered from shrpening ttck. The figure compres the two mesures for PM nd NM, respectively. It is obvious tht for the shrpening opertion, PM domintes both in ttck energy nd ttck frequency. Therefore, it is clssified s positive ttck. On the contrry, s seen in Fig. 4, for JPEG compression, NM domintes, thus it is regrded s negtive ttck. Using the two mesures, ll signl processing ttcks cn be clssified. Positive ttck will move the embedded coefficients wy from the reference vlue. Thus the ttcked signl is more robust to noise thn the unttcked one. So positive t-

7 A BLIND IMAGE WATERMARKING 1729 tck is helpful for extrction of wtermrk. On the contrry, negtive ttck will pull embedded coefficients such tht they re close to the reference vlue. In this cse, even smll noise my cuse the signl jumping from bove (or below) reference to below (bove) reference, which yield the error of extrction of wtermrk. The dynmic rnge (the difference between positive reference nd negtive reference) becomes lrger fter positive ttck nd smller fter negtive ttck. Furthermore, for negtive ttck, when ttck energy is high, ll the coefficients my be reduced to pproximte zero vlue. In such cse, the detection of wtermrk would fil. So, it is resonble to sy tht if the vlue of coefficient is very smll, the coefficient is probbly suffered from lrge negtive ttck. Therefore, it is not relible nd should not be used for the detection. As mentioned before, some of the coefficients of the ttcked imge re not relible. The unrelible coefficients should not be included for wtermrk extrction; otherwise, it will yield errors of extrction. In this work, we present novel detection scheme tht removes the unrelible coefficients nd uses the remining relible coefficients for extrction of wtermrk. It contins two detectors tht exploit the chrcteristics of positive ttck nd negtive ttcks, respectively. 2.3 Dul Detector For convenience, we define n ttck mgnitude devition rtio s R(k) = ( Fm ( k) Fm()/ k Fm(). k If no ttck exists, it is esy to obtin R(k) = α from Eq. (2). Therefore, if R(k) > α we cn sy tht positive ttck occurs; otherwise, negtive ttck occurs when R(k) < α. The decision rule is suited for the idel cse in which the reference Fm ( k ) is fixed vlue. However, our investigtion indictes tht Fm ( k ) my fluctute slightly with different k nd different ttcks. To void the clssifiction error of ttck types, we nrrow down the PA rnge by introducing the prmeter β which is lrger thn α. Specificlly, if R(k) > β (β > α), the ttck is regrded s positive. Bsed on the concept, we design detector for extrcting the coefficients suffered from positive ttck s follows. Unlike most techniques in the literture, the detectors of our technique re designed ccording to the types of mplitude ttcks mentioned bove, rther thn the corresponding embedding scheme. Positive Attck Detector: The wtermrk is extrcted by 1, if R( k) > β nd sign( Fm( k) Fm( k)) = sign( Fm( k)) > 0 e Wp () i = 1, if R( k) > β nd sign( F ( ) ( )) sign( ( )) 0. m k Fm k = Fm k < 0, otherwise (4) The rule in the top line of Eq. (4) is for positive coefficients (the sign of the coefficient is positive) of the received signl, wheres the rule in the middle line is for negtive coefficients. The extrcted wtermrk bits for unrelible coefficients re set to zero (bottom line of Eq. (4)) such tht they re useless in the clcultion of detection response. The

8 1730 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH ction is equivlent to removing the unrelible coefficients for detection of wtermrk. The extrcted wtermrk bits for the relible coefficients re + 1 or 1. It is obvious tht the detector output contins three symbols: + 1, 1, nd 0. This is unlike the conventionl detection scheme in which two symbols (+ 1 nd 1) re employed. The detector response (normlized correltion) between the originl wtermrk strem nd extrcted wtermrk strem under positive ttck is defined s ρ e e p mm, p W Wp = e p Wi () W () i (, ). Wi ( ) W( i) (5) The denomintor is the totl number symbols of + 1 nd 1 extrcted. As mentioned before, negtive ttck my mke the R very smll, or the reference vlue close to zero. In either cse, the extrction of wtermrk is unrelible becuse it is sensitive to noise. In order to rise the relibility of wtermrk extrction, we remove the unrelible coefficients tht stisfy R(k) < ε or Fm ( k) < σ, nd thus obtin the negtive ttck detector in the following. Negtive Attck Detector: The wtermrk is extrcted by e sign( F ( ) ( )), if ( ) nd ( ) () m k Fm k ε R k β Fm k σ Wn i = < < >. 0, otherwise (6) Like the positive ttck detector, the bottom line in Eq. (6) is used to remove the unrelible coefficients. The detector output lso contins three symbols: + 1, 1, nd 0. The normlized correltion between the originl wtermrk strem nd extrcted wtermrk strem under negtive ttck is defined s ρ mm,n, using the sme eqution s in Eq. (5) but replcing the positive extrction prmeter W () i with W (). i The lrger of the bove two detection responses, mx{ρ mm,p, ρ mm,n }, is used to judge whether the wtermrk is present or bsent by compring it with predefined detection threshold (ρ t in Fig. 1). If it is greter thn the threshold, the wtermrk exists; otherwise, it doesn t exist. It is seen from Eq. (4) tht if β is set higher, more coefficients would be regrded s unrelible; consequently, it my reduce flse lrm rte, wheres increse missed detection rte. On the other hnd, if β is set lower, fewer coefficients would be regrded s unrelible, which my increse flse lrm rte while reduce missed detection rte. Thus, the vlue of β is determined by tking the compromise of flse lrm nd missed detection. Similr conclusion is pplied for the determintion of the vlues of ε nd σ in Eq. (6). In ddition, the vlues of prmeters ε nd β depend on the vlue of α. The reltionship is hrd to chieve theoreticlly. Our experience indictes tht β 1.25α nd ε 0.75α re good choices. In ddition, the threshold σ is determined experimentlly nd σ = 20 is lso good choice. e p e n

9 A BLIND IMAGE WATERMARKING SIMULATIONS The experiments re conducted on 50 test imges with size of from IM- AGEMORE Coopertion [22]. A binry wtermrk length with length of 1024 is obtined by generting zero-men pseudo-rndom sequence with length of 1024, nd then tking the sign of ech dt point of the sequence. The binry wtermrk is expnded into ternry strem with length , nd then modulted into the host imges. Thirteen types of imge processing ttcks (listed in Tble 1) including positive (e.g., shrpening), negtive (e.g., blurring) nd hybrid ttcks, re pplied to the test imges, respectively, nd thus totlly 650 ttcked imges re obtined. The hiding fctor is chosen s α = 0.5, which yields good embedded picture qulity. Fig. 5 demonstrtes some typicl imges embedded with wtermrks. The detection prmeters ε nd β re chosen experimentlly s ε = 0.2 nd β = 0.7. Note tht the mgnitude of n AC coefficient is generlly relted to its frequency bnd. The smll coefficient corresponds to higher frequency bnd nd its effect is t the detil of n imge. Although the smll coefficient in lower bnd my chnge reltive lrge vlue, it is very rre from experiences of our experiments. It is cler tht the smll coefficient cuses very limited effect on qulity of the wtermrked imge so tht the imge qulity cn be gurnteed. Fig. 5. Typicl imges embedded with wtermrk. The test imges re used to evlute the single detector nd our proposed dul detector scheme. The comprison of the two detection schemes is in terms of flse negtive rte (missed detection rte) nd flse positive rte (flse lrm rte). The former corresponds to robustness, nd the lter to flse lrm. The two performnces conflict ech other. More specificlly, in detection, when the detection threshold (ρ t in Fig. 1) is set higher, the flse lrm rte cn be reduced, but the flse negtive rte will become higher. In rel pplictions, compromise needs to be tken by choosing n pproprite detec-

10 1732 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH tion threshold vlue. Becuse the two mesures conflict, we use the totl error rte (the sum of the two error rtes) s the performnce metric. The smller the totl error rte, the better the system performnce. Tble 2 lists the totl error rtes of the two schemes for vrious vlues of detection threshold. It indictes the totl error rte of our dul detector scheme is less thn one hlf of the single detector scheme. The result cn be confirmed from ROC (receiver operting curve) performnce comprison in Fig. 6. Tble 2. Performnce comprison of single detector nd dul detector under vrious threshold vlues. Threshold vlues Methods Single Detector Dul Detector Criteri Missed detection rte Flse lrm rte Totl error rte Missed detection rte Flse lrm rte Totl error rte Fig. 6. The ROC performnces of single detector nd dul detector. Fig. 7. The error rtes vs. detection threshold vlues for single detector. Fig. 8. The error rtes vs. detection threshold vlues for dul detector.

11 A BLIND IMAGE WATERMARKING 1733 Figs. 7 nd 8 show the curves of the two error rtes under vrious detection threshold vlues. The figures provide the cue for the selection of pproprite threshold vlues to meet the requirements of users. It is seen from Fig. 8 tht if threshold is set in the rnge of 0.2 to 0.3, the dul detector gives pproximte zero missed detection nd flse lrm rtes. However, Fig. 8 indictes tht the single detector definitely yields errors (either missed detection or flse lrm or both) whtever the threshold vlues re chosen. Obviously, the dul detector is better thn single detector even from the viewpoint of threshold selection. 4. CONCLUSIONS A blind imge wtermrking technique bsed on the chrcteristics of mplitude ttcks hs been proposed. In the novel method, two detectors re designed which im t extrcting relible trnsformed coefficients under positive ttck nd negtive ttck, respectively. The removl of unrelible coefficients is very useful to reduce the error of wtermrk extrction. The results indicte tht our scheme performs much better thn the single detector tht uses ll the trnsformed coefficients nd does not consider the ttck chrcteristics. The system presented here is just for demonstrting the benefit of the novel detection scheme. It could be pplied to other trnsformtions such s discrete wvelet trnsform [26, 27]. Furthermore, the proposed detection scheme cn be pplied to ny existing wtermrking systems to further improve their performnces. The mjor limittion of our scheme is tht the determintion of prmeters vlues is performed experimentlly. An utomtic clcultion mechnism for the prmeters my be worth further investigting in the future. REFERENCES 1. F. Hrtung nd M. Kutter, Multimedi wtermrking techniques, Proceedings of IEEE, Vol. 87, 1999, pp I. J. Cox, M. L. Miller, nd J. A. Bloom, Digitl Wtermrking, Morgn Kufmnn Publishers, Los Altos, CA, S. Ktzenbeisser nd F. A. P. Petitcols, Informtion Hiding Techniques for Stegnogrphy nd Digitl Wtermrking, Artech House, Boston, London, M. Bender, D. Gruhl, N. Morimoto, nd A. Lu, Techniques for dt hiding, IBM System Journl, Vol. 35, 1996, pp N. Nikolidis nd I. Pits, Copyright protection of imges using robust digitl signtures, in Proceedings of IEEE Interntionl Conference on Acoustics, Speech, nd Signl Processing, 1996, pp R. B. Wolfgng nd E. J. Delp, A wtermrk for digitl imges, in Proceedings of Interntionl Conference on Imge Processing, Vol. 3, 1996, pp I. J. Cox, J. Kilin, F. T. Leighton, nd T. Shmoon, Secure spred spectrum wtermrking for multimedi, IEEE Trnsctions on Imge Processing, Vol. 6, 1997, pp C. I. Podilchuk nd W. Zeng, Imge-dptive wtermrking using visul models,

12 1734 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH IEEE Journl on Selected Ares in Communictions, Vol. 16, 1998, pp A. Piv, M. Brni, E. Brtoloni, nd V. Cppellini, DCT-bsed wtermrking recovering without resorting to the uncorrupted originl imge, in Proceedings of IEEE Interntionl Conference on Imge Processing, Vol. 1, 1997, pp C. T. Hsu nd J. L. Wu, Multiresolution wtermrking for digitl imges, IEEE Trnsctions on Circuits nd Systems II: Anlog nd Digitl Signl Processing, Vol. 45, 1998, pp S. H. Wng nd Y. P. Lin, Wvelet tree quntiztion for copyright protection, IEEE Trnsctions on Imge Processing, Vol. 13, 2004, pp C. S. Lu nd H. Y. M. Lio, Multipurpose wtermrking for imge uthentiction nd protection, IEEE Trnsctions on Imge Processing, Vol. 10, 2001, pp C. W. Tng nd H. M. Hng, A feture-bsed robust digitl imge wtermrking scheme, IEEE Trnsctions on Signl Processing, Vol. 51, 2003, pp A. M. Ahmed nd D. D. Dy, Applictions of the nturlness preserving trnsform to imge wtermrking nd dt hiding, Digitl Signl Processing, Vol. 14, 2004, pp C. S. Lu, C. J. Sze, nd H. Y. M. Lio, Cocktil wtermrking for digitl imge protection, IEEE Trnsctions on Multimedi, Vol. 2, 2000, pp Y. Wng nd A. Perlmn, Blind imge dt hiding bsed on self reference, Pttern Recognition Letters, Vol. 25, 2004, pp C. Jing, M. Yu, S. Shi, X. Liu, nd Y. D. Kim, New blind imge wtermrking in DCT domin, in Proceedings of Interntionl Conference on Signl Processing, Vol. 2, 2002, pp M. K. Mihck nd R. Venktesn, Blind imge wtermrking vi derivtion nd quntiztion of robust semi-globl sttistics, in Proceedings of IEEE Interntionl Conference on Acoustics, Speech, nd Signl Processing, Vol. 4, 2002, pp J. J. Eggers, J. K. Su, nd B. Girod, Robustness of blind imge wtermrking scheme, in Proceedings of IEEE Interntionl Conference on Imge Processing, Vol. 3, 2000, pp Y. Hu, W. Q. Lid, Y. Deng, W. He, nd J. Di, Redble wtermrking lgorithm bsed on wvelet tree quntiztion, in Proceedings of Interntionl Conference on Communictions, Circuits nd Systems, Vol. 1, 2004, pp C. J. Lio nd C. H. Hsieh, A new digitl imge wtermrking method bsed on complementry detectors, in Proceedings of the 17th Conference of Computer Vision, Grphics, nd Imge Processing, Vol. E3-4, C. H. Hsieh, C. J. Lio, nd J. C. Tsi, Anlysis of mplitude ttck in imge wtermrking system, in Proceedings of Interntionl Symposium on Communiction, C. H. Hsieh nd C. J. Lio, A novel imge wtermrking scheme bsed on mplitude ttck, Pttern Recognition, Vol. 40, 2007, pp N. Kewkmnerd nd K. R. Ro, Wvelet bsed imge dptive wtermrking scheme, Electronics Letters, Vol. 36, 2000, pp

13 A BLIND IMAGE WATERMARKING J. J. K. O. Runidh, W. J. Dowling, nd F. M. Bolnd, Phse wtermrking of digitl imges, in Proceedings of IEEE Interntionl Conference on Imge Processing, Vol. 3, 1996, pp Chin-Pn Hung ( ) ws born in 1959 in Tiwn, R.O.C. He received the B.S. nd M.S. degrees in Electricl Engineering from Chung Cheng Institute of Technology, Tiwn, in 1981, in 1985, respectively. In 1996, he received the Ph.D. degree in Electricl Engineering from University of Pittsburgh, Pittsburgh, PA, U.S.A. In , he ws n ssocite scientist of Electronic System Division in Chung Shn Institute of Science nd Technology. He then joined the deprtment of Computer nd Communiction Engineering t Ming Chun University in August 2002, nd is currently n ssistnt professor there. His recent reserch interests include dt compression, computer vision, digitl imge/signl processing, nd pttern recognition. Chi-Jen Lio ( ) ws born in Keelung, Tiwn. He received the mster degree in Deprtment of Informtion Engineering in 2004 from I-Shou University (ISU), Tiwn, R.O.C., where he is currently working towrd the Ph.D. degree. His mjor reserch interests include imge processing, wtermrking, color mngement nd imge qulity evlution. Chur-Heh Hsieh ( ) received Ph.D. degree in Electricl Engineering in 1990 from Chung Cheng Institute of Technology (CCIT), Tiwn, R.O.C. In 1981, He joined the fculty of the Deprtment of Electricl Engineering t CCIT, nd becme professor in From 1996 he joined I-Shou University (ISU) s full professor of Informtion Engineering Deprtment. In 1997, He developed reserch group for video nd imge processing t ISU. From 1999 to 2002, he served s the chirmn of the deprtment. He ws Visiting Scholr in the Deprtment of Electricl Engineering t University of Wshington from Februry to July in From 2007 he joined Ming Chun University s full professor of Computer nd Communiction Engineering Deprtment. His reserch interests include content-bsed imge/video retrievl, sport video nlysis, video understnding, dvnced video coding, imge wtermrking, sttisticl pttern recognition nd visul inspection. He hs published more thn 150 ppers in these subjects. Dr. Hsieh received Grde-A

14 1736 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH Reserch Awrds from Ntionl Science Council eleven times (from 1991 to 2001). In 2002, he received Outstnding Electricl Engineer Awrd, Kohsiung Chpter of The Chinese Institute of Electricl Engineering Society. He is reviewer of IEEE journls nd conferences s well s other leding interntionl journls. He hs served on the progrm committee of severl conferences nd workshops. He is n IEEE senior member. He is fellow of IET.

Driving Cycle Construction of City Road for Hybrid Bus Based on Markov Process Deng Pan1, a, Fengchun Sun1,b*, Hongwen He1, c, Jiankun Peng1, d

Driving Cycle Construction of City Road for Hybrid Bus Based on Markov Process Deng Pan1, a, Fengchun Sun1,b*, Hongwen He1, c, Jiankun Peng1, d Interntionl Industril Informtics nd Computer Engineering Conference (IIICEC 15) Driving Cycle Construction of City Rod for Hybrid Bus Bsed on Mrkov Process Deng Pn1,, Fengchun Sun1,b*, Hongwen He1, c,

More information

Acceptance Sampling by Attributes

Acceptance Sampling by Attributes Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire

More information

A Robust Feature-Based Digital Image Watermarking Scheme

A Robust Feature-Based Digital Image Watermarking Scheme Chpter 6 A Robust Feture-Bsed Digitl Imge Wtermrking Scheme 6.1 Introduction Attcks hve been developed to destroy wtermrks. These ttcks on wtermrks cn roughly be clssified s geometric distortions nd noise-like

More information

Multiscale Fourier Descriptor for Shape Classification

Multiscale Fourier Descriptor for Shape Classification Multiscle Fourier Descriptor for Shpe Clssifiction Iivri Kunttu, een epistö, Juhni Ruhm 2, nd Ari Vis Tmpere University of Technology Institute of Signl Processing P. O. Box 553, FI-330 Tmpere, Finlnd

More information

New data structures to reduce data size and search time

New data structures to reduce data size and search time New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute

More information

Fig. 1. Open-Loop and Closed-Loop Systems with Plant Variations

Fig. 1. Open-Loop and Closed-Loop Systems with Plant Variations ME 3600 Control ystems Chrcteristics of Open-Loop nd Closed-Loop ystems Importnt Control ystem Chrcteristics o ensitivity of system response to prmetric vritions cn be reduced o rnsient nd stedy-stte responses

More information

A Signal-Level Fusion Model for Image-Based Change Detection in DARPA's Dynamic Database System

A Signal-Level Fusion Model for Image-Based Change Detection in DARPA's Dynamic Database System SPIE Aerosense 001 Conference on Signl Processing, Sensor Fusion, nd Trget Recognition X, April 16-0, Orlndo FL. (Minor errors in published version corrected.) A Signl-Level Fusion Model for Imge-Bsed

More information

A New Grey-rough Set Model Based on Interval-Valued Grey Sets

A New Grey-rough Set Model Based on Interval-Valued Grey Sets Proceedings of the 009 IEEE Interntionl Conference on Systems Mn nd Cybernetics Sn ntonio TX US - October 009 New Grey-rough Set Model sed on Intervl-Vlued Grey Sets Wu Shunxing Deprtment of utomtion Ximen

More information

Student Activity 3: Single Factor ANOVA

Student Activity 3: Single Factor ANOVA MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether

More information

SUMMER KNOWHOW STUDY AND LEARNING CENTRE

SUMMER KNOWHOW STUDY AND LEARNING CENTRE SUMMER KNOWHOW STUDY AND LEARNING CENTRE Indices & Logrithms 2 Contents Indices.2 Frctionl Indices.4 Logrithms 6 Exponentil equtions. Simplifying Surds 13 Opertions on Surds..16 Scientific Nottion..18

More information

Continuous Random Variables

Continuous Random Variables STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 217 Néhémy Lim Continuous Rndom Vribles Nottion. The indictor function of set S is rel-vlued function defined by : { 1 if x S 1 S (x) if x S Suppose tht

More information

A New Statistic Feature of the Short-Time Amplitude Spectrum Values for Human s Unvoiced Pronunciation

A New Statistic Feature of the Short-Time Amplitude Spectrum Values for Human s Unvoiced Pronunciation Xiodong Zhung A ew Sttistic Feture of the Short-Time Amplitude Spectrum Vlues for Humn s Unvoiced Pronuncition IAODOG ZHUAG 1 1. Qingdo University, Electronics & Informtion College, Qingdo, 6671 CHIA Abstrct:

More information

New Expansion and Infinite Series

New Expansion and Infinite Series Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University

More information

5.7 Improper Integrals

5.7 Improper Integrals 458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the

More information

Tests for the Ratio of Two Poisson Rates

Tests for the Ratio of Two Poisson Rates Chpter 437 Tests for the Rtio of Two Poisson Rtes Introduction The Poisson probbility lw gives the probbility distribution of the number of events occurring in specified intervl of time or spce. The Poisson

More information

ADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS

ADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS ADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS F. Tkeo 1 nd M. Sk 1 Hchinohe Ntionl College of Technology, Hchinohe, Jpn; Tohoku University, Sendi, Jpn Abstrct:

More information

15. Quantisation Noise and Nonuniform Quantisation

15. Quantisation Noise and Nonuniform Quantisation 5. Quntistion Noise nd Nonuniform Quntistion In PCM, n nlogue signl is smpled, quntised, nd coded into sequence of digits. Once we hve quntised the smpled signls, the exct vlues of the smpled signls cn

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

Hybrid Group Acceptance Sampling Plan Based on Size Biased Lomax Model

Hybrid Group Acceptance Sampling Plan Based on Size Biased Lomax Model Mthemtics nd Sttistics 2(3): 137-141, 2014 DOI: 10.13189/ms.2014.020305 http://www.hrpub.org Hybrid Group Acceptnce Smpling Pln Bsed on Size Bised Lomx Model R. Subb Ro 1,*, A. Ng Durgmmb 2, R.R.L. Kntm

More information

The steps of the hypothesis test

The steps of the hypothesis test ttisticl Methods I (EXT 7005) Pge 78 Mosquito species Time of dy A B C Mid morning 0.0088 5.4900 5.5000 Mid Afternoon.3400 0.0300 0.8700 Dusk 0.600 5.400 3.000 The Chi squre test sttistic is the sum of

More information

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by. NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with

More information

Jin-Fu Li. Department of Electrical Engineering National Central University Jhongli, Taiwan

Jin-Fu Li. Department of Electrical Engineering National Central University Jhongli, Taiwan Trnsprent BIST for RAMs Jin-Fu Li Advnced d Relible Systems (ARES) Lb. Deprtment of Electricl Engineering Ntionl Centrl University Jhongli, Tiwn Outline Introduction Concept of Trnsprent Test Trnsprent

More information

P 3 (x) = f(0) + f (0)x + f (0) 2. x 2 + f (0) . In the problem set, you are asked to show, in general, the n th order term is a n = f (n) (0)

P 3 (x) = f(0) + f (0)x + f (0) 2. x 2 + f (0) . In the problem set, you are asked to show, in general, the n th order term is a n = f (n) (0) 1 Tylor polynomils In Section 3.5, we discussed how to pproximte function f(x) round point in terms of its first derivtive f (x) evluted t, tht is using the liner pproximtion f() + f ()(x ). We clled this

More information

APPROXIMATE INTEGRATION

APPROXIMATE INTEGRATION APPROXIMATE INTEGRATION. Introduction We hve seen tht there re functions whose nti-derivtives cnnot be expressed in closed form. For these resons ny definite integrl involving these integrnds cnnot be

More information

Numerical integration

Numerical integration 2 Numericl integrtion This is pge i Printer: Opque this 2. Introduction Numericl integrtion is problem tht is prt of mny problems in the economics nd econometrics literture. The orgniztion of this chpter

More information

On the Uncertainty of Sensors Based on Magnetic Effects. E. Hristoforou, E. Kayafas, A. Ktena, DM Kepaptsoglou

On the Uncertainty of Sensors Based on Magnetic Effects. E. Hristoforou, E. Kayafas, A. Ktena, DM Kepaptsoglou On the Uncertinty of Sensors Bsed on Mgnetic Effects E. ristoforou, E. Kyfs, A. Kten, DM Kepptsoglou Ntionl Technicl University of Athens, Zogrfou Cmpus, Athens 1578, Greece Tel: +3177178, Fx: +3177119,

More information

Chapter 0. What is the Lebesgue integral about?

Chapter 0. What is the Lebesgue integral about? Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous

More information

A027 Uncertainties in Local Anisotropy Estimation from Multi-offset VSP Data

A027 Uncertainties in Local Anisotropy Estimation from Multi-offset VSP Data A07 Uncertinties in Locl Anisotropy Estimtion from Multi-offset VSP Dt M. Asghrzdeh* (Curtin University), A. Bon (Curtin University), R. Pevzner (Curtin University), M. Urosevic (Curtin University) & B.

More information

1 Module for Year 10 Secondary School Student Logarithm

1 Module for Year 10 Secondary School Student Logarithm 1 Erthquke Intensity Mesurement (The Richter Scle) Dr Chrles Richter showed tht the lrger the energy of n erthquke hs, the lrger mplitude of ground motion t given distnce. The simple model of Richter

More information

Estimation of Binomial Distribution in the Light of Future Data

Estimation of Binomial Distribution in the Light of Future Data British Journl of Mthemtics & Computer Science 102: 1-7, 2015, Article no.bjmcs.19191 ISSN: 2231-0851 SCIENCEDOMAIN interntionl www.sciencedomin.org Estimtion of Binomil Distribution in the Light of Future

More information

Credibility Hypothesis Testing of Fuzzy Triangular Distributions

Credibility Hypothesis Testing of Fuzzy Triangular Distributions 666663 Journl of Uncertin Systems Vol.9, No., pp.6-74, 5 Online t: www.jus.org.uk Credibility Hypothesis Testing of Fuzzy Tringulr Distributions S. Smpth, B. Rmy Received April 3; Revised 4 April 4 Abstrct

More information

Time Truncated Two Stage Group Sampling Plan For Various Distributions

Time Truncated Two Stage Group Sampling Plan For Various Distributions Time Truncted Two Stge Group Smpling Pln For Vrious Distributions Dr. A. R. Sudmni Rmswmy, S.Jysri Associte Professor, Deprtment of Mthemtics, Avinshilingm University, Coimbtore Assistnt professor, Deprtment

More information

Monte Carlo method in solving numerical integration and differential equation

Monte Carlo method in solving numerical integration and differential equation Monte Crlo method in solving numericl integrtion nd differentil eqution Ye Jin Chemistry Deprtment Duke University yj66@duke.edu Abstrct: Monte Crlo method is commonly used in rel physics problem. The

More information

Bernoulli Numbers Jeff Morton

Bernoulli Numbers Jeff Morton Bernoulli Numbers Jeff Morton. We re interested in the opertor e t k d k t k, which is to sy k tk. Applying this to some function f E to get e t f d k k tk d k f f + d k k tk dk f, we note tht since f

More information

Vyacheslav Telnin. Search for New Numbers.

Vyacheslav Telnin. Search for New Numbers. Vycheslv Telnin Serch for New Numbers. 1 CHAPTER I 2 I.1 Introduction. In 1984, in the first issue for tht yer of the Science nd Life mgzine, I red the rticle "Non-Stndrd Anlysis" by V. Uspensky, in which

More information

Construction and Selection of Single Sampling Quick Switching Variables System for given Control Limits Involving Minimum Sum of Risks

Construction and Selection of Single Sampling Quick Switching Variables System for given Control Limits Involving Minimum Sum of Risks Construction nd Selection of Single Smpling Quick Switching Vribles System for given Control Limits Involving Minimum Sum of Risks Dr. D. SENHILKUMAR *1 R. GANESAN B. ESHA RAFFIE 1 Associte Professor,

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

Non-Linear & Logistic Regression

Non-Linear & Logistic Regression Non-Liner & Logistic Regression If the sttistics re boring, then you've got the wrong numbers. Edwrd R. Tufte (Sttistics Professor, Yle University) Regression Anlyses When do we use these? PART 1: find

More information

Chapter 5 : Continuous Random Variables

Chapter 5 : Continuous Random Variables STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 216 Néhémy Lim Chpter 5 : Continuous Rndom Vribles Nottions. N {, 1, 2,...}, set of nturl numbers (i.e. ll nonnegtive integers); N {1, 2,...}, set of ll

More information

Cryptanalysis of Substitution-Permutation Networks Using Key-Dependent Degeneracy *

Cryptanalysis of Substitution-Permutation Networks Using Key-Dependent Degeneracy * Cryptnlysis of Substitution-Permuttion Networks Using Key-Dependent Degenercy * Howrd M. Heys Electricl Engineering, Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Introduction Lecture 3 Gussin Probbility Distribution Gussin probbility distribution is perhps the most used distribution in ll of science. lso clled bell shped curve or norml distribution Unlike the binomil

More information

Math 8 Winter 2015 Applications of Integration

Math 8 Winter 2015 Applications of Integration Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl

More information

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information

Recitation 3: More Applications of the Derivative

Recitation 3: More Applications of the Derivative Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

13: Diffusion in 2 Energy Groups

13: Diffusion in 2 Energy Groups 3: Diffusion in Energy Groups B. Rouben McMster University Course EP 4D3/6D3 Nucler Rector Anlysis (Rector Physics) 5 Sept.-Dec. 5 September Contents We study the diffusion eqution in two energy groups

More information

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior Reversls of Signl-Posterior Monotonicity for Any Bounded Prior Christopher P. Chmbers Pul J. Hely Abstrct Pul Milgrom (The Bell Journl of Economics, 12(2): 380 391) showed tht if the strict monotone likelihood

More information

LECTURE 14. Dr. Teresa D. Golden University of North Texas Department of Chemistry

LECTURE 14. Dr. Teresa D. Golden University of North Texas Department of Chemistry LECTURE 14 Dr. Teres D. Golden University of North Texs Deprtment of Chemistry Quntittive Methods A. Quntittive Phse Anlysis Qulittive D phses by comprison with stndrd ptterns. Estimte of proportions of

More information

Physics 202H - Introductory Quantum Physics I Homework #08 - Solutions Fall 2004 Due 5:01 PM, Monday 2004/11/15

Physics 202H - Introductory Quantum Physics I Homework #08 - Solutions Fall 2004 Due 5:01 PM, Monday 2004/11/15 Physics H - Introductory Quntum Physics I Homework #8 - Solutions Fll 4 Due 5:1 PM, Mondy 4/11/15 [55 points totl] Journl questions. Briefly shre your thoughts on the following questions: Of the mteril

More information

The Properties of Stars

The Properties of Stars 10/11/010 The Properties of Strs sses Using Newton s Lw of Grvity to Determine the ss of Celestil ody ny two prticles in the universe ttrct ech other with force tht is directly proportionl to the product

More information

Review of Calculus, cont d

Review of Calculus, cont d Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some

More information

The use of a so called graphing calculator or programmable calculator is not permitted. Simple scientific calculators are allowed.

The use of a so called graphing calculator or programmable calculator is not permitted. Simple scientific calculators are allowed. ERASMUS UNIVERSITY ROTTERDAM Informtion concerning the Entrnce exmintion Mthemtics level 1 for Interntionl Bchelor in Communiction nd Medi Generl informtion Avilble time: 2 hours 30 minutes. The exmintion

More information

An efficient fractional-pixel motion compensation based on Cubic convolution interpolation

An efficient fractional-pixel motion compensation based on Cubic convolution interpolation Journl of Electricl nd Electronic Engineering 2014; 2(3): 47-54 Published online September 20, 2014 (http://www.sciencepublishinggroup.com/j/jeee) doi: 10.11648/j.jeee.20140203.11 ISSN: 2329-1613 (Print);

More information

THERMAL EXPANSION COEFFICIENT OF WATER FOR VOLUMETRIC CALIBRATION

THERMAL EXPANSION COEFFICIENT OF WATER FOR VOLUMETRIC CALIBRATION XX IMEKO World Congress Metrology for Green Growth September 9,, Busn, Republic of Kore THERMAL EXPANSION COEFFICIENT OF WATER FOR OLUMETRIC CALIBRATION Nieves Medin Hed of Mss Division, CEM, Spin, mnmedin@mityc.es

More information

8 Laplace s Method and Local Limit Theorems

8 Laplace s Method and Local Limit Theorems 8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved

More information

INVESTIGATION OF BURSA, ESKIKARAAGAC USING VERTICAL ELECTRICAL SOUNDING METHOD

INVESTIGATION OF BURSA, ESKIKARAAGAC USING VERTICAL ELECTRICAL SOUNDING METHOD INVESTIGATION OF BURSA, ESKIKARAAGAC USING VERTICAL ELECTRICAL SOUNDING METHOD Gökçen ERYILMAZ TÜRKKAN, Serdr KORKMAZ Uludg University, Civil Engineering Deprtment, Burs, Turkey geryilmz@uludg.edu.tr,

More information

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004 Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when

More information

A Brief Review on Akkar, Sandikkaya and Bommer (ASB13) GMPE

A Brief Review on Akkar, Sandikkaya and Bommer (ASB13) GMPE Southwestern U.S. Ground Motion Chrcteriztion Senior Seismic Hzrd Anlysis Committee Level 3 Workshop #2 October 22-24, 2013 A Brief Review on Akkr, Sndikky nd Bommer (ASB13 GMPE Sinn Akkr Deprtment of

More information

2D1431 Machine Learning Lab 3: Reinforcement Learning

2D1431 Machine Learning Lab 3: Reinforcement Learning 2D1431 Mchine Lerning Lb 3: Reinforcement Lerning Frnk Hoffmnn modified by Örjn Ekeberg December 7, 2004 1 Introduction In this lb you will lern bout dynmic progrmming nd reinforcement lerning. It is ssumed

More information

MATH 144: Business Calculus Final Review

MATH 144: Business Calculus Final Review MATH 144: Business Clculus Finl Review 1 Skills 1. Clculte severl limits. 2. Find verticl nd horizontl symptotes for given rtionl function. 3. Clculte derivtive by definition. 4. Clculte severl derivtives

More information

Chapters 4 & 5 Integrals & Applications

Chapters 4 & 5 Integrals & Applications Contents Chpters 4 & 5 Integrls & Applictions Motivtion to Chpters 4 & 5 2 Chpter 4 3 Ares nd Distnces 3. VIDEO - Ares Under Functions............................................ 3.2 VIDEO - Applictions

More information

Median Filter based wavelet transform for multilevel noise

Median Filter based wavelet transform for multilevel noise Medin Filter bsed wvelet trnsform for multilevel noise H S Shuk Nrendr Kumr *R P Tripthi Deprtment of Computer Science,Deen Dyl Updhy Gorkhpur university,gorkhpur(up) INDIA *Deptrment of Mthemtics,Grphic

More information

I1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3

I1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3 2 The Prllel Circuit Electric Circuits: Figure 2- elow show ttery nd multiple resistors rrnged in prllel. Ech resistor receives portion of the current from the ttery sed on its resistnce. The split is

More information

Electron Correlation Methods

Electron Correlation Methods Electron Correltion Methods HF method: electron-electron interction is replced by n verge interction E HF c E 0 E HF E 0 exct ground stte energy E HF HF energy for given bsis set HF Ec 0 - represents mesure

More information

a * a (2,1) 1,1 0,1 1,1 2,1 hkl 1,0 1,0 2,0 O 2,1 0,1 1,1 0,2 1,2 2,2

a * a (2,1) 1,1 0,1 1,1 2,1 hkl 1,0 1,0 2,0 O 2,1 0,1 1,1 0,2 1,2 2,2 18 34.3 The Reciprocl Lttice The inverse of the intersections of plne with the unit cell xes is used to find the Miller indices of the plne. The inverse of the d-spcing etween plnes ppers in expressions

More information

CALCULATED POWDER X-RAY DIFFRACTION LINE PROFILES VIA ABSORPTION

CALCULATED POWDER X-RAY DIFFRACTION LINE PROFILES VIA ABSORPTION 16 17 CALCULATED POWDER X-RAY DFFRACTON LNE PROFLES VA ABSORPTON Keji Liu nd Heifen Chen School of Mteril Science nd Engineering, Shnghi nstitute of Technology, Shnghi, Chin 2233 ABSTRACT We hve clculted

More information

Solution for Assignment 1 : Intro to Probability and Statistics, PAC learning

Solution for Assignment 1 : Intro to Probability and Statistics, PAC learning Solution for Assignment 1 : Intro to Probbility nd Sttistics, PAC lerning 10-701/15-781: Mchine Lerning (Fll 004) Due: Sept. 30th 004, Thursdy, Strt of clss Question 1. Bsic Probbility ( 18 pts) 1.1 (

More information

Synoptic Meteorology I: Finite Differences September Partial Derivatives (or, Why Do We Care About Finite Differences?

Synoptic Meteorology I: Finite Differences September Partial Derivatives (or, Why Do We Care About Finite Differences? Synoptic Meteorology I: Finite Differences 16-18 September 2014 Prtil Derivtives (or, Why Do We Cre About Finite Differences?) With the exception of the idel gs lw, the equtions tht govern the evolution

More information

Chapter 14. Matrix Representations of Linear Transformations

Chapter 14. Matrix Representations of Linear Transformations Chpter 4 Mtrix Representtions of Liner Trnsformtions When considering the Het Stte Evolution, we found tht we could describe this process using multipliction by mtrix. This ws nice becuse computers cn

More information

UNIT 1 FUNCTIONS AND THEIR INVERSES Lesson 1.4: Logarithmic Functions as Inverses Instruction

UNIT 1 FUNCTIONS AND THEIR INVERSES Lesson 1.4: Logarithmic Functions as Inverses Instruction Lesson : Logrithmic Functions s Inverses Prerequisite Skills This lesson requires the use of the following skills: determining the dependent nd independent vribles in n exponentil function bsed on dt from

More information

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 203 Outline Riemnn Sums Riemnn Integrls Properties Abstrct

More information

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature CMDA 4604: Intermedite Topics in Mthemticl Modeling Lecture 19: Interpoltion nd Qudrture In this lecture we mke brief diversion into the res of interpoltion nd qudrture. Given function f C[, b], we sy

More information

Research on the Quality Competence in Manufacturing Industry

Research on the Quality Competence in Manufacturing Industry Reserch on the Qulity Competence in Mnufcturing Industry Xioping M, Zhijun Hn Economics nd Mngement School Nnjing University of Science nd Technology Nnjing 210094, Chin Tel: 86-25-8431-5400 E-mil: hnzhij4531@sin.com

More information

Genetic Programming. Outline. Evolutionary Strategies. Evolutionary strategies Genetic programming Summary

Genetic Programming. Outline. Evolutionary Strategies. Evolutionary strategies Genetic programming Summary Outline Genetic Progrmming Evolutionry strtegies Genetic progrmming Summry Bsed on the mteril provided y Professor Michel Negnevitsky Evolutionry Strtegies An pproch simulting nturl evolution ws proposed

More information

Equations and Inequalities

Equations and Inequalities Equtions nd Inequlities Equtions nd Inequlities Curriculum Redy ACMNA: 4, 5, 6, 7, 40 www.mthletics.com Equtions EQUATIONS & Inequlities & INEQUALITIES Sometimes just writing vribles or pronumerls in

More information

Sufficient condition on noise correlations for scalable quantum computing

Sufficient condition on noise correlations for scalable quantum computing Sufficient condition on noise correltions for sclble quntum computing John Presill, 2 Februry 202 Is quntum computing sclble? The ccurcy threshold theorem for quntum computtion estblishes tht sclbility

More information

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system.

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system. Section 24 Nonsingulr Liner Systems Here we study squre liner systems nd properties of their coefficient mtrices s they relte to the solution set of the liner system Let A be n n Then we know from previous

More information

Entropy ISSN

Entropy ISSN Entropy 006, 8[], 50-6 50 Entropy ISSN 099-4300 www.mdpi.org/entropy/ ENTROPY GENERATION IN PRESSURE GRADIENT ASSISTED COUETTE FLOW WITH DIFFERENT THERMAL BOUNDARY CONDITIONS Abdul Aziz Deprtment of Mechnicl

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties

More information

CHM Physical Chemistry I Chapter 1 - Supplementary Material

CHM Physical Chemistry I Chapter 1 - Supplementary Material CHM 3410 - Physicl Chemistry I Chpter 1 - Supplementry Mteril For review of some bsic concepts in mth, see Atkins "Mthemticl Bckground 1 (pp 59-6), nd "Mthemticl Bckground " (pp 109-111). 1. Derivtion

More information

Natural examples of rings are the ring of integers, a ring of polynomials in one variable, the ring

Natural examples of rings are the ring of integers, a ring of polynomials in one variable, the ring More generlly, we define ring to be non-empty set R hving two binry opertions (we ll think of these s ddition nd multipliction) which is n Abelin group under + (we ll denote the dditive identity by 0),

More information

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite

More information

Applicable Analysis and Discrete Mathematics available online at

Applicable Analysis and Discrete Mathematics available online at Applicble Anlysis nd Discrete Mthemtics vilble online t http://pefmth.etf.rs Appl. Anl. Discrete Mth. 4 (2010), 23 31. doi:10.2298/aadm100201012k NUMERICAL ANALYSIS MEETS NUMBER THEORY: USING ROOTFINDING

More information

Generalized Fano and non-fano networks

Generalized Fano and non-fano networks Generlized Fno nd non-fno networks Nildri Ds nd Brijesh Kumr Ri Deprtment of Electronics nd Electricl Engineering Indin Institute of Technology Guwhti, Guwhti, Assm, Indi Emil: {d.nildri, bkri}@iitg.ernet.in

More information

Adding and Subtracting Rational Expressions

Adding and Subtracting Rational Expressions 6.4 Adding nd Subtrcting Rtionl Epressions Essentil Question How cn you determine the domin of the sum or difference of two rtionl epressions? You cn dd nd subtrct rtionl epressions in much the sme wy

More information

Effects of peripheral drilling moment on delamination using special drill bits

Effects of peripheral drilling moment on delamination using special drill bits journl of mterils processing technology 01 (008 471 476 journl homepge: www.elsevier.com/locte/jmtprotec Effects of peripherl illing moment on delmintion using specil ill bits C.C. Tso,, H. Hocheng b Deprtment

More information

Shear Degradation and Possible viscoelastic properties of High Molecular Weight Oil Drag Reducer Polymers

Shear Degradation and Possible viscoelastic properties of High Molecular Weight Oil Drag Reducer Polymers ANNUAL TRANSACTIONS OF THE NORDIC RHEOLOGY SOCIETY, VOL. 3, 2005 Sher Degrdtion nd Possible viscoelstic properties of High Moleculr Weight Oil Drg Reducer Polymers A.A. Hmoud, C. Elissen, C. Idsøe nd T.

More information

Basic model for traffic interweave

Basic model for traffic interweave Journl of Physics: Conference Series PAPER OPEN ACCESS Bsic model for trffic interweve To cite this rticle: Ding-wei Hung 25 J. Phys.: Conf. Ser. 633 227 Relted content - Bsic sciences gonize in Turkey!

More information

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response

More information

CBE 291b - Computation And Optimization For Engineers

CBE 291b - Computation And Optimization For Engineers The University of Western Ontrio Fculty of Engineering Science Deprtment of Chemicl nd Biochemicl Engineering CBE 9b - Computtion And Optimiztion For Engineers Mtlb Project Introduction Prof. A. Jutn Jn

More information

Probability Distributions for Gradient Directions in Uncertain 3D Scalar Fields

Probability Distributions for Gradient Directions in Uncertain 3D Scalar Fields Technicl Report 7.8. Technische Universität München Probbility Distributions for Grdient Directions in Uncertin 3D Sclr Fields Tobis Pfffelmoser, Mihel Mihi, nd Rüdiger Westermnn Computer Grphics nd Visuliztion

More information

Matching patterns of line segments by eigenvector decomposition

Matching patterns of line segments by eigenvector decomposition Title Mtching ptterns of line segments y eigenvector decomposition Author(s) Chn, BHB; Hung, YS Cittion The 5th IEEE Southwest Symposium on Imge Anlysis nd Interprettion Proceedings, Snte Fe, NM., 7-9

More information

An approximation to the arithmetic-geometric mean. G.J.O. Jameson, Math. Gazette 98 (2014), 85 95

An approximation to the arithmetic-geometric mean. G.J.O. Jameson, Math. Gazette 98 (2014), 85 95 An pproximtion to the rithmetic-geometric men G.J.O. Jmeson, Mth. Gzette 98 (4), 85 95 Given positive numbers > b, consider the itertion given by =, b = b nd n+ = ( n + b n ), b n+ = ( n b n ) /. At ech

More information

Motion of Electrons in Electric and Magnetic Fields & Measurement of the Charge to Mass Ratio of Electrons

Motion of Electrons in Electric and Magnetic Fields & Measurement of the Charge to Mass Ratio of Electrons n eperiment of the Electron topic Motion of Electrons in Electric nd Mgnetic Fields & Mesurement of the Chrge to Mss Rtio of Electrons Instructor: 梁生 Office: 7-318 Emil: shling@bjtu.edu.cn Purposes 1.

More information

Physics 116C Solution of inhomogeneous ordinary differential equations using Green s functions

Physics 116C Solution of inhomogeneous ordinary differential equations using Green s functions Physics 6C Solution of inhomogeneous ordinry differentil equtions using Green s functions Peter Young November 5, 29 Homogeneous Equtions We hve studied, especilly in long HW problem, second order liner

More information

Numerical Analysis: Trapezoidal and Simpson s Rule

Numerical Analysis: Trapezoidal and Simpson s Rule nd Simpson s Mthemticl question we re interested in numericlly nswering How to we evlute I = f (x) dx? Clculus tells us tht if F(x) is the ntiderivtive of function f (x) on the intervl [, b], then I =

More information

Lecture 14: Quadrature

Lecture 14: Quadrature Lecture 14: Qudrture This lecture is concerned with the evlution of integrls fx)dx 1) over finite intervl [, b] The integrnd fx) is ssumed to be rel-vlues nd smooth The pproximtion of n integrl by numericl

More information