A Blind Image Watermarking Based on Dual Detector *
|
|
- Arthur Murphy
- 6 years ago
- Views:
Transcription
1 JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 25, (2009) A Blind Imge Wtermrking Bsed on Dul Detector * CHIN-PAN HUANG 1, CHI-JEN LIAO 2 AND CHAUR-HEH HSIEH 1 1 Deprtment of Computer nd Communiction Engineering Ming Chun University Toyun, 333 Tiwn 2 Deprtment of Informtion Engineering I-Shou University Kohsiung, 840 Tiwn This pper presents blind imge wtermrking technique bsed on novel detection scheme which contins two detectors iming t the positive ttck nd negtive ttck, respectively. The nlysis on signl processing ttck indictes tht there exist unrelible trnsformed coefficients in the ttcked imge which result in errors of the extrction of wtermrk dt. The novel detection scheme removes the unrelible trnsformed coefficients nd employs the remining relible coefficients for the extrction of embedded wtermrk. The experimentl results indicte the proposed technique improves robustness significntly, s compred to the existing single detector scheme. Keywords: imge wtermrking, ttcks, discrete cosine trnsform, robustness, dul detector 1. INTRODUCTION Digitl wtermrking cn prove to be useful to void the illegl use of digitl medi. Generlly, it cn be clssified into two types: robust wtermrking nd frgile wtermrking. The requirements for robust wtermrking re trnsprency, robustness, security, cpcity, universlity, nd unmbiguousness [1]. Among them, trnsprency nd robustness re most importnt. Trnsprency refers to the perceptul qulity of the imge being protected. In other words, the wtermrk should be invisible over the originl imge. Robustness refers to the bility to detect the wtermrk fter unintentionl ttck, i.e., common signl processing opertions [2]. The technique presented in this pper belongs to the robust type. Depending upon work domin tht wtermrk is embedded in, wtermrking techniques cn be clssified into two ctegories: sptil domin nd trnsform domin [3-15]. Recent efforts re mostly bsed on trnsform-domin becuse it offers better robustness. According to whether the host signl is needed or not during the detection, wtermrking technique cn be roughly ctegorized into two types: non-blind nd blind [16]. Non-blind method requires the originl host in the detection end, wheres blind one does not. The blind methods re more useful thn non-blind becuse the host imge my be not vilble in rel-world scenrios. Generlly, blind methods re often less robust nd lso hrder to implement thn non-blind ones. Mny blind imge wtermrking schemes [16-22] hve been presented recently. Received Februry 26, 2008; revised June 9 & August 4, 2008; ccepted August 22, Communicted by H. Y. Mrk Lio. * This pper ws prtilly supported by the Ntionl Science Council of Tiwn, R.O.C., No. NSC E
2 1724 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH The existing blind schemes cn be roughly clssified into three types [16]: () correltion-bsed; (b) bsed on bsolute modultion of individul primry or secondry elements of n imge; (c) bsed on reltive modultion of pir elements. Most of these schemes focus on embedding strtegy. In ddition, they do not exploit the chrcteristics of the ttcks. In this work, we im t the design of n efficient detection scheme tht tkes signl processing ttcks into ccount. Detection is n inverse process of embedding. Most detection schemes of trnsform-domin wtermrking in the literture use ll trnsformed coefficients of the test ttcked imge to extrct wtermrk. In this pper, the nlysis on the ttcked imges indictes tht there re unrelible trnsformed coefficients which would yield the extrction error of wtermrk dt. To ttck the problem, we develop new detection scheme tht removes the unrelible trnsformed coefficients. The new detection contins two detectors tht re bsed on positive ttck (PA) nd negtive ttck (NA), which re obtined through nlyses nd experiments. The proposed dul-detector scheme is different from the cocktil wtermrking [15] which lso employs two detectors. The cocktil wtermrking is non-blind scheme which embeds two complementry wtermrks, clled positive hiding (PH) nd negtive hiding (NH), into the host imge simultneously. In detection, two corresponding detectors re used to extrct PH nd NH wtermrks. In such cse, t lest one wtermrk survives when ny ttcks occurs. Therefore, the missed detection rte will be reduced nd thus improving robustness significntly. However, if no wtermrk is embedded into the host imge nd the imge suffers from positive ttck or negtive ttck, our previous study [23-25] indicte tht cocktil method will introduce high flse lrm rte. Unlike the cocktil method, in this work we embed only one wtermrk, nd design two detectors to rise the detection rte of wtermrk. These two detectors re minly bsed on chrcteristics of ttcks, which re not directly relted to the embedding scheme like cocktil pproch. The other difference between the cocktil method nd this work is the cocktil scheme [15] is non-blind one. The remining sections re orgnized s follows. The proposed wtermrking system is described in section 2. A single detector lgorithm is first presented. Then novel dul detector scheme bsed on ttck chrcteristics is developed. In section 3, experimentl results with single detector nd our dul detector methods re provided. The conclusions re drwn in section PROPOSED BLIND WATERMARKING The proposed wtermrking system is shown in Fig. 1. The host imge is trnsformed by full-domin DCT. The DC coefficient is discrded, nd the remining twodimensionl AC coefficients re converted into one-dimensionl coefficient sequence F(k) vi zig-zg scnning. The binry wtermrk is embedded into the coefficient sequence. In the detection end, the received wtermrked imge is trnsformed with DCT s in the embedding end, nd the resulting AC coefficients re fed into positive-ttck detector nd negtive-ttck detector simultneously. The lrger response of the two detectors is input to thresholding device. If it is greter thn the detection threshold ρ t, we clim tht the wtermrk exists; otherwise, the wtermrk does not exist. The designs of embedding nd detection re performed on the bove AC coefficient sequence, nd the design detils re described in the following.
3 A BLIND IMAGE WATERMARKING 1725 () Embedding. (b) Detection. Fig. 1. Proposed blind wtermrking system. 2.1 Embedding We clculte reference (estimte) sequence from the AC coefficient sequence F(k) by slide window of (2m + 1); i.e. m F( k) = sign( F( k)) 1 F( k+ j). (1) (2 + 1) m j= m In this work, the slide window length is 5 (m = 2). The binry wtermrk W i is embedded by the following rule: F ( k) = F( k) + sign( W ) α F( k) (2) m i where α is hiding fctor with the vlue between 0 nd 1 (in this work, α = 0.5), sign(x) is sign function, nd F m (k) is the resulting signl with wtermrk embedded. In Eq. (2), if the wtermrk bit to be embedded is 1, F m (k) is the sum of the reference Fk ( ) nd positive embedded energy α F( k) ; otherwise, if the wtermrk bit is 1, F m (k) is the difference of the reference nd α F( k). In detection, the wtermrk cn be esily extrcted by e m m W () i = sign( F ( k) F ( k)). (3) More specificlly, if Fm( k) > Fm( k), the extrcted wtermrk bit is 1; otherwise it is 1. In the bove eqution, Fm ( k ) is the DCT coefficient sequence of the test imge which suffered from ttck; Fm ( k ) is its corresponding reference coefficient sequence, which is clculted using the estimtion scheme in Eq. (1). The bove detection scheme hs been widely used in most blinding wtermrking techniques, which doesn t consider the
4 1726 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH ttck chrcteristics. It employs one detector only, so we refer to it s single detector for comprison purpose. In generl, the length of wtermrk sequence, B L, is much smller thn tht of the medi to be embedded (the AC coefficient sequence), M L. To increse the security nd prevent interction between the successive embedded dt, we expnd rndomly the originl binry wtermrk strem, sequence of {+ 1, 1}, into ternry strem, sequence of {+ 1, 1, 0}. The coefficients corresponding to the symbol 0 re not embedded with wtermrk messge. The length of the ternry strem, T L, is obtined ccording to the rnge of the AC coefficient to be hidden. T L is lrger thn B L but smller thn M L. Fig. 2 illustrtes the pseudo-rndom expnsion using simple exmple, in which wtermrk sequence with length of 3 bits is mpped into ternry strem with length of 10 symbols. It is seen tht the originl wtermrk bits re permuted in the ternry strem. Through this mnner, short wtermrk sequence cn be embedded in long AC coefficient sequence in pseudo-rndom wy, which is controlled by key. Binry wtermrk { 1, + 1} W 0 W 1 W 2 Ternry sequennce{0, 1, + 1} 0 W W W 2 0 Fig. 2. Wtermrk expnsion from binry symbol to ternry symbol. 2.2 Detection As mentioned erlier, detection is n inverse process of embedding. Thus it does not consider the chrcteristics of the ttcks. This pper ims to develop new detection scheme which tkes ttcks into ccount. The ttcks cn be clssified into three ctegories: positive ttck (PA), negtive ttck (NA) nd hybrid ttck (HA) nd they re not imge dependent. Note tht the hybrid (rndom) ttck cn be regrded s combintion of positive nd negtive ttck. The detils of chrcteristics of these ttcks cn be found in our previous works [23-25]. The new scheme ctegorizes the ttcks into positive ttck (PA) nd negtive ttck (NA) nd then design two detectors ccordingly. We cll the detection scheme s dul detector for convenience. The scheme is designed minly bsed on the nlysis of the typicl imge processing ttcks in Tble 1. The ttcks correspond to the signl processing ctegory (noise nd convo filter) of StirMrk benchmrk [21]. Here we summrize the chrcteristics of the ttcks in the following, which re relted directly to this work. The detils cn be found in [24, 25]. Ech signl processing ttck yields in both positive modultion (PM) nd negtive modultion (NM) to the host imge [15, 23-25]. PM (NM) denotes tht the mgnitude of n AC coefficient of the ttcked imge is greter (less) thn tht of the unttcked imge. To chrcterize the ttcks, we employed two mesures to investigte the chrcteristics of the AC coefficient sequence F(k). One is the verge coefficient mgnitude chnge rtio (AMR) before nd fter ttck, nd the other is occurrence frequency (OF) before nd fter ttck. The former mesures the verge ttck energy for whole imge, nd
5 A BLIND IMAGE WATERMARKING 1727 Tble 1. Imge processing ttcks. Imge Processing Functions nd clssifictions 01- Averge (7 7) NA 08- Enhnce Edges (75) PA 02- Blur (75) NA 09- Enhnce Focus PA 03- Gussin Blur (7 7) NA 10- Focus Restortion PA 04- Soften (75) NA 11- Shrpen (50) PA 05- JPEG compression (75) NA 12- Rndom Noise (±16) HA 06- JPEG compression (25) NA 13- Rndom Noise (±8) HA 07- Enhnce Detil PA AMR PA NA AC Coefficient Set 100 () AMR OF (%) 50 PA NA AC Coefficient Set (b) OF. Fig. 3. Results of shrpening opertion.
6 1728 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH AMR PA NA AC Coefficient Unit 100 () AMR OF(%) 50 PA NA AC Coefficient Set (b) OF. Fig. 4. Results of JPEG compression. the lter evlutes the number of coefficients ttcked (clled ttck frequency). Fig. 3 shows the two mesures when imges re suffered from shrpening ttck. The figure compres the two mesures for PM nd NM, respectively. It is obvious tht for the shrpening opertion, PM domintes both in ttck energy nd ttck frequency. Therefore, it is clssified s positive ttck. On the contrry, s seen in Fig. 4, for JPEG compression, NM domintes, thus it is regrded s negtive ttck. Using the two mesures, ll signl processing ttcks cn be clssified. Positive ttck will move the embedded coefficients wy from the reference vlue. Thus the ttcked signl is more robust to noise thn the unttcked one. So positive t-
7 A BLIND IMAGE WATERMARKING 1729 tck is helpful for extrction of wtermrk. On the contrry, negtive ttck will pull embedded coefficients such tht they re close to the reference vlue. In this cse, even smll noise my cuse the signl jumping from bove (or below) reference to below (bove) reference, which yield the error of extrction of wtermrk. The dynmic rnge (the difference between positive reference nd negtive reference) becomes lrger fter positive ttck nd smller fter negtive ttck. Furthermore, for negtive ttck, when ttck energy is high, ll the coefficients my be reduced to pproximte zero vlue. In such cse, the detection of wtermrk would fil. So, it is resonble to sy tht if the vlue of coefficient is very smll, the coefficient is probbly suffered from lrge negtive ttck. Therefore, it is not relible nd should not be used for the detection. As mentioned before, some of the coefficients of the ttcked imge re not relible. The unrelible coefficients should not be included for wtermrk extrction; otherwise, it will yield errors of extrction. In this work, we present novel detection scheme tht removes the unrelible coefficients nd uses the remining relible coefficients for extrction of wtermrk. It contins two detectors tht exploit the chrcteristics of positive ttck nd negtive ttcks, respectively. 2.3 Dul Detector For convenience, we define n ttck mgnitude devition rtio s R(k) = ( Fm ( k) Fm()/ k Fm(). k If no ttck exists, it is esy to obtin R(k) = α from Eq. (2). Therefore, if R(k) > α we cn sy tht positive ttck occurs; otherwise, negtive ttck occurs when R(k) < α. The decision rule is suited for the idel cse in which the reference Fm ( k ) is fixed vlue. However, our investigtion indictes tht Fm ( k ) my fluctute slightly with different k nd different ttcks. To void the clssifiction error of ttck types, we nrrow down the PA rnge by introducing the prmeter β which is lrger thn α. Specificlly, if R(k) > β (β > α), the ttck is regrded s positive. Bsed on the concept, we design detector for extrcting the coefficients suffered from positive ttck s follows. Unlike most techniques in the literture, the detectors of our technique re designed ccording to the types of mplitude ttcks mentioned bove, rther thn the corresponding embedding scheme. Positive Attck Detector: The wtermrk is extrcted by 1, if R( k) > β nd sign( Fm( k) Fm( k)) = sign( Fm( k)) > 0 e Wp () i = 1, if R( k) > β nd sign( F ( ) ( )) sign( ( )) 0. m k Fm k = Fm k < 0, otherwise (4) The rule in the top line of Eq. (4) is for positive coefficients (the sign of the coefficient is positive) of the received signl, wheres the rule in the middle line is for negtive coefficients. The extrcted wtermrk bits for unrelible coefficients re set to zero (bottom line of Eq. (4)) such tht they re useless in the clcultion of detection response. The
8 1730 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH ction is equivlent to removing the unrelible coefficients for detection of wtermrk. The extrcted wtermrk bits for the relible coefficients re + 1 or 1. It is obvious tht the detector output contins three symbols: + 1, 1, nd 0. This is unlike the conventionl detection scheme in which two symbols (+ 1 nd 1) re employed. The detector response (normlized correltion) between the originl wtermrk strem nd extrcted wtermrk strem under positive ttck is defined s ρ e e p mm, p W Wp = e p Wi () W () i (, ). Wi ( ) W( i) (5) The denomintor is the totl number symbols of + 1 nd 1 extrcted. As mentioned before, negtive ttck my mke the R very smll, or the reference vlue close to zero. In either cse, the extrction of wtermrk is unrelible becuse it is sensitive to noise. In order to rise the relibility of wtermrk extrction, we remove the unrelible coefficients tht stisfy R(k) < ε or Fm ( k) < σ, nd thus obtin the negtive ttck detector in the following. Negtive Attck Detector: The wtermrk is extrcted by e sign( F ( ) ( )), if ( ) nd ( ) () m k Fm k ε R k β Fm k σ Wn i = < < >. 0, otherwise (6) Like the positive ttck detector, the bottom line in Eq. (6) is used to remove the unrelible coefficients. The detector output lso contins three symbols: + 1, 1, nd 0. The normlized correltion between the originl wtermrk strem nd extrcted wtermrk strem under negtive ttck is defined s ρ mm,n, using the sme eqution s in Eq. (5) but replcing the positive extrction prmeter W () i with W (). i The lrger of the bove two detection responses, mx{ρ mm,p, ρ mm,n }, is used to judge whether the wtermrk is present or bsent by compring it with predefined detection threshold (ρ t in Fig. 1). If it is greter thn the threshold, the wtermrk exists; otherwise, it doesn t exist. It is seen from Eq. (4) tht if β is set higher, more coefficients would be regrded s unrelible; consequently, it my reduce flse lrm rte, wheres increse missed detection rte. On the other hnd, if β is set lower, fewer coefficients would be regrded s unrelible, which my increse flse lrm rte while reduce missed detection rte. Thus, the vlue of β is determined by tking the compromise of flse lrm nd missed detection. Similr conclusion is pplied for the determintion of the vlues of ε nd σ in Eq. (6). In ddition, the vlues of prmeters ε nd β depend on the vlue of α. The reltionship is hrd to chieve theoreticlly. Our experience indictes tht β 1.25α nd ε 0.75α re good choices. In ddition, the threshold σ is determined experimentlly nd σ = 20 is lso good choice. e p e n
9 A BLIND IMAGE WATERMARKING SIMULATIONS The experiments re conducted on 50 test imges with size of from IM- AGEMORE Coopertion [22]. A binry wtermrk length with length of 1024 is obtined by generting zero-men pseudo-rndom sequence with length of 1024, nd then tking the sign of ech dt point of the sequence. The binry wtermrk is expnded into ternry strem with length , nd then modulted into the host imges. Thirteen types of imge processing ttcks (listed in Tble 1) including positive (e.g., shrpening), negtive (e.g., blurring) nd hybrid ttcks, re pplied to the test imges, respectively, nd thus totlly 650 ttcked imges re obtined. The hiding fctor is chosen s α = 0.5, which yields good embedded picture qulity. Fig. 5 demonstrtes some typicl imges embedded with wtermrks. The detection prmeters ε nd β re chosen experimentlly s ε = 0.2 nd β = 0.7. Note tht the mgnitude of n AC coefficient is generlly relted to its frequency bnd. The smll coefficient corresponds to higher frequency bnd nd its effect is t the detil of n imge. Although the smll coefficient in lower bnd my chnge reltive lrge vlue, it is very rre from experiences of our experiments. It is cler tht the smll coefficient cuses very limited effect on qulity of the wtermrked imge so tht the imge qulity cn be gurnteed. Fig. 5. Typicl imges embedded with wtermrk. The test imges re used to evlute the single detector nd our proposed dul detector scheme. The comprison of the two detection schemes is in terms of flse negtive rte (missed detection rte) nd flse positive rte (flse lrm rte). The former corresponds to robustness, nd the lter to flse lrm. The two performnces conflict ech other. More specificlly, in detection, when the detection threshold (ρ t in Fig. 1) is set higher, the flse lrm rte cn be reduced, but the flse negtive rte will become higher. In rel pplictions, compromise needs to be tken by choosing n pproprite detec-
10 1732 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH tion threshold vlue. Becuse the two mesures conflict, we use the totl error rte (the sum of the two error rtes) s the performnce metric. The smller the totl error rte, the better the system performnce. Tble 2 lists the totl error rtes of the two schemes for vrious vlues of detection threshold. It indictes the totl error rte of our dul detector scheme is less thn one hlf of the single detector scheme. The result cn be confirmed from ROC (receiver operting curve) performnce comprison in Fig. 6. Tble 2. Performnce comprison of single detector nd dul detector under vrious threshold vlues. Threshold vlues Methods Single Detector Dul Detector Criteri Missed detection rte Flse lrm rte Totl error rte Missed detection rte Flse lrm rte Totl error rte Fig. 6. The ROC performnces of single detector nd dul detector. Fig. 7. The error rtes vs. detection threshold vlues for single detector. Fig. 8. The error rtes vs. detection threshold vlues for dul detector.
11 A BLIND IMAGE WATERMARKING 1733 Figs. 7 nd 8 show the curves of the two error rtes under vrious detection threshold vlues. The figures provide the cue for the selection of pproprite threshold vlues to meet the requirements of users. It is seen from Fig. 8 tht if threshold is set in the rnge of 0.2 to 0.3, the dul detector gives pproximte zero missed detection nd flse lrm rtes. However, Fig. 8 indictes tht the single detector definitely yields errors (either missed detection or flse lrm or both) whtever the threshold vlues re chosen. Obviously, the dul detector is better thn single detector even from the viewpoint of threshold selection. 4. CONCLUSIONS A blind imge wtermrking technique bsed on the chrcteristics of mplitude ttcks hs been proposed. In the novel method, two detectors re designed which im t extrcting relible trnsformed coefficients under positive ttck nd negtive ttck, respectively. The removl of unrelible coefficients is very useful to reduce the error of wtermrk extrction. The results indicte tht our scheme performs much better thn the single detector tht uses ll the trnsformed coefficients nd does not consider the ttck chrcteristics. The system presented here is just for demonstrting the benefit of the novel detection scheme. It could be pplied to other trnsformtions such s discrete wvelet trnsform [26, 27]. Furthermore, the proposed detection scheme cn be pplied to ny existing wtermrking systems to further improve their performnces. The mjor limittion of our scheme is tht the determintion of prmeters vlues is performed experimentlly. An utomtic clcultion mechnism for the prmeters my be worth further investigting in the future. REFERENCES 1. F. Hrtung nd M. Kutter, Multimedi wtermrking techniques, Proceedings of IEEE, Vol. 87, 1999, pp I. J. Cox, M. L. Miller, nd J. A. Bloom, Digitl Wtermrking, Morgn Kufmnn Publishers, Los Altos, CA, S. Ktzenbeisser nd F. A. P. Petitcols, Informtion Hiding Techniques for Stegnogrphy nd Digitl Wtermrking, Artech House, Boston, London, M. Bender, D. Gruhl, N. Morimoto, nd A. Lu, Techniques for dt hiding, IBM System Journl, Vol. 35, 1996, pp N. Nikolidis nd I. Pits, Copyright protection of imges using robust digitl signtures, in Proceedings of IEEE Interntionl Conference on Acoustics, Speech, nd Signl Processing, 1996, pp R. B. Wolfgng nd E. J. Delp, A wtermrk for digitl imges, in Proceedings of Interntionl Conference on Imge Processing, Vol. 3, 1996, pp I. J. Cox, J. Kilin, F. T. Leighton, nd T. Shmoon, Secure spred spectrum wtermrking for multimedi, IEEE Trnsctions on Imge Processing, Vol. 6, 1997, pp C. I. Podilchuk nd W. Zeng, Imge-dptive wtermrking using visul models,
12 1734 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH IEEE Journl on Selected Ares in Communictions, Vol. 16, 1998, pp A. Piv, M. Brni, E. Brtoloni, nd V. Cppellini, DCT-bsed wtermrking recovering without resorting to the uncorrupted originl imge, in Proceedings of IEEE Interntionl Conference on Imge Processing, Vol. 1, 1997, pp C. T. Hsu nd J. L. Wu, Multiresolution wtermrking for digitl imges, IEEE Trnsctions on Circuits nd Systems II: Anlog nd Digitl Signl Processing, Vol. 45, 1998, pp S. H. Wng nd Y. P. Lin, Wvelet tree quntiztion for copyright protection, IEEE Trnsctions on Imge Processing, Vol. 13, 2004, pp C. S. Lu nd H. Y. M. Lio, Multipurpose wtermrking for imge uthentiction nd protection, IEEE Trnsctions on Imge Processing, Vol. 10, 2001, pp C. W. Tng nd H. M. Hng, A feture-bsed robust digitl imge wtermrking scheme, IEEE Trnsctions on Signl Processing, Vol. 51, 2003, pp A. M. Ahmed nd D. D. Dy, Applictions of the nturlness preserving trnsform to imge wtermrking nd dt hiding, Digitl Signl Processing, Vol. 14, 2004, pp C. S. Lu, C. J. Sze, nd H. Y. M. Lio, Cocktil wtermrking for digitl imge protection, IEEE Trnsctions on Multimedi, Vol. 2, 2000, pp Y. Wng nd A. Perlmn, Blind imge dt hiding bsed on self reference, Pttern Recognition Letters, Vol. 25, 2004, pp C. Jing, M. Yu, S. Shi, X. Liu, nd Y. D. Kim, New blind imge wtermrking in DCT domin, in Proceedings of Interntionl Conference on Signl Processing, Vol. 2, 2002, pp M. K. Mihck nd R. Venktesn, Blind imge wtermrking vi derivtion nd quntiztion of robust semi-globl sttistics, in Proceedings of IEEE Interntionl Conference on Acoustics, Speech, nd Signl Processing, Vol. 4, 2002, pp J. J. Eggers, J. K. Su, nd B. Girod, Robustness of blind imge wtermrking scheme, in Proceedings of IEEE Interntionl Conference on Imge Processing, Vol. 3, 2000, pp Y. Hu, W. Q. Lid, Y. Deng, W. He, nd J. Di, Redble wtermrking lgorithm bsed on wvelet tree quntiztion, in Proceedings of Interntionl Conference on Communictions, Circuits nd Systems, Vol. 1, 2004, pp C. J. Lio nd C. H. Hsieh, A new digitl imge wtermrking method bsed on complementry detectors, in Proceedings of the 17th Conference of Computer Vision, Grphics, nd Imge Processing, Vol. E3-4, C. H. Hsieh, C. J. Lio, nd J. C. Tsi, Anlysis of mplitude ttck in imge wtermrking system, in Proceedings of Interntionl Symposium on Communiction, C. H. Hsieh nd C. J. Lio, A novel imge wtermrking scheme bsed on mplitude ttck, Pttern Recognition, Vol. 40, 2007, pp N. Kewkmnerd nd K. R. Ro, Wvelet bsed imge dptive wtermrking scheme, Electronics Letters, Vol. 36, 2000, pp
13 A BLIND IMAGE WATERMARKING J. J. K. O. Runidh, W. J. Dowling, nd F. M. Bolnd, Phse wtermrking of digitl imges, in Proceedings of IEEE Interntionl Conference on Imge Processing, Vol. 3, 1996, pp Chin-Pn Hung ( ) ws born in 1959 in Tiwn, R.O.C. He received the B.S. nd M.S. degrees in Electricl Engineering from Chung Cheng Institute of Technology, Tiwn, in 1981, in 1985, respectively. In 1996, he received the Ph.D. degree in Electricl Engineering from University of Pittsburgh, Pittsburgh, PA, U.S.A. In , he ws n ssocite scientist of Electronic System Division in Chung Shn Institute of Science nd Technology. He then joined the deprtment of Computer nd Communiction Engineering t Ming Chun University in August 2002, nd is currently n ssistnt professor there. His recent reserch interests include dt compression, computer vision, digitl imge/signl processing, nd pttern recognition. Chi-Jen Lio ( ) ws born in Keelung, Tiwn. He received the mster degree in Deprtment of Informtion Engineering in 2004 from I-Shou University (ISU), Tiwn, R.O.C., where he is currently working towrd the Ph.D. degree. His mjor reserch interests include imge processing, wtermrking, color mngement nd imge qulity evlution. Chur-Heh Hsieh ( ) received Ph.D. degree in Electricl Engineering in 1990 from Chung Cheng Institute of Technology (CCIT), Tiwn, R.O.C. In 1981, He joined the fculty of the Deprtment of Electricl Engineering t CCIT, nd becme professor in From 1996 he joined I-Shou University (ISU) s full professor of Informtion Engineering Deprtment. In 1997, He developed reserch group for video nd imge processing t ISU. From 1999 to 2002, he served s the chirmn of the deprtment. He ws Visiting Scholr in the Deprtment of Electricl Engineering t University of Wshington from Februry to July in From 2007 he joined Ming Chun University s full professor of Computer nd Communiction Engineering Deprtment. His reserch interests include content-bsed imge/video retrievl, sport video nlysis, video understnding, dvnced video coding, imge wtermrking, sttisticl pttern recognition nd visul inspection. He hs published more thn 150 ppers in these subjects. Dr. Hsieh received Grde-A
14 1736 CHIN-PAN HUANG, CHI-JEN LIAO AND CHAUR-HEH HSIEH Reserch Awrds from Ntionl Science Council eleven times (from 1991 to 2001). In 2002, he received Outstnding Electricl Engineer Awrd, Kohsiung Chpter of The Chinese Institute of Electricl Engineering Society. He is reviewer of IEEE journls nd conferences s well s other leding interntionl journls. He hs served on the progrm committee of severl conferences nd workshops. He is n IEEE senior member. He is fellow of IET.
Driving Cycle Construction of City Road for Hybrid Bus Based on Markov Process Deng Pan1, a, Fengchun Sun1,b*, Hongwen He1, c, Jiankun Peng1, d
Interntionl Industril Informtics nd Computer Engineering Conference (IIICEC 15) Driving Cycle Construction of City Rod for Hybrid Bus Bsed on Mrkov Process Deng Pn1,, Fengchun Sun1,b*, Hongwen He1, c,
More informationAcceptance Sampling by Attributes
Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire
More informationA Robust Feature-Based Digital Image Watermarking Scheme
Chpter 6 A Robust Feture-Bsed Digitl Imge Wtermrking Scheme 6.1 Introduction Attcks hve been developed to destroy wtermrks. These ttcks on wtermrks cn roughly be clssified s geometric distortions nd noise-like
More informationMultiscale Fourier Descriptor for Shape Classification
Multiscle Fourier Descriptor for Shpe Clssifiction Iivri Kunttu, een epistö, Juhni Ruhm 2, nd Ari Vis Tmpere University of Technology Institute of Signl Processing P. O. Box 553, FI-330 Tmpere, Finlnd
More informationNew data structures to reduce data size and search time
New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute
More informationFig. 1. Open-Loop and Closed-Loop Systems with Plant Variations
ME 3600 Control ystems Chrcteristics of Open-Loop nd Closed-Loop ystems Importnt Control ystem Chrcteristics o ensitivity of system response to prmetric vritions cn be reduced o rnsient nd stedy-stte responses
More informationA Signal-Level Fusion Model for Image-Based Change Detection in DARPA's Dynamic Database System
SPIE Aerosense 001 Conference on Signl Processing, Sensor Fusion, nd Trget Recognition X, April 16-0, Orlndo FL. (Minor errors in published version corrected.) A Signl-Level Fusion Model for Imge-Bsed
More informationA New Grey-rough Set Model Based on Interval-Valued Grey Sets
Proceedings of the 009 IEEE Interntionl Conference on Systems Mn nd Cybernetics Sn ntonio TX US - October 009 New Grey-rough Set Model sed on Intervl-Vlued Grey Sets Wu Shunxing Deprtment of utomtion Ximen
More informationStudent Activity 3: Single Factor ANOVA
MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether
More informationSUMMER KNOWHOW STUDY AND LEARNING CENTRE
SUMMER KNOWHOW STUDY AND LEARNING CENTRE Indices & Logrithms 2 Contents Indices.2 Frctionl Indices.4 Logrithms 6 Exponentil equtions. Simplifying Surds 13 Opertions on Surds..16 Scientific Nottion..18
More informationContinuous Random Variables
STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 217 Néhémy Lim Continuous Rndom Vribles Nottion. The indictor function of set S is rel-vlued function defined by : { 1 if x S 1 S (x) if x S Suppose tht
More informationA New Statistic Feature of the Short-Time Amplitude Spectrum Values for Human s Unvoiced Pronunciation
Xiodong Zhung A ew Sttistic Feture of the Short-Time Amplitude Spectrum Vlues for Humn s Unvoiced Pronuncition IAODOG ZHUAG 1 1. Qingdo University, Electronics & Informtion College, Qingdo, 6671 CHIA Abstrct:
More informationNew Expansion and Infinite Series
Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University
More information5.7 Improper Integrals
458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the
More informationTests for the Ratio of Two Poisson Rates
Chpter 437 Tests for the Rtio of Two Poisson Rtes Introduction The Poisson probbility lw gives the probbility distribution of the number of events occurring in specified intervl of time or spce. The Poisson
More informationADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS
ADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS F. Tkeo 1 nd M. Sk 1 Hchinohe Ntionl College of Technology, Hchinohe, Jpn; Tohoku University, Sendi, Jpn Abstrct:
More information15. Quantisation Noise and Nonuniform Quantisation
5. Quntistion Noise nd Nonuniform Quntistion In PCM, n nlogue signl is smpled, quntised, nd coded into sequence of digits. Once we hve quntised the smpled signls, the exct vlues of the smpled signls cn
More informationp-adic Egyptian Fractions
p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction
More informationHybrid Group Acceptance Sampling Plan Based on Size Biased Lomax Model
Mthemtics nd Sttistics 2(3): 137-141, 2014 DOI: 10.13189/ms.2014.020305 http://www.hrpub.org Hybrid Group Acceptnce Smpling Pln Bsed on Size Bised Lomx Model R. Subb Ro 1,*, A. Ng Durgmmb 2, R.R.L. Kntm
More informationThe steps of the hypothesis test
ttisticl Methods I (EXT 7005) Pge 78 Mosquito species Time of dy A B C Mid morning 0.0088 5.4900 5.5000 Mid Afternoon.3400 0.0300 0.8700 Dusk 0.600 5.400 3.000 The Chi squre test sttistic is the sum of
More informationNUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.
NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with
More informationJin-Fu Li. Department of Electrical Engineering National Central University Jhongli, Taiwan
Trnsprent BIST for RAMs Jin-Fu Li Advnced d Relible Systems (ARES) Lb. Deprtment of Electricl Engineering Ntionl Centrl University Jhongli, Tiwn Outline Introduction Concept of Trnsprent Test Trnsprent
More informationP 3 (x) = f(0) + f (0)x + f (0) 2. x 2 + f (0) . In the problem set, you are asked to show, in general, the n th order term is a n = f (n) (0)
1 Tylor polynomils In Section 3.5, we discussed how to pproximte function f(x) round point in terms of its first derivtive f (x) evluted t, tht is using the liner pproximtion f() + f ()(x ). We clled this
More informationAPPROXIMATE INTEGRATION
APPROXIMATE INTEGRATION. Introduction We hve seen tht there re functions whose nti-derivtives cnnot be expressed in closed form. For these resons ny definite integrl involving these integrnds cnnot be
More informationNumerical integration
2 Numericl integrtion This is pge i Printer: Opque this 2. Introduction Numericl integrtion is problem tht is prt of mny problems in the economics nd econometrics literture. The orgniztion of this chpter
More informationOn the Uncertainty of Sensors Based on Magnetic Effects. E. Hristoforou, E. Kayafas, A. Ktena, DM Kepaptsoglou
On the Uncertinty of Sensors Bsed on Mgnetic Effects E. ristoforou, E. Kyfs, A. Kten, DM Kepptsoglou Ntionl Technicl University of Athens, Zogrfou Cmpus, Athens 1578, Greece Tel: +3177178, Fx: +3177119,
More informationChapter 0. What is the Lebesgue integral about?
Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous
More informationA027 Uncertainties in Local Anisotropy Estimation from Multi-offset VSP Data
A07 Uncertinties in Locl Anisotropy Estimtion from Multi-offset VSP Dt M. Asghrzdeh* (Curtin University), A. Bon (Curtin University), R. Pevzner (Curtin University), M. Urosevic (Curtin University) & B.
More information1 Module for Year 10 Secondary School Student Logarithm
1 Erthquke Intensity Mesurement (The Richter Scle) Dr Chrles Richter showed tht the lrger the energy of n erthquke hs, the lrger mplitude of ground motion t given distnce. The simple model of Richter
More informationEstimation of Binomial Distribution in the Light of Future Data
British Journl of Mthemtics & Computer Science 102: 1-7, 2015, Article no.bjmcs.19191 ISSN: 2231-0851 SCIENCEDOMAIN interntionl www.sciencedomin.org Estimtion of Binomil Distribution in the Light of Future
More informationCredibility Hypothesis Testing of Fuzzy Triangular Distributions
666663 Journl of Uncertin Systems Vol.9, No., pp.6-74, 5 Online t: www.jus.org.uk Credibility Hypothesis Testing of Fuzzy Tringulr Distributions S. Smpth, B. Rmy Received April 3; Revised 4 April 4 Abstrct
More informationTime Truncated Two Stage Group Sampling Plan For Various Distributions
Time Truncted Two Stge Group Smpling Pln For Vrious Distributions Dr. A. R. Sudmni Rmswmy, S.Jysri Associte Professor, Deprtment of Mthemtics, Avinshilingm University, Coimbtore Assistnt professor, Deprtment
More informationMonte Carlo method in solving numerical integration and differential equation
Monte Crlo method in solving numericl integrtion nd differentil eqution Ye Jin Chemistry Deprtment Duke University yj66@duke.edu Abstrct: Monte Crlo method is commonly used in rel physics problem. The
More informationBernoulli Numbers Jeff Morton
Bernoulli Numbers Jeff Morton. We re interested in the opertor e t k d k t k, which is to sy k tk. Applying this to some function f E to get e t f d k k tk d k f f + d k k tk dk f, we note tht since f
More informationVyacheslav Telnin. Search for New Numbers.
Vycheslv Telnin Serch for New Numbers. 1 CHAPTER I 2 I.1 Introduction. In 1984, in the first issue for tht yer of the Science nd Life mgzine, I red the rticle "Non-Stndrd Anlysis" by V. Uspensky, in which
More informationConstruction and Selection of Single Sampling Quick Switching Variables System for given Control Limits Involving Minimum Sum of Risks
Construction nd Selection of Single Smpling Quick Switching Vribles System for given Control Limits Involving Minimum Sum of Risks Dr. D. SENHILKUMAR *1 R. GANESAN B. ESHA RAFFIE 1 Associte Professor,
More informationProperties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives
Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn
More informationChapter 4 Contravariance, Covariance, and Spacetime Diagrams
Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz
More informationMath 1B, lecture 4: Error bounds for numerical methods
Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the
More informationNon-Linear & Logistic Regression
Non-Liner & Logistic Regression If the sttistics re boring, then you've got the wrong numbers. Edwrd R. Tufte (Sttistics Professor, Yle University) Regression Anlyses When do we use these? PART 1: find
More informationChapter 5 : Continuous Random Variables
STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 216 Néhémy Lim Chpter 5 : Continuous Rndom Vribles Nottions. N {, 1, 2,...}, set of nturl numbers (i.e. ll nonnegtive integers); N {1, 2,...}, set of ll
More informationCryptanalysis of Substitution-Permutation Networks Using Key-Dependent Degeneracy *
Cryptnlysis of Substitution-Permuttion Networks Using Key-Dependent Degenercy * Howrd M. Heys Electricl Engineering, Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John
More informationLecture 3 Gaussian Probability Distribution
Introduction Lecture 3 Gussin Probbility Distribution Gussin probbility distribution is perhps the most used distribution in ll of science. lso clled bell shped curve or norml distribution Unlike the binomil
More informationMath 8 Winter 2015 Applications of Integration
Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl
More informationDuality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.
Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we
More informationRecitation 3: More Applications of the Derivative
Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech
More informationThe Regulated and Riemann Integrals
Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue
More information13: Diffusion in 2 Energy Groups
3: Diffusion in Energy Groups B. Rouben McMster University Course EP 4D3/6D3 Nucler Rector Anlysis (Rector Physics) 5 Sept.-Dec. 5 September Contents We study the diffusion eqution in two energy groups
More informationReversals of Signal-Posterior Monotonicity for Any Bounded Prior
Reversls of Signl-Posterior Monotonicity for Any Bounded Prior Christopher P. Chmbers Pul J. Hely Abstrct Pul Milgrom (The Bell Journl of Economics, 12(2): 380 391) showed tht if the strict monotone likelihood
More informationLECTURE 14. Dr. Teresa D. Golden University of North Texas Department of Chemistry
LECTURE 14 Dr. Teres D. Golden University of North Texs Deprtment of Chemistry Quntittive Methods A. Quntittive Phse Anlysis Qulittive D phses by comprison with stndrd ptterns. Estimte of proportions of
More informationPhysics 202H - Introductory Quantum Physics I Homework #08 - Solutions Fall 2004 Due 5:01 PM, Monday 2004/11/15
Physics H - Introductory Quntum Physics I Homework #8 - Solutions Fll 4 Due 5:1 PM, Mondy 4/11/15 [55 points totl] Journl questions. Briefly shre your thoughts on the following questions: Of the mteril
More informationThe Properties of Stars
10/11/010 The Properties of Strs sses Using Newton s Lw of Grvity to Determine the ss of Celestil ody ny two prticles in the universe ttrct ech other with force tht is directly proportionl to the product
More informationReview of Calculus, cont d
Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some
More informationThe use of a so called graphing calculator or programmable calculator is not permitted. Simple scientific calculators are allowed.
ERASMUS UNIVERSITY ROTTERDAM Informtion concerning the Entrnce exmintion Mthemtics level 1 for Interntionl Bchelor in Communiction nd Medi Generl informtion Avilble time: 2 hours 30 minutes. The exmintion
More informationAn efficient fractional-pixel motion compensation based on Cubic convolution interpolation
Journl of Electricl nd Electronic Engineering 2014; 2(3): 47-54 Published online September 20, 2014 (http://www.sciencepublishinggroup.com/j/jeee) doi: 10.11648/j.jeee.20140203.11 ISSN: 2329-1613 (Print);
More informationTHERMAL EXPANSION COEFFICIENT OF WATER FOR VOLUMETRIC CALIBRATION
XX IMEKO World Congress Metrology for Green Growth September 9,, Busn, Republic of Kore THERMAL EXPANSION COEFFICIENT OF WATER FOR OLUMETRIC CALIBRATION Nieves Medin Hed of Mss Division, CEM, Spin, mnmedin@mityc.es
More information8 Laplace s Method and Local Limit Theorems
8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved
More informationINVESTIGATION OF BURSA, ESKIKARAAGAC USING VERTICAL ELECTRICAL SOUNDING METHOD
INVESTIGATION OF BURSA, ESKIKARAAGAC USING VERTICAL ELECTRICAL SOUNDING METHOD Gökçen ERYILMAZ TÜRKKAN, Serdr KORKMAZ Uludg University, Civil Engineering Deprtment, Burs, Turkey geryilmz@uludg.edu.tr,
More informationAdvanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004
Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when
More informationA Brief Review on Akkar, Sandikkaya and Bommer (ASB13) GMPE
Southwestern U.S. Ground Motion Chrcteriztion Senior Seismic Hzrd Anlysis Committee Level 3 Workshop #2 October 22-24, 2013 A Brief Review on Akkr, Sndikky nd Bommer (ASB13 GMPE Sinn Akkr Deprtment of
More information2D1431 Machine Learning Lab 3: Reinforcement Learning
2D1431 Mchine Lerning Lb 3: Reinforcement Lerning Frnk Hoffmnn modified by Örjn Ekeberg December 7, 2004 1 Introduction In this lb you will lern bout dynmic progrmming nd reinforcement lerning. It is ssumed
More informationMATH 144: Business Calculus Final Review
MATH 144: Business Clculus Finl Review 1 Skills 1. Clculte severl limits. 2. Find verticl nd horizontl symptotes for given rtionl function. 3. Clculte derivtive by definition. 4. Clculte severl derivtives
More informationChapters 4 & 5 Integrals & Applications
Contents Chpters 4 & 5 Integrls & Applictions Motivtion to Chpters 4 & 5 2 Chpter 4 3 Ares nd Distnces 3. VIDEO - Ares Under Functions............................................ 3.2 VIDEO - Applictions
More informationMedian Filter based wavelet transform for multilevel noise
Medin Filter bsed wvelet trnsform for multilevel noise H S Shuk Nrendr Kumr *R P Tripthi Deprtment of Computer Science,Deen Dyl Updhy Gorkhpur university,gorkhpur(up) INDIA *Deptrment of Mthemtics,Grphic
More informationI1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3
2 The Prllel Circuit Electric Circuits: Figure 2- elow show ttery nd multiple resistors rrnged in prllel. Ech resistor receives portion of the current from the ttery sed on its resistnce. The split is
More informationElectron Correlation Methods
Electron Correltion Methods HF method: electron-electron interction is replced by n verge interction E HF c E 0 E HF E 0 exct ground stte energy E HF HF energy for given bsis set HF Ec 0 - represents mesure
More informationa * a (2,1) 1,1 0,1 1,1 2,1 hkl 1,0 1,0 2,0 O 2,1 0,1 1,1 0,2 1,2 2,2
18 34.3 The Reciprocl Lttice The inverse of the intersections of plne with the unit cell xes is used to find the Miller indices of the plne. The inverse of the d-spcing etween plnes ppers in expressions
More informationCALCULATED POWDER X-RAY DIFFRACTION LINE PROFILES VIA ABSORPTION
16 17 CALCULATED POWDER X-RAY DFFRACTON LNE PROFLES VA ABSORPTON Keji Liu nd Heifen Chen School of Mteril Science nd Engineering, Shnghi nstitute of Technology, Shnghi, Chin 2233 ABSTRACT We hve clculted
More informationSolution for Assignment 1 : Intro to Probability and Statistics, PAC learning
Solution for Assignment 1 : Intro to Probbility nd Sttistics, PAC lerning 10-701/15-781: Mchine Lerning (Fll 004) Due: Sept. 30th 004, Thursdy, Strt of clss Question 1. Bsic Probbility ( 18 pts) 1.1 (
More informationSynoptic Meteorology I: Finite Differences September Partial Derivatives (or, Why Do We Care About Finite Differences?
Synoptic Meteorology I: Finite Differences 16-18 September 2014 Prtil Derivtives (or, Why Do We Cre About Finite Differences?) With the exception of the idel gs lw, the equtions tht govern the evolution
More informationChapter 14. Matrix Representations of Linear Transformations
Chpter 4 Mtrix Representtions of Liner Trnsformtions When considering the Het Stte Evolution, we found tht we could describe this process using multipliction by mtrix. This ws nice becuse computers cn
More informationUNIT 1 FUNCTIONS AND THEIR INVERSES Lesson 1.4: Logarithmic Functions as Inverses Instruction
Lesson : Logrithmic Functions s Inverses Prerequisite Skills This lesson requires the use of the following skills: determining the dependent nd independent vribles in n exponentil function bsed on dt from
More information1 Online Learning and Regret Minimization
2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in
More informationRiemann Sums and Riemann Integrals
Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 203 Outline Riemnn Sums Riemnn Integrls Properties Abstrct
More informationCMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature
CMDA 4604: Intermedite Topics in Mthemticl Modeling Lecture 19: Interpoltion nd Qudrture In this lecture we mke brief diversion into the res of interpoltion nd qudrture. Given function f C[, b], we sy
More informationResearch on the Quality Competence in Manufacturing Industry
Reserch on the Qulity Competence in Mnufcturing Industry Xioping M, Zhijun Hn Economics nd Mngement School Nnjing University of Science nd Technology Nnjing 210094, Chin Tel: 86-25-8431-5400 E-mil: hnzhij4531@sin.com
More informationGenetic Programming. Outline. Evolutionary Strategies. Evolutionary strategies Genetic programming Summary
Outline Genetic Progrmming Evolutionry strtegies Genetic progrmming Summry Bsed on the mteril provided y Professor Michel Negnevitsky Evolutionry Strtegies An pproch simulting nturl evolution ws proposed
More informationEquations and Inequalities
Equtions nd Inequlities Equtions nd Inequlities Curriculum Redy ACMNA: 4, 5, 6, 7, 40 www.mthletics.com Equtions EQUATIONS & Inequlities & INEQUALITIES Sometimes just writing vribles or pronumerls in
More informationSufficient condition on noise correlations for scalable quantum computing
Sufficient condition on noise correltions for sclble quntum computing John Presill, 2 Februry 202 Is quntum computing sclble? The ccurcy threshold theorem for quntum computtion estblishes tht sclbility
More informationHere we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system.
Section 24 Nonsingulr Liner Systems Here we study squre liner systems nd properties of their coefficient mtrices s they relte to the solution set of the liner system Let A be n n Then we know from previous
More informationEntropy ISSN
Entropy 006, 8[], 50-6 50 Entropy ISSN 099-4300 www.mdpi.org/entropy/ ENTROPY GENERATION IN PRESSURE GRADIENT ASSISTED COUETTE FLOW WITH DIFFERENT THERMAL BOUNDARY CONDITIONS Abdul Aziz Deprtment of Mechnicl
More informationRiemann Sums and Riemann Integrals
Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties
More informationCHM Physical Chemistry I Chapter 1 - Supplementary Material
CHM 3410 - Physicl Chemistry I Chpter 1 - Supplementry Mteril For review of some bsic concepts in mth, see Atkins "Mthemticl Bckground 1 (pp 59-6), nd "Mthemticl Bckground " (pp 109-111). 1. Derivtion
More informationNatural examples of rings are the ring of integers, a ring of polynomials in one variable, the ring
More generlly, we define ring to be non-empty set R hving two binry opertions (we ll think of these s ddition nd multipliction) which is n Abelin group under + (we ll denote the dditive identity by 0),
More informationGoals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite
Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite
More informationApplicable Analysis and Discrete Mathematics available online at
Applicble Anlysis nd Discrete Mthemtics vilble online t http://pefmth.etf.rs Appl. Anl. Discrete Mth. 4 (2010), 23 31. doi:10.2298/aadm100201012k NUMERICAL ANALYSIS MEETS NUMBER THEORY: USING ROOTFINDING
More informationGeneralized Fano and non-fano networks
Generlized Fno nd non-fno networks Nildri Ds nd Brijesh Kumr Ri Deprtment of Electronics nd Electricl Engineering Indin Institute of Technology Guwhti, Guwhti, Assm, Indi Emil: {d.nildri, bkri}@iitg.ernet.in
More informationAdding and Subtracting Rational Expressions
6.4 Adding nd Subtrcting Rtionl Epressions Essentil Question How cn you determine the domin of the sum or difference of two rtionl epressions? You cn dd nd subtrct rtionl epressions in much the sme wy
More informationEffects of peripheral drilling moment on delamination using special drill bits
journl of mterils processing technology 01 (008 471 476 journl homepge: www.elsevier.com/locte/jmtprotec Effects of peripherl illing moment on delmintion using specil ill bits C.C. Tso,, H. Hocheng b Deprtment
More informationShear Degradation and Possible viscoelastic properties of High Molecular Weight Oil Drag Reducer Polymers
ANNUAL TRANSACTIONS OF THE NORDIC RHEOLOGY SOCIETY, VOL. 3, 2005 Sher Degrdtion nd Possible viscoelstic properties of High Moleculr Weight Oil Drg Reducer Polymers A.A. Hmoud, C. Elissen, C. Idsøe nd T.
More informationBasic model for traffic interweave
Journl of Physics: Conference Series PAPER OPEN ACCESS Bsic model for trffic interweve To cite this rticle: Ding-wei Hung 25 J. Phys.: Conf. Ser. 633 227 Relted content - Bsic sciences gonize in Turkey!
More informationState space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies
Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response
More informationCBE 291b - Computation And Optimization For Engineers
The University of Western Ontrio Fculty of Engineering Science Deprtment of Chemicl nd Biochemicl Engineering CBE 9b - Computtion And Optimiztion For Engineers Mtlb Project Introduction Prof. A. Jutn Jn
More informationProbability Distributions for Gradient Directions in Uncertain 3D Scalar Fields
Technicl Report 7.8. Technische Universität München Probbility Distributions for Grdient Directions in Uncertin 3D Sclr Fields Tobis Pfffelmoser, Mihel Mihi, nd Rüdiger Westermnn Computer Grphics nd Visuliztion
More informationMatching patterns of line segments by eigenvector decomposition
Title Mtching ptterns of line segments y eigenvector decomposition Author(s) Chn, BHB; Hung, YS Cittion The 5th IEEE Southwest Symposium on Imge Anlysis nd Interprettion Proceedings, Snte Fe, NM., 7-9
More informationAn approximation to the arithmetic-geometric mean. G.J.O. Jameson, Math. Gazette 98 (2014), 85 95
An pproximtion to the rithmetic-geometric men G.J.O. Jmeson, Mth. Gzette 98 (4), 85 95 Given positive numbers > b, consider the itertion given by =, b = b nd n+ = ( n + b n ), b n+ = ( n b n ) /. At ech
More informationMotion of Electrons in Electric and Magnetic Fields & Measurement of the Charge to Mass Ratio of Electrons
n eperiment of the Electron topic Motion of Electrons in Electric nd Mgnetic Fields & Mesurement of the Chrge to Mss Rtio of Electrons Instructor: 梁生 Office: 7-318 Emil: shling@bjtu.edu.cn Purposes 1.
More informationPhysics 116C Solution of inhomogeneous ordinary differential equations using Green s functions
Physics 6C Solution of inhomogeneous ordinry differentil equtions using Green s functions Peter Young November 5, 29 Homogeneous Equtions We hve studied, especilly in long HW problem, second order liner
More informationNumerical Analysis: Trapezoidal and Simpson s Rule
nd Simpson s Mthemticl question we re interested in numericlly nswering How to we evlute I = f (x) dx? Clculus tells us tht if F(x) is the ntiderivtive of function f (x) on the intervl [, b], then I =
More informationLecture 14: Quadrature
Lecture 14: Qudrture This lecture is concerned with the evlution of integrls fx)dx 1) over finite intervl [, b] The integrnd fx) is ssumed to be rel-vlues nd smooth The pproximtion of n integrl by numericl
More information