Robust Image Encryption Based on Balanced Cellular Automaton and Pixel Separation

Size: px
Start display at page:

Download "Robust Image Encryption Based on Balanced Cellular Automaton and Pixel Separation"

Transcription

1 548 D. TRALIC, S. GRGIC, ROBUST IMAGE ENCRYPTION BASED ON BALANCED CA AND PIXEL SEPARATION Robust Image Encrypton Based on Balanced Cellular Automaton and Pxel Separaton Djana TRALIC, Sonja GRGIC Dept. of Wreless Communcatons, Faculty of Electrcal Engneerng and Computng, Unversty of Zagreb, Unska 3, HR000 Zagreb, Croata Manuscrpt receved March 0, 206 Abstract. The purpose of mage encrypton s to protect content from unauthorzed access. Image encrypton s usually done by pxel scramblng and confuson, so process s possble to reverse only by knowng secret nformaton. In ths paper we ntroduce a new method for dgtal mage encrypton, based on a 2D cellular automaton and pxel separaton. Novelty n the proposed method les n the applcaton of the balanced 2D cellular automata wth extended Moore neghborhood separately on each level of pseudorandom key-mage. Ths process extends key space several tmes when compared to the prevous methods. Furthermore, pxel separaton s ntroduced to defne operaton for each pxel of the source mage. Thanks to pxel separaton, decrypton process s more dffcult to conduct wthout knowng secret nformaton. Moreover, encrypton s robust aganst dfferent statstcal attacks and analyss, does not affect mage qualty and can cope wth loss of encrypted mage content. Keywords Image securty, encrypton, decrypton, cellular automaton, statstcal tests. Introducton Nowadays mages are wdely used n varous applcatons, such as communcaton, multmeda systems, medcal magng, telemedcne, montorng, and mltary communcaton, so ther securty s becomng ncreasngly mportant. Generally, encrypton s used to effectvely protect mages transmtted through publc channels, because t makes mages unrecognzable, unless decrypted by a secret key. There are several conventonal encrypton methods, but these algorthms have lmtaton n encryptng mages such as low effcency, bulky data, and hgh correlaton among pxels []. Image encrypton algorthm s consdered relable f: the scheme s secure aganst dfferent statstcal and plantext attacks; there s no vsual degradaton of decrypted mage; corrupton of encrypted mage part does not propagate on the whole decrypted mage; key space s large enough to make t mpossble to guess correct secret nformaton; encrypted mages show random propertes. Good canddates for mage encrypton are cellular automata (CA), thanks to ther propertes lke parallelsm, homogenety and unpredctablty [2 4]. Cellular automata are dstrbuted systems wth a large number of rules that can smulate complcated and pseudorandom behavors [5]. In recent years, CA has been used for mage cryptography n followng areas: watermarkng [6], [7], secret mage sharng [8 ], and mage encrypton [2 8]. The frst mage encrypton system based on cellular automata was desgned wth one-dmensonal elementary CA [6]. Ths approach uses only two neghbors to defne CA rules so ts key space s qute small. Later, 2D cellular automata are ntroduced for mage encrypton. Most of approaches use Von Neumann neghborhood [2], [3], [9], [20], or ncomplete Moore neghborhood [4], whch also nfluences the capacty of key space. Later, mage encrypton method based on Moore and extended Moore neghborhoods s ntroduced [2], but t reduces possble key space volume due to Moore neghborhood sze. Chaos theory s appled n [22], however t s qute complex to be used for mage encrypton and t results n a very small key space volume. In ths paper we ntroduce a new method for dgtal mage encrypton, based on a 2D cellular automaton and pxel separaton. Frst, sender and recever exchange secret nformaton: seed and separaton values. Then 2D cellular automaton wth extended Moore neghborhood s used to generate pseudorandom key-mage based on selected seed. Encrypton s then performed by combnng source mage wth key-mage. In ths process pxel separaton s appled to defne operaton for each pxel based on secret separaton values. Operaton for each pxel s selected among ten possble operatons makng t more dffcult to decrypt the encrypted mage wthout secret nformaton. The rest of the paper s organzed as follows. In Sec. 2 the proposed method s presented. Secton 3 brngs smulaton results, and Secton 4 contans comparson to state of the art methods. Concluson s gven n Sec. 5. DOI: 0.364/re SIGNALS

2 RADIOENGINEERING, VOL. 25, NO. 3, SEPTEMBER Proposed Method The proposed method s based on the dea of combnng a source mage (the mage that should be encrypted) wth a key-mage. Pseudorandom key-mage s generated usng balanced cellular automaton rules, whch are appled on bnary levels. Also, rules are formed on extended Moore neghborhood whch extends key space. In encrypton process, pxel separaton s ntroduced to make decrypton more robust and complcated for unauthorzed party. 2. Cellular Automata Cellular automaton (CA) [24] s a dscrete system that contans a regular grd of cells, each n one fnte state. A CA can be presented by a quadruple [24]: where: C, S, N, f () C s a d-dmensonal cellular space that conssts of c cells,.e. 2-dmensonal bnary mage that conssts of M N values, S s a s-value state space,.e. s = 2 for bnary mages (0 or ), N s an n-cell CA neghborhood,.e. an arbtrarly selected group of n pxels N(p o ) spatally close to the observed pxel p o, Extended Moore neghborhood ncludes 24 pxels around the central pxel. f : S n S s a cell-state transton functon defned as a set of rules that represents the connecton of the selected neghborhood N(p o ) and the value of the observed pxel p o. Therefore, the value of pxel p o n the next tme step depends only on values of pxels n the selected neghborhood N(p o ). By consderng extended Moore neghborhood (n = 25) and bnary mages (s = 2), there are total of s n = 2 25 = possble combnatons of values n neghborhood. Also, there are possble rules. For example, rule 0 means that all combnatons of neghborng elements result n the value of the observed pxel p o equal to 0 (2). Note that a new state of the observed pxel p o for all combnatons of neghborhood presents CA rule s value n the bnary form. o f Np ( o( t))= then po( t+)=0, f Np ( o( t))= then po( t+)=0,... f Np ( ( t))= then p( t+)=0. CA rules that contan equal number of zeros and ones, meanng that half of neghborhood combnatons result n zero and other half n one, are called balanced rules. It can be proved that the mage generated by the balanced CA rules has hgher entropy than the mage generated by the unbalanced CA rules [5]. o (2) 2.2 Encrypton Encrypton of mage s done n three steps. Frst, secret nformaton s generated: seed S s chosen as a random number n the range [0, 2 32 ], and separaton values S v are generated as an arbtrary sequence of numbers from 0 to 9 (correspondng to the number of used operatons). Secret nformaton {S, S v } s transmtted usng secured channel. Then pseudorandom key-mage s created usng cellular automata and secret seed S (see Sec. 2.2.). Fnally, encrypton s done by combnng the key-mage wth the source mage usng pxel separaton algorthm and separaton values S v (see Sec ) Pseudorandom Key-Image Generaton The pseudorandom key-mage s generated by applyng CA rules on pseudorandom bnary levels and combnng t n a new mage. Generaton of the pseudorandom key-mage s done usng the followng steps: Generaton of pseudorandom numbers: Seed S s used to generate pseudorandom numbers K, = {, 2,, 8}, n range [0, ]. Each pseudorandom number K s dedcated to one bnary level of a resultng key-mage (ndex marks dedcated bnary level). Generaton of bnary levels: Each number K s frst used to generate M N pseudo random bnary matrx B (M N correspond to the sze of the source mage). Selecton of CA rules: Number K s used to choose CA rule R for bnary level. CA rule R s chosen as the balanced rule nearest to the number K, and defned as: R 2 K b Kb, nn( K ) 2 Kb balanced rule (3) where nn represents the nearest neghbors functon. In chosen CA confguraton wth 25 neghbors, there are balanced rules. Applcaton of CA rules: CA rule R s appled on M N bnary matrx B to get a new M N bnary matrx B c. For each element n matrx B, extended Moore neghborhood of 25 elements (24 neghbors around the central element) s consdered to defne a new value n matrx B c accordng to selected CA rule R. f ( B( Np ( o)) de2b( Rl ( ))) (4) then B ( p ) R( l) c o where de2b represents decmal to bnary functon. Key-mage formng: bnary mages B c, = {, 2,, 8} are formed nto a pseudorandom key-mage K by usng matrx B c as the -th bnary level of keymage K.

3 550 D. TRALIC, S. GRGIC, ROBUST IMAGE ENCRYPTION BASED ON BALANCED CA AND PIXEL SEPARATION Pxel Separaton After generaton of pseudorandom key-mage K, encrypton of mage s done usng pxel separaton: Separaton values S v are used to make a new order of operatons for combnng source mage and keymage. Ths s done by changng ndex of each operaton accordng to secret separaton values S v. O xor( I( x, y), K( x, y)), Sv(0) O xor( I( x, y), K( x, y)), Sv() O xor(shft( I( x, y),2), K( x, y)), Sv(2) OSv(3) xor(shft( I( x, y),2), K( x, y)), O xor(shft( I( x, y),4), K( x, y)), Sv(4) OSv(5) xor(shft( I( x, y),4), K( x, y)), O xor(shft( I( x, y),6), K( x, y)), Sv(6) OSv(7) xor(shft( I( x, y),6), K( x, y)), O xor( I ( x, y), K( x, y)), Sv(8) O xor( I ( x, y), K( x, y)). Sv(9) Note that last 2 operatons nvolve changng of the most sgnfcant bt of pxel I(x, y). We ntroduce 0 dfferent operatons because smaller sets do not ntroduce enough confuson n pxel values. Pseudorandom key-mage K s used to determne operaton type ndex (T) for each pxel n the source mage usng the last dgt at each locaton. (5) T mod(k,0). (6) In ths step, pxels are separated n ten dfferent groups accordng to operaton type, and we call ths process pxel separaton. Each pxel n source mage I(x, y) s then encrypted by applyng operaton O T(x, y) on mage I(x, y) and keymage K(x, y). The result of encrypton s encrypted mage E. Advantage of ths process les n the fact that encrypted mage s more dffcult to decrypt, because decrypton requres correct guessng of the used operaton for each pxel n the source mage. 2.3 Decrypton Decrypton of an encrypted mage s done usng the followng steps: Recever receves secret nformaton (seed S and separaton values S v ) through a protected channel. Recever uses seed S to generate pseudorandom keymage. Recever uses separaton values S v to make a new order of operatons for combnng encrypted mage E and key-mage K, as descrbed n Sec Note that the same operaton set s appled n decrypton process, but encrypted mage E s used nstead of source mage I n (5). The result of decrypton s the decrypted mage, whch s dentcal to the source mage. 3. Smulaton Results and Analyss Dfferent analyss and smulatons are conducted to demonstrate performance of the proposed method. To demonstrate encrypton property, results are presented for the followng fve mages: Lena.jpg, Cameraman.png, Baboon.jpg, Crcle.bmp and plan mage of sze Algorthm s developed n Matlab 203b, and run on computer wth Intel Core 7 processor under Wndows 0 operaton system. Smulaton s appled for a random seed and separaton values (as hghlghted for each presented example). 3. Key Space Analyss Secret nformaton used for encrypton of a source mage s noted as a key. The frst part of the key s seed S, selected randomly n range [0, 2 32 ]. Note that upper lmt s set accordng to Matlab lmt for pseudo number generator nput. Therefore, probablty to select the rght seed s equal to: p. 2 0 s (7) 32 Havng n mnd that we use 25 CA neghbors, there are 2 25 = possble bnary combnatons of bnary values 0 and, and possble rules. Probablty to select the rght CA rule for one bnary level s: pr. (8) The second part of the key contans separaton values. There are 0! = possble combnatons to use. Possblty of usng the rght combnaton s: psv. (9) 0! The volume of the proposed secret key s very large due to the fact that dfferent CA rule s selected for each bnary level of the key, and can be defned as: V 0! (0) Key Senstvty Test To test key senstvty, a mage (Lena.jpg) s encrypted by usng the seed S = Then, the

4 RADIOENGINEERING, VOL. 25, NO. 3, SEPTEMBER least sgnfcant bt of the seed s changed, so that the orgnal seed becomes S 2 = , and used to encrypt the same mage. Fnally, the two encrypted mages, encrypted by the two slghtly dfferent seeds, are compared. Results are presented n Fg.. The dfference between two mages encrypted wth seeds that dffer n only bt s qute large. Ths llustrates that the proposed method generates uncorrelated key-mages that cannot be predcted. We also calculated the number of pxels change rate (NPCR) between encrypted mages E and E 2 as: D,j ( ),j NPCR( E,E2) 00, NM () E(,j) E2(,j) D,j ( ) 0 otherwse where N and M s the wdth and heght of E and E 2. For two ndependent random mages, the expected value of NPCR s: E(NPCR) = ( 2 ) 00, where L s the number of bts used to represent one pxel of the mage [2]. For 8-bt per pxel gray-scale random mages, E(NPCR) = ( 2 8 ) 00 = %. Value of NPCR n our example s equal to 99.38%, whch proves that the method generates unpredctable key-mages. To measure the average ntensty of the dfferences between the two encrypted mages, the unfed average changng ntensty (UACI) s defned as: E(, j) E2 (, j) UACI ( E, E2 ) 00 (2) NM, j 255 a) Test mage Lena b) Encrypted usng seed S = c) Encrypted usng seed d) Dfference between b) and c) S 2 = Fg.. Examples of encrypton of Lena usng two very smlar seeds. where N and M s the wdth and heght of E and E 2. For two 8-bt per pxel random gray-scale mages, the expected value of UACI s E(UACI) = %. Table presents NPCR and UACI values for all tested mages wth dfferent par of seeds (S, S 2 ). Values of NPCR and UACI ndcate that encrypted mages have good randomness. Image Seed NPCR(E, E 2 ) UACI(E, E 2 ) Lena S = 25, S 2 = % % Cameraman S = 3458, S 2 = % % Baboon S = 54887, S 2 = % % Crcle S = 54, S 2 = % % Plan S = , S 2 = % % Tab.. Pxel change rate and average ntensty of the dfferences between two encrypted mages. 3.3 Image Hstogram To demonstrate robustness of the proposed method, we calculated hstogram and probablty densty functon (pdf) of two orgnal and encrypted mages. In general, more unformed hstogram results n less statstcal attacks. Fgure 2 shows pdfs of Lena and Cameraman and ther encrypted versons. Encrypted mages have almost unform pdfs regardless of the orgnal mages, so statstcal attacks are very dffcult to conduct. Correlaton between pxels s also a good ndcator of securty. The smaller correlaton means the better encrypton effect. To demonstrate encrypton effect, we calculated the correlaton coeffcent as: N ( I, E) D( x) N N N ( I I )( E 2 ( x x) D( I ) D( E) E), (3) where I represents the source mage, E the encrypted verson of the source mage, and N s the total number of pxels. The value of the correlaton coeffcent can vary between and. If s near, mages are correlated and f s near 0, there s a trval correlaton between mages. Correlaton coeffcent for Lena and ts encrypted verson (S = ), shown n Fg..b), s equal to , leadng to concluson that two mages are not correlated. Furthermore, correlaton coeffcent of Lena and ts encrypted verson (Fg..c) wth dfferent seed (S = ) s To better demonstrate correlaton between mages, we calculated correlaton of pxels n vertcal, horzontal and dagonal drectons by randomly selectng 2500 pars of adjacent pxels both from source mage and encrypted mage, and calculate the correlaton coeffcents. Results

5 552 D. TRALIC, S. GRGIC, ROBUST IMAGE ENCRYPTION BASED ON BALANCED CA AND PIXEL SEPARATION a) Baboon encrypted, H = b) Baboon decrypted, H = c) Cameraman encrypted, H = d) Cameraman decrypted, H = a) Lena and Lena encrypted Fg. 3. Entropy of encrypted (S = ) and decrypted mages. b) Cameraman and Cameraman encrypted Image Lena Cameraman Baboon Crcle Plan Fg. 2. Probablty densty functons. Image Lena Lena encrypted S = Cameraman Cameraman encrypted S = Baboon Baboon encrypted S = Crcle Crcle encrypted S = 62 Plan Plan encrypted S = Horzontal Vertcal Dagonal Source Entropy Encrypted Entropy Tab. 3. Comparson of entropy of source and encrypted mages. For mages wth random pxels whch are encoded by 8 bt, entropy should be equal to 8. However, entropy s usually smaller than 8, but a value closer to eght means that the possblty of predctablty s less and the securty level s hgher. Tab. 2. Correlaton between mage pxels. for fve mages and ther encrypted verson are presented n Tab. 2. The proposed algorthm effectvely reduces the correlaton between adjacent pxels for all tested examples. Note that correlaton s especally reduced n the case of plan mage. Fgure 3 shows examples of mage entropy for two encrypted and decrypted mages. Decrypted mages are dentcal to source mages, whch means that the proposed method does not nfluence mage qualty. Also entropy of encrypted mages s very close to 8, whch ndcates ther randomness. Table 3 shows entropy of source mages and ther encrypted versons (seed S = 7529 for all examples). Encrypted mages have entropy close to 8, whch proves that the predctablty s very low. Note that entropy s close to 8 even n the case when plan mage s used as a source mage. 3.4 Informaton Entropy Entropy of message m s one of the mportant features for randomness, defned usng probablty of symbol p(m): H ( m ) p( m ) log 2 ( p( m )). (4) 3.5 Confuson Analyss Confuson refers to makng the relatonshp between the encrypted mage and the prvate nformaton as complex and uncorrelated as possble. We prevously demon-

6 RADIOENGINEERING, VOL. 25, NO. 3, SEPTEMBER strated the dfference between two encrypted mages usng seeds that dffer n only bt (Fg. ). An excellent encrypton algorthm should be senstve to small changes n seed. In other words, a slght change n the key should cause very dfferent results. Fgure 4 demonstrates results of decrypton of encrypted Crcle mage wth dfferent seeds. Furthermore, we smulated encrypton of plan mage usng seed S = Then, encrypted mage s decrypted usng seed that dffers n only one bt (S = ). Results are shown n Fg. 5, where t s possble to notce that the proposed method does not generate relatonshp between plan mage and encrypted plan mage. Also, snce there s only bt dfference between the two seeds, the results show the hgh key senstvty of the proposed CA encrypton scheme. a) Loss of pxels Fg. 7. Survval propertes of the proposed method n the case of loss of the encrypted content. a) Gaussan nose (zero mean and σ2 = 0.0) a) Crcle decrypted usng correct seed S = b) Crcle decrypted usng seed S = Fg. 4. Decrypton of crcle usng seeds that dffer n bt. b) Decrypton of a) b) Salt and paper nose (d = 0.0) Fg. 8. Survval propertes of the proposed method n the case of corrupton of the encrypted mage. Moreover, we tested decrypton n the case when correct seed S s used, but ncorrect separaton values Sv are appled. Results are presented n Fg. 6, showng that small dfference n separaton values order leads to nablty to decrypt mage even f correct seed S s used. Analyss also showed that equal percentage of operaton type s appled to mage pxels and that operatons are dstrbuted randomly on mage. 3.6 Survval Propertes a) Encrypted usng S = a) Decrypted usng S = Fg. 5. Decrypton of plan mage usng seeds that dffer n bt. The proposed method s also robust to loss or corrupton of encrypted mage parts n a way that only the correspondng fracton s affected and the error does not propagate to other parts of the decrypted mage. Good survval propertes assure that a large area of the mage survves so the method s relable n transmssons wth hgh error rate. Fgure 7 demonstrates that loss of mage s part dd not affect other parts of the decrypted mage. Fgure 8 shows the nfluence of nose on the decrypted mage n the case when Gaussan nose and salt and pepper nose s appled on the encrypted mage. Agan, corrupton of some pxels dd not corrupt the whole mage. a) Decrypted usng separaton values Sv = b) Decrypted usng separaton values Sv = Fg. 6. Decrypton of Baboon usng dfferent separaton values. 3.7 Tme of Calculaton Tme of calculaton s an mportant factor for applcaton of any method n the real tme systems. Table 4

7 554 D. TRALIC, S. GRGIC, ROBUST IMAGE ENCRYPTION BASED ON BALANCED CA AND PIXEL SEPARATION Method Encrypton Decrypton Lena 22 ± 0.2 ms 22 ± 0.52 ms Cameraman 2 ± 0.35 ms 2 ± 0.24 ms Baboon 22 ± 0.47 ms 22 ± 0.38 ms Crcle 2 ± 0.6 ms 2 ± 0.9 ms Plan 22 ± 0.03 ms 2 ± 0.83 ms Tab. 4. Tme of calculaton for encrypton and decrypton. contans a calculaton tme of the proposed encrypton and decrypton method for 5 test mages. Note that all mages have the same sze and testng s done n the same condtons. Seed used for testng was set to S = and separaton values were set to S v = Values n Tab. 4 are determned as average values between 00 encrypton/decrypton attempts for each mage. It s possble to see that calculaton tme s qute low and t does not depend on mage content. 4. Comparson to Other Methods The volume of the securty key s much larger than the volume of the key ntroduced n [4], whch s equal to 256. It s also much larger than , 0 294, and whch are the lower bounds of the volume of the securty keys ntroduced n [2], [9], and [20], respectvely. Moreover, t s several tmes larger than the securty key ntroduced n [2], whch s defned as H!e , where H s the heght of the mage. Key space s also much larger than chaos based key space proposed n [22], whch s equal to Table 5 contans comparson of key space. By comparng the entropy wth other methods, t s possble to notce that the proposed method assures hgher entropy than [9], where entropy s and for Lena mage and two dfferent key-mages. The value of entropy for Lena mage s also hgher than as accomplshed wth the method proposed n [2]. Table 6 contans comparson of mage entropy values for Lena mage. Method Key space Von Neumann [2] Incomplete Moore [4] 256 Von Neumann [9] Von Neumann [20] Extended Moore [2] H!e Chaos theory [22] The proposed Tab. 5. Comparson of key space for dfferent methods. Method Entropy Von Neumann [9] Von Neumann [20] Extended Moore [2] Chaos theory [22] The proposed Tab. 6. Comparson of mage entropy for dfferent methods. Method NPCR UACI Von Neumann [20] % 3.82 % Extended Moore [2] % % Chaos theory [22] % % The proposed % % Tab. 7. Comparson of NPCR and UACI for dfferent methods. Values of NPCR and UACI are gven n Tab. 7. The proposed method accomplshed a bt lower value of NPCR, but t s stll above the lmt defned by (2). The value of UACI for the proposed method s hgher than for other methods. 5. Concluson Robust and relable mage encrypton s a key for effectve protecton n transmsson through publc channels. The man dea s to make mages unrecognzable and assure that decrypton s possble only usng a secret key. The proposed method combnes cellular automata and pxel separaton to provde robust mage encrypton. It reles on secret nformaton n the form of seed and separaton values. Encrypton of source mage s accomplshed usng pseudorandom key-mage, created by 2D cellular automaton. Cellular automata are good canddates for generaton of pseudorandom numbers thanks to ther propertes lke parallelsm, homogenety and unpredctablty. Dfferent CA rule s chosen for each bnary level of pseudorandom key-mage based on selected seed. Selecton s lmted to balanced rules, whch results n hgher entropy of keymage. CA rules are appled on extended Moore neghborhood, whch results n larger key space. Fnally, encrypton s performed by combnng source mage and key-mage. Pxel separaton s appled to select rght operaton for each pxel based on secret separaton values. Ten operatons are defned to make decrypton of an mage wthout secret nformaton more dffcult. Key space analyss shows that the proposed method has very large key space, whch s mportant to avod guessng of secret nformaton. Key-mages generated by the proposed method have good randomness property as demonstrated through senstvty test. Randomness s proven also by calculatng the entropy of encrypted mages, whch was very close to 8. Furthermore, mage hstograms are used to show almost unform pdfs of encrypted mages makng statstcal attacks very dffcult to conduct. By calculatng correlaton coeffcent, t s demonstrated that the algorthm effectvely reduces the correlaton between adjacent pxels. Survval propertes n the case of data loss and nose, as well as computatonal tme, are satsfactory for real tme systems. Comparson to the state of the art methods shows that the proposed method accomplshed the largest key space volume whle keepng very good randomness.

8 RADIOENGINEERING, VOL. 25, NO. 3, SEPTEMBER References [] WOLFGANG, R. B., DELL, E. J. Overvew of mage securty technques wth applcatons n multmeda systems. In Proceedngs of the SPIE Internatonal Conference on Multmeda Networks: Securty, Dsplays, Termnals, and Gateways. Dallas (USA), 997, p DOI: 0.7/ [2] LAFE, O. Data compresson and encrypton usng Cellular Automata Transforms. In Proceedngs of the IEEE Internatonal Jont Symposa on Intellgence and Systems. Rockvlle (USA), 996, p DOI: 0.09/IJSIS [3] TOMASSINI, M., SIPPER, M., PERRENOUD, M. On the generaton of hgh-qualty random numbers by two-dmensonal cellular automata. IEEE Transactons on Computers, 2000, vol. 49, no. 0, p DOI: 0.09/ [4] SEREDYNSKI, F., BOUVRY, P., ZOMAYA, A. Y. Cellular automata computatons and secret key cryptography. Parallel Computng, 2004, vol. 30, no. 5 6, p DOI: 0.06/j.parco [5] SARKAR, P. A bref hstory of cellular automata. ACM Computng Surveys (CSUR), 2000, vol. 32, no., p DOI: 0.45/ [6] WU, H. L., ZHOU, J. L., GONG, X. G. A novel mage watermarkng algorthm based on two-dmensonal cellular automata transform. In Proceedngs of the 6th IEEE Jont Internatonal Informaton Technology and Artfcal Intellgence Conference (ITAIC ). Chongqng (Chna), 20, vol. 2, p DOI: 0.09/ITAIC [7] MANKAR, V. H., DAS, T. S., SARKAR, S. K. Cellular automata based robust watermarkng archtecture towards the VLSI realzaton. World Academy of Scence, Engneerng and Technology, 2007, vol. 3, no. 8, p [8] ALVAREZ, G., HERNANDEZ ENCINAS, L., MARTIN DEL REY, A. A multsecret sharng scheme for color mages based on cellular automata. Informaton Scences, 2008, vol. 78, no. 22, p DOI: 0.06/j.ns [9] ESLAMI, Z., RAZZAGHI, S. H., ZAREPOUR AHMADABADI, J. Z. Secret mage sharng based on cellular automata and steganography. Pattern Recognton, 200, vol. 43, no., p DOI: 0.06/j.patcog [0] ESLAMI, Z., ZAREPOUR AHMADABADI, J. A verfable multsecret sharng scheme based on cellular automata. Informaton Scences, 200, vol. 80, no. 5, p DOI: DOI:0.06/j.ns [] JIN, J., WU, Z. A secret mage sharng based on neghbourhood confguratons of 2-D cellular automata. Optcs and Laser Technology, 202, vol. 44, no. 3, p DOI: 0.06/j.optlastec [2] CHEN, R. J., LU, W. K., LAI, J. L. Image encrypton usng progressve cellular automata substtuton and SCAN. In Proceedngs of the IEEE Internatonal Symposum on Crcuts and Systems (ISCAS 05). 2005, vol. 2, p DOI: 0.09/ISCAS [3] CHEN, R. J., CHEN, Y. H., CHEN, C. S., LAI, J. L. Image encrypton/decrypton system usng 2-D cellular automata. In Proceedngs of the IEEE 0th Internatonal Symposum on Consumer Electroncs (ISCE 06). St. Petersburg, 2006, p. 65 to 656. DOI: 0.09/ISCE [4] HERNANDEZ ENCINAS, L., MARTIN DEL REY, A., HERNANDEZ ENCINAS, A. Encrypton of mages wth 2- dmensonal cellular automata. In Proceedngs of the 8th Internatonal Conference on Informaton Systems Analyss and Synthess (ISAS 02). 2002, p [5] HABIBIPOUR, M., MAAREFDOUST, R., YAGHOBI, M., RAHATI, S. An mage encrypton system by 2D memorzed cellular automata and chaos mappng. In Proceedngs of the 6th Internatonal Conference on Dgtal Content, Multmeda Technology and Its Applcatons (IDC 0). 200, p [6] JIN, J. An mage encrypton based on elementary cellular automata. Optcs and Lasers n Engneerng, 202, vol. 50, no. 2, p DOI: 0.06/j.optlaseng [7] YU, L., LI, Y. X., XIA, X. W. Image encrypton algorthm based on self-adaptve symmetrcal-coupled toggle cellular automata. In Proceedngs of the st Internatonal Congress on Image and Sgnal Processng (CISP 08). Sanya (Chna), 2008, p DOI: 0.09/CISP [8] MALEKI, F., MOHADES, A., MEHDI HASHEMI, S., SHIRI, M. E. An mage encrypton system by cellular automata wth memory. In Proceedngs of the 3rd Internatonal Conference on Avalablty, Securty, and Relablty (ARES 08). Barcelona (Span), 2008, p DOI: 0.09/ARES [9] CHEN, R. J., LAI, J. L. Image securty system usng recursve cellular automata substtuton. Pattern Recognton, 2007, vol. 40, no. 5, p DOI: 0.06/j.patcog [20] CHEN, R. J., HORNG, S. J. Novel SCAN-CA-based mage securty system usng SCAN and 2-D von Neumann cellular automata. Sgnal Processng, 200, vol. 25, no. 6, p DOI: 0.06/j.mage [2] ZHANG, X., WANG, C., ZHONG, S., YAO, Q. Image encrypton scheme based on balanced two-dmensonal cellular automata. Mathematcal Problems n Engneerng, 203, vol. 203, 0 p. DOI: 0.55/203/ [22] WANG, X., LUAN, D. A novel mage encrypton algorthm usng chaos and reversble cellular automata. Communcatons n Nonlnear Scence and Numercal Smulaton, 203, vol. 8, no., p DOI: 0.06/j.cnsns [23] ROSIN, P. L. Tranng cellular automata for mage processng. IEEE Transacton on Image Processng, 2006, vol. 5, no. 7, p DOI: 0.09/TIP [24] SUN, X., ROSIN, P. L., MARTIN, R. R. Fast rule dentfcaton and neghborhood selecton for cellular automata. IEEE Transactons on Systems, Man, and Cybernetcs Part B: Cybernetcs, 20, vol. 4, no. 3, p DOI: 0.09/TSMCB About the Authors... Djana TRALIĆ receved her PhD degree n Electrcal Engneerng from the Unversty of Zagreb n 205. Her research nterests nclude sgnal and mage processng, mage forenscs and broadcastng technologes. She s the author of 5 conference papers, one journal paper, one book chapter, and edtor of 3 conference proceedngs. Sonja GRGIĆ receved her PhD degree n Electrcal Engneerng from the Unversty of Zagreb n 996, where she s currently a Professor. Her research nterests nclude mage qualty evaluaton methods, televson sgnal transmsson, vdeo communcaton technologes and mage forenscs. She s the author of 5 book chapters, 20 scentfc journal papers, more than 40 papers publshed on nternatonal scentfc conferences as well as of 5 revewed studes and expert works. She was the edtor of 8 nternatonal conference proceedngs.

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Department of Mathematics, Shantou University, Shantou, Guangdong, , China.

Department of Mathematics, Shantou University, Shantou, Guangdong, , China. 205 Internatonal Conference on Computer Scence and Communcaton Engneerng (CSCE 205) ISN: 978--60595-249-9 A Novel Color Image Encrypton Scheme ased on Permutaton-substtuton Archtecture Ru-Song Ye,a, Mng

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Image Encryption Using Chaotic Signal and Max Heap Tree

Image Encryption Using Chaotic Signal and Max Heap Tree Image Encrypton Usng Chaotc Sgnal and Max Heap Tree Farborz Mahmoud 1, Rasul Enayatfar 2, and Mohsen Mrzashaer 1 1 Electrcal and Computer Engneerng Department, Islamc Azad Unversty, Qazvn Branch, Iran

More information

arxiv:cs.cv/ Jun 2000

arxiv:cs.cv/ Jun 2000 Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Kayhan CELİK. Erol KURT. x ' ay ax. y ' xz rx y. z ' xy bz

Kayhan CELİK. Erol KURT. x ' ay ax. y ' xz rx y. z ' xy bz ECAI 216 - Internatonal Conference 8th Edton Electroncs, Computers and Artfcal Intellgence 3 June -2 July, 216, Bucharest, ROMÂIA A ew Image Encrypton Algorthm Based on Lorenz System Kayhan CELİK Gaz Unversty,

More information

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems I. J. Computer Network and Informaton Securty 5 5 5-33 Publshed Onlne Aprl 5 n MECS (http://www.mecs-press.org/) DOI:.585/jcns.5.5.4 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

Faster Image Encryption: A Semi-Tensor Product Approach

Faster Image Encryption: A Semi-Tensor Product Approach 207 Internatonal Conference on Computer Scence and Applcaton Engneerng (CSAE 207) ISBN: 978--60595-505-6 Faster Image Encrypton: A Sem-Tensor Product Approach Shpng Ye, Jnmng Wang *, Zhenyu Xu and Chaoxang

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

Hiding data in images by simple LSB substitution

Hiding data in images by simple LSB substitution Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Sgnal & Image Processng : An Internatonal Journal (SIPIJ) Vol.5, No.4, August 2014 IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Suman Shrestha 1, 2 1 Unversty of Massachusetts Medcal School,

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

EGR 544 Communication Theory

EGR 544 Communication Theory EGR 544 Communcaton Theory. Informaton Sources Z. Alyazcoglu Electrcal and Computer Engneerng Department Cal Poly Pomona Introducton Informaton Source x n Informaton sources Analog sources Dscrete sources

More information

Regularized Discriminant Analysis for Face Recognition

Regularized Discriminant Analysis for Face Recognition 1 Regularzed Dscrmnant Analyss for Face Recognton Itz Pma, Mayer Aladem Department of Electrcal and Computer Engneerng, Ben-Guron Unversty of the Negev P.O.Box 653, Beer-Sheva, 845, Israel. Abstract Ths

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant Tutoral 2 COMP434 ometrcs uthentcaton Jun Xu, Teachng sstant csjunxu@comp.polyu.edu.hk February 9, 207 Table of Contents Problems Problem : nswer the questons Problem 2: Power law functon Problem 3: Convoluton

More information

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1 A New Metrc for Qualty Assessment of Dgtal Images Based on Weghted-Mean Square Error Proceedngs of SPIE, vol. 4875, 2002 Kawen Zhang, Shuozhong Wang, and Xnpen Zhang School of Communcaton and Informaton

More information

Multigradient for Neural Networks for Equalizers 1

Multigradient for Neural Networks for Equalizers 1 Multgradent for Neural Netorks for Equalzers 1 Chulhee ee, Jnook Go and Heeyoung Km Department of Electrcal and Electronc Engneerng Yonse Unversty 134 Shnchon-Dong, Seodaemun-Ku, Seoul 1-749, Korea ABSTRACT

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000 Novel Pre-Compresson Rate-Dstorton Optmzaton Algorthm for JPEG 2000 Yu-We Chang, Hung-Ch Fang, Chung-Jr Lan, and Lang-Gee Chen DSP/IC Desgn Laboratory, Graduate Insttute of Electroncs Engneerng Natonal

More information

Microwave Diversity Imaging Compression Using Bioinspired

Microwave Diversity Imaging Compression Using Bioinspired Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,

More information

Clock-Gating and Its Application to Low Power Design of Sequential Circuits

Clock-Gating and Its Application to Low Power Design of Sequential Circuits Clock-Gatng and Its Applcaton to Low Power Desgn of Sequental Crcuts ng WU Department of Electrcal Engneerng-Systems, Unversty of Southern Calforna Los Angeles, CA 989, USA, Phone: (23)74-448 Massoud PEDRAM

More information

A new Approach for Solving Linear Ordinary Differential Equations

A new Approach for Solving Linear Ordinary Differential Equations , ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of

More information

A NEW DISCRETE WAVELET TRANSFORM

A NEW DISCRETE WAVELET TRANSFORM A NEW DISCRETE WAVELET TRANSFORM ALEXANDRU ISAR, DORINA ISAR Keywords: Dscrete wavelet, Best energy concentraton, Low SNR sgnals The Dscrete Wavelet Transform (DWT) has two parameters: the mother of wavelets

More information

Modal Strain Energy Decomposition Method for Damage Detection of an Offshore Structure Using Modal Testing Information

Modal Strain Energy Decomposition Method for Damage Detection of an Offshore Structure Using Modal Testing Information Thrd Chnese-German Jont Symposum on Coastal and Ocean Engneerng Natonal Cheng Kung Unversty, Tanan November 8-16, 2006 Modal Stran Energy Decomposton Method for Damage Detecton of an Offshore Structure

More information

Introduction to Information Theory, Data Compression,

Introduction to Information Theory, Data Compression, Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures

More information

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School

More information

A Network Intrusion Detection Method Based on Improved K-means Algorithm

A Network Intrusion Detection Method Based on Improved K-means Algorithm Advanced Scence and Technology Letters, pp.429-433 http://dx.do.org/10.14257/astl.2014.53.89 A Network Intruson Detecton Method Based on Improved K-means Algorthm Meng Gao 1,1, Nhong Wang 1, 1 Informaton

More information

Improvement of Histogram Equalization for Minimum Mean Brightness Error

Improvement of Histogram Equalization for Minimum Mean Brightness Error Proceedngs of the 7 WSEAS Int. Conference on Crcuts, Systems, Sgnal and elecommuncatons, Gold Coast, Australa, January 7-9, 7 3 Improvement of Hstogram Equalzaton for Mnmum Mean Brghtness Error AAPOG PHAHUA*,

More information

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic Internatonal Journal of Computer Applcatons Technology and Research A New Desgn of Multpler usng Modfed Booth Algorthm and Reversble Gate Logc K.Nagarjun Department of ECE Vardhaman College of Engneerng,

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

This column is a continuation of our previous column

This column is a continuation of our previous column Comparson of Goodness of Ft Statstcs for Lnear Regresson, Part II The authors contnue ther dscusson of the correlaton coeffcent n developng a calbraton for quanttatve analyss. Jerome Workman Jr. and Howard

More information

PARTICIPATION FACTOR IN MODAL ANALYSIS OF POWER SYSTEMS STABILITY

PARTICIPATION FACTOR IN MODAL ANALYSIS OF POWER SYSTEMS STABILITY POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 86 Electrcal Engneerng 6 Volodymyr KONOVAL* Roman PRYTULA** PARTICIPATION FACTOR IN MODAL ANALYSIS OF POWER SYSTEMS STABILITY Ths paper provdes a

More information

A Novel Fuzzy logic Based Impulse Noise Filtering Technique

A Novel Fuzzy logic Based Impulse Noise Filtering Technique Internatonal Journal of Advanced Scence and Technology A Novel Fuzzy logc Based Impulse Nose Flterng Technque Aborsade, D.O Department of Electroncs Engneerng, Ladoke Akntola Unversty of Tech., Ogbomoso.

More information

NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS

NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS IJRRAS 8 (3 September 011 www.arpapress.com/volumes/vol8issue3/ijrras_8_3_08.pdf NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS H.O. Bakodah Dept. of Mathematc

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Multiple Sound Source Location in 3D Space with a Synchronized Neural System

Multiple Sound Source Location in 3D Space with a Synchronized Neural System Multple Sound Source Locaton n D Space wth a Synchronzed Neural System Yum Takzawa and Atsush Fukasawa Insttute of Statstcal Mathematcs Research Organzaton of Informaton and Systems 0- Mdor-cho, Tachkawa,

More information

GEMINI GEneric Multimedia INdexIng

GEMINI GEneric Multimedia INdexIng GEMINI GEnerc Multmeda INdexIng Last lecture, LSH http://www.mt.edu/~andon/lsh/ Is there another possble soluton? Do we need to perform ANN? 1 GEnerc Multmeda INdexIng dstance measure Sub-pattern Match

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

Operating conditions of a mine fan under conditions of variable resistance

Operating conditions of a mine fan under conditions of variable resistance Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

A Novel Quality Measure for Information Hiding in Images

A Novel Quality Measure for Information Hiding in Images A Novel Qualty Measure for Informaton Hdng n s KA Navas Aravnd M SasKumar M Asstant rofessor G student rofessor College Of Engneerng College of Engneerng Maran Engneerng College Trvandrum,Inda Trvandrum,Inda

More information

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k) ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Evaluation of Validation Metrics. O. Polach Final Meeting Frankfurt am Main, September 27, 2013

Evaluation of Validation Metrics. O. Polach Final Meeting Frankfurt am Main, September 27, 2013 Evaluaton of Valdaton Metrcs O. Polach Fnal Meetng Frankfurt am Man, September 7, 013 Contents What s Valdaton Metrcs? Valdaton Metrcs evaluated n DynoTRAIN WP5 Drawbacks of Valdaton Metrcs Conclusons

More information

Analysis of the Magnetomotive Force of a Three-Phase Winding with Concentrated Coils and Different Symmetry Features

Analysis of the Magnetomotive Force of a Three-Phase Winding with Concentrated Coils and Different Symmetry Features Analyss of the Magnetomotve Force of a Three-Phase Wndng wth Concentrated Cols and Dfferent Symmetry Features Deter Gerlng Unversty of Federal Defense Munch, Neubberg, 85579, Germany Emal: Deter.Gerlng@unbw.de

More information

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua

More information

One-sided finite-difference approximations suitable for use with Richardson extrapolation

One-sided finite-difference approximations suitable for use with Richardson extrapolation Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,

More information

arxiv: v2 [cs.cr] 29 Sep 2016

arxiv: v2 [cs.cr] 29 Sep 2016 Internatonal Journal of Bfurcaton and Chaos c World Scentfc Publshng Company Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton arxv:107.6536v [cs.cr] 9 Sep 016 Chengqng L

More information

High resolution entropy stable scheme for shallow water equations

High resolution entropy stable scheme for shallow water equations Internatonal Symposum on Computers & Informatcs (ISCI 05) Hgh resoluton entropy stable scheme for shallow water equatons Xaohan Cheng,a, Yufeng Ne,b, Department of Appled Mathematcs, Northwestern Polytechncal

More information

Average Decision Threshold of CA CFAR and excision CFAR Detectors in the Presence of Strong Pulse Jamming 1

Average Decision Threshold of CA CFAR and excision CFAR Detectors in the Presence of Strong Pulse Jamming 1 Average Decson hreshold of CA CFAR and excson CFAR Detectors n the Presence of Strong Pulse Jammng Ivan G. Garvanov and Chrsto A. Kabachev Insttute of Informaton echnologes Bulgaran Academy of Scences

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Chapter 7 Channel Capacty and Codng Contents 7. Channel models and channel capacty 7.. Channel models Bnary symmetrc channel Dscrete memoryless channels Dscrete-nput, contnuous-output channel Waveform

More information

Chapter 8 SCALAR QUANTIZATION

Chapter 8 SCALAR QUANTIZATION Outlne Chapter 8 SCALAR QUANTIZATION Yeuan-Kuen Lee [ CU, CSIE ] 8.1 Overvew 8. Introducton 8.4 Unform Quantzer 8.5 Adaptve Quantzaton 8.6 Nonunform Quantzaton 8.7 Entropy-Coded Quantzaton Ch 8 Scalar

More information

A New Evolutionary Computation Based Approach for Learning Bayesian Network

A New Evolutionary Computation Based Approach for Learning Bayesian Network Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang

More information

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control An Upper Bound on SINR Threshold for Call Admsson Control n Multple-Class CDMA Systems wth Imperfect ower-control Mahmoud El-Sayes MacDonald, Dettwler and Assocates td. (MDA) Toronto, Canada melsayes@hotmal.com

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

Statistical Energy Analysis for High Frequency Acoustic Analysis with LS-DYNA

Statistical Energy Analysis for High Frequency Acoustic Analysis with LS-DYNA 14 th Internatonal Users Conference Sesson: ALE-FSI Statstcal Energy Analyss for Hgh Frequency Acoustc Analyss wth Zhe Cu 1, Yun Huang 1, Mhamed Soul 2, Tayeb Zeguar 3 1 Lvermore Software Technology Corporaton

More information

Research Article Green s Theorem for Sign Data

Research Article Green s Theorem for Sign Data Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of

More information

A Fast Computer Aided Design Method for Filters

A Fast Computer Aided Design Method for Filters 2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Performing Modulation Scheme of Chaos Shift Keying with Hyperchaotic Chen System

Performing Modulation Scheme of Chaos Shift Keying with Hyperchaotic Chen System 6 th Internatonal Advanced echnologes Symposum (IAS 11), 16-18 May 011, Elazığ, urkey Performng Modulaton Scheme of Chaos Shft Keyng wth Hyperchaotc Chen System H. Oğraş 1, M. ürk 1 Unversty of Batman,

More information

Big Data Fast Encryption Algorithm in the Cloud Environment Based on the Constraints of the Shared Resources

Big Data Fast Encryption Algorithm in the Cloud Environment Based on the Constraints of the Shared Resources Revsta de la Facultad de Ingenería U.C.V., Vol. 32, N 0, pp. 796-805, 207 Bg Data Fast Encrypton Algorthm n the Cloud Envronment Based on the Constrants of the Shared Resources Yng Wang Informaton Engneerng

More information

Quantum and Classical Information Theory with Disentropy

Quantum and Classical Information Theory with Disentropy Quantum and Classcal Informaton Theory wth Dsentropy R V Ramos rubensramos@ufcbr Lab of Quantum Informaton Technology, Department of Telenformatc Engneerng Federal Unversty of Ceara - DETI/UFC, CP 6007

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

Computer Simulations of Parallel-to-Series Conversion in Solid State Frame Transfer Image Sensors. J. Bisschop

Computer Simulations of Parallel-to-Series Conversion in Solid State Frame Transfer Image Sensors. J. Bisschop 207 SIMULATION OF SEMICONDUCTOR DEVICES AND PROCESSES Vol. 3 Edted by G. Baccaran, M. Rudan - Bologna (Italy) September 26-28,988 - Tecnoprnt Computer Smulatons of Parallel-to-Seres Converson n Sold State

More information

Turbulence classification of load data by the frequency and severity of wind gusts. Oscar Moñux, DEWI GmbH Kevin Bleibler, DEWI GmbH

Turbulence classification of load data by the frequency and severity of wind gusts. Oscar Moñux, DEWI GmbH Kevin Bleibler, DEWI GmbH Turbulence classfcaton of load data by the frequency and severty of wnd gusts Introducton Oscar Moñux, DEWI GmbH Kevn Blebler, DEWI GmbH Durng the wnd turbne developng process, one of the most mportant

More information

29th Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

29th Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies TESTING THE SPECTRAL DECONVOLUTION ALGORITHM TOOL (SDAT) WITH XE SPECTRA Steven R. Begalsk, Kendra M. Foltz Begalsk, and Derek A. Haas The Unversty of Texas at Austn Sponsored by Army Space and Mssle Defense

More information

Probability Theory (revisited)

Probability Theory (revisited) Probablty Theory (revsted) Summary Probablty v.s. plausblty Random varables Smulaton of Random Experments Challenge The alarm of a shop rang. Soon afterwards, a man was seen runnng n the street, persecuted

More information

Homework Assignment 3 Due in class, Thursday October 15

Homework Assignment 3 Due in class, Thursday October 15 Homework Assgnment 3 Due n class, Thursday October 15 SDS 383C Statstcal Modelng I 1 Rdge regresson and Lasso 1. Get the Prostrate cancer data from http://statweb.stanford.edu/~tbs/elemstatlearn/ datasets/prostate.data.

More information

Semi-supervised Classification with Active Query Selection

Semi-supervised Classification with Active Query Selection Sem-supervsed Classfcaton wth Actve Query Selecton Jao Wang and Swe Luo School of Computer and Informaton Technology, Beng Jaotong Unversty, Beng 00044, Chna Wangjao088@63.com Abstract. Labeled samples

More information

Short Term Load Forecasting using an Artificial Neural Network

Short Term Load Forecasting using an Artificial Neural Network Short Term Load Forecastng usng an Artfcal Neural Network D. Kown 1, M. Km 1, C. Hong 1,, S. Cho 2 1 Department of Computer Scence, Sangmyung Unversty, Seoul, Korea 2 Department of Energy Grd, Sangmyung

More information

COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD

COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD Ákos Jósef Lengyel, István Ecsed Assstant Lecturer, Professor of Mechancs, Insttute of Appled Mechancs, Unversty of Mskolc, Mskolc-Egyetemváros,

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Global Sensitivity. Tuesday 20 th February, 2018

Global Sensitivity. Tuesday 20 th February, 2018 Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values

More information

On an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1

On an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1 On an Extenson of Stochastc Approxmaton EM Algorthm for Incomplete Data Problems Vahd Tadayon Abstract: The Stochastc Approxmaton EM (SAEM algorthm, a varant stochastc approxmaton of EM, s a versatle tool

More information

International Journal of Mathematical Archive-3(3), 2012, Page: Available online through ISSN

International Journal of Mathematical Archive-3(3), 2012, Page: Available online through   ISSN Internatonal Journal of Mathematcal Archve-3(3), 2012, Page: 1136-1140 Avalable onlne through www.ma.nfo ISSN 2229 5046 ARITHMETIC OPERATIONS OF FOCAL ELEMENTS AND THEIR CORRESPONDING BASIC PROBABILITY

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

/ n ) are compared. The logic is: if the two

/ n ) are compared. The logic is: if the two STAT C141, Sprng 2005 Lecture 13 Two sample tests One sample tests: examples of goodness of ft tests, where we are testng whether our data supports predctons. Two sample tests: called as tests of ndependence

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

Comparison of Regression Lines

Comparison of Regression Lines STATGRAPHICS Rev. 9/13/2013 Comparson of Regresson Lnes Summary... 1 Data Input... 3 Analyss Summary... 4 Plot of Ftted Model... 6 Condtonal Sums of Squares... 6 Analyss Optons... 7 Forecasts... 8 Confdence

More information

COEFFICIENT DIAGRAM: A NOVEL TOOL IN POLYNOMIAL CONTROLLER DESIGN

COEFFICIENT DIAGRAM: A NOVEL TOOL IN POLYNOMIAL CONTROLLER DESIGN Int. J. Chem. Sc.: (4), 04, 645654 ISSN 097768X www.sadgurupublcatons.com COEFFICIENT DIAGRAM: A NOVEL TOOL IN POLYNOMIAL CONTROLLER DESIGN R. GOVINDARASU a, R. PARTHIBAN a and P. K. BHABA b* a Department

More information

Effectiveness of Virtualization Data Protection at Full Priori Sources of Uncertainty

Effectiveness of Virtualization Data Protection at Full Priori Sources of Uncertainty Amercan Journal of Computaton, Communcaton and Control 2017; 4(3): 16-22 http://www.aasct.org/journal/ajccc ISSN: 2375-3943 Effectveness of Vrtualzaton Data Protecton at Full Pror Sources of Uncertanty

More information

RELIABILITY ASSESSMENT

RELIABILITY ASSESSMENT CHAPTER Rsk Analyss n Engneerng and Economcs RELIABILITY ASSESSMENT A. J. Clark School of Engneerng Department of Cvl and Envronmental Engneerng 4a CHAPMAN HALL/CRC Rsk Analyss for Engneerng Department

More information