Fast Copy-Move Forgery Detection

Size: px
Start display at page:

Download "Fast Copy-Move Forgery Detection"

Transcription

1 Fast Copy-Move Forgery Detecton HWEI-JEN LIN 1, CHUN-WEI WANG 1 and YANG-TA KAO 2 1 Department of Informaton Engneerng and Computer Scence Tamkang Unversty 2 Department of Network Informaton Technology Chhlee Insttute of Technology Yng-Chuan Road, Tamsu Tape, Tawan, ROC Wun-Hua Road, Sec. 1, Bancao, Tape, Tawan, ROC @mal.tku.edu.tw, 2 ydkao@mal.chhlee.edu.tw, Abstract: - Ths paper proposes a method for detectng copy-move forgery over mages tampered by copy-move. To detect such forgeres, the gven mage s dvded nto overlappng blocks of equal sze, feature for each block s then extracted and represented as a vector, all the extracted feature vectors are then sorted usng the radx sort. The dfference (shft vector) of the postons of every par of adjacent feature vectors n the sortng lst s computed. The accumulated number of each of the shft vectors s evaluated. A large accumulated number s consdered as possble presence of a duplcated regon, and thus all the feature vectors correspondng to the shft vectors wth large accumulated numbers are detected, whose correspondng blocks are then marked to form a tentatve detected result. Fnally, the medum flterng and connected component analyss are performed on the tentatve detected result to obtan the fnal result. Compared wth other methods, employng the radx sort makes the detecton much more effcent wthout degradaton of detecton qualty. Key-Words: - Forgery Detecton, Copy-move Forgery, Sngular Value Decomposton (SVD), Prncpal Component Analyss (PCA), Lexcographcal Sort, Scale Invarant Feature Transform (SIFT) Descrptors, Log-polar Coordnates, Radx Sort, Connected Component Analyss 1 Introducton Art forgery dates back more than two-thousand years. Wth the wdespread use of Internet and avalablty of powerful mage processng and edtng software, dgtal mages are easy to acqure through nternet and to manpulate and edt. For example, the mage Fonda Speak To Vetnam Veterans At Ant-War Rally shown n Fg. 1 was syntheszed usng the two mages shown n Fg.s 1 and 1. For protectng copyrght and preventng forgery or alteraton of document wth malcous ntentons, the tasks of forgery detecton become more and more urgent. Recently, varous technques for temper or forgery detecton or even recovery have been proposed n the lterature. Some technques have been proposed for mage tamper detecton and recovery. Varous watermark technques [1][2][3][4][5][6] have been proposed n recent years, whch can be used not only for authentcaton, but also for beng an evdence for the tamper detecton. Wang et al. [7] and Ln et al. [8] both embedded watermarks consstng of the authentcaton data and the recovery data nto mage blocks for mage tamper detecton and recovery n the future. An example of mage tamper detecton and recovery gven by Ln et al. [8] s shown n Fg. 2. L et al. [9] transformed the mage from ts spatal doman to the frequency doman based on the DWT, extracted some nformaton from the frequency doman as the egenvalue of ths mage, and then hd ths egenvalue n the mddle frequency band of the frequency doman as an evdence for the tamper detecton. The egenvalue hdden n the mage could be used to recover ths mage The drawback of watermark technques s that one must embed a watermark nto the mage frst. Many other technques that work n the absence of any dgtal watermark or sgnature have been proposed. Popescu [10] detected resamplng (e.g., scalng or rotatng) based on statstcal correlatons. E. S. Gop et al. [11] exploted the property of correlaton by usng Auto Regressve coeffcents as the feature ISSN: Issue 5, Volume 5, May 2009

2 vector for dentfyng the locaton of dgtal forgery n a sample mage. The major weakness of ths approach s that t s only applcable to uncompressed TIFF mages, and JPEG and GIF mages wth mnmal compresson. Some researchers [12][13][14][15] estmated lght source drecton [16] and used lghtng nconsstences for revealng traces of dgtal tamperng. Defects of cameras such as chromatc aberraton [17][18] and sensor pattern nose [19][20][21], and the color flter arrays the cameras use for nterpolatng colors can be also used to detect forgeres [22]. Fg. 1.. A syntheszed mage Fonda Speak To Vetnam Veterans At Ant-War Rally ; &. orgnal mages. et al. [25] appled DWT to the gven mage, and used SVD on fxed-sze blocks of low-frequency component n wavelet sub-band to yeld a reduced dmenson representaton, then lexcographcally sorted the SV vectors to detect duplcated mage blocks. A. C. Popescu et al. [24] appled a prncpal component analyss (PCA) on small fxed-sze mage blocks to yeld a reduced dmenson representaton. Duplcated regons are then detected by lexcographcally sortng all of the mage blocks. W. Luo et al. [26] also frst dvded an mage nto small overlapped blocks and extracted block characterstcs vector, and then compared the smlarty of these blocks to dentfy possble duplcated regons. A. N. Myna et al. [27] presented an approach based on the applcaton of wavelet transform that detects and performed exhaustve search to dentfy the smlar blocks n the mage by mappng them to log-polar coordnates and usng phase correlaton as the smlarty crteron. H. Huang et al. [28] frst extracted SIFT descrptors of an mage, whch are nvarant to changes n llumnaton, rotaton, scalng etc. Owng to the smlarty between pasted regon and coped regon, descrptors are then matched between each other to seek for any possble forgery n mages. Fg. 3 shows some examples of copy-move forgery detecton results yelded by the method proposed by A. N. Myna et al. [27] and by the method proposed by H. Huang [28]. (d) (d) (e) (f) Fg. 2. Image tamper detecton and recovery. orgnal mage;. tampered mage;. result of temper detecton; (d). recovered mage. Copy-move forgery s a specfc type of mage tamperng, where a part of the mage s coped and pasted. Many methods have been proposed to detect copy-move forgeres [23][24][25][26][27][28]. G. L (g) (h) () Fg. 3., &. orgnal mages; (d), (e), & (f). detected results by A. N. Myna et al.; (g), (h), & (). detected results by H. Huang et al.. ISSN: Issue 5, Volume 5, May 2009

3 A good copy-move forgery detector should be robust to some types of manpulatons ncludng lossy compresson, Gaussan nose, and rotaton or scalng. Most of the exstng methods do not deal wth all those manpulatons and are tme-consumng. In ths paper, we focus on detecton of the copy-move forgery, and propose an effcent method for detectng copy-move forgeres n dgtal mages, whch s robust to some types of manpulatons ncludng lossy compresson, Gaussan nose, and rotaton. To mprove the computatonal complexty n detectng the regons of forgeres, we propose to use the radx sort for sortng the feature vectors of the dvded sub-blocks, as an alternatve to lexcographc sortng, whch s commonly used by the exstng copy-move forgery detecton schemes. Our expermental results show that the proposed method can detect copy-move forgeres n the mages very accurately, even when the coped regon was undergone severe mage manpulatons, such as addtve Gaussan nose, lossy JPEG compresson, and rotaton etc, or even compound processng. In addton, t s observed that use of radx sort consderably mproves the tme effcency at the expense of a slght reducton n the robustness. The rest of ths paper s organzed as follows. Related work s dscussed n Secton 2. In Secton 3, the proposed method s descrbed n detals. In Sectons 4 and 5, we show some expermental results and make a concluson for ths paper. respectvely. If we let v(x) denote the feature vector of a block X, then v(a 1 ) = v(b 1 ), v(a 2 ) = v(b 2 ), and v(a 3 ) = v(b 3 ). When the feature vectors are sorted, dentcal vectors would be grouped together n the sorted lst, as shown n Fg. 4, from whch the duplcated regons could be easly detected. The tme requred by sortng the feature vectors s dependent on both the total number of dvded blocks and the sze of feature vectors. 2 Related Work In most methods of copy-move forgery detecton, the detected mage s dvded nto overlappng blocks of equal sze, whch are represented n the form of (feature) vectors, and then lexcographcally sorted for later detecton. Suppose a detected mage of sze N N s dvded nto k = (N-b+1) 2 overlappng blocks of sze b b, represented as vectors of length b 2. In the sorted lst, vectors correspondng to blocks of smlar content would be close to each other n the lst, and thus dentcal regons could be easly detected by evaluatng shft vectors formed by pars of adjacent feature vectors, and detectng large accumulated numbers of shft vectors. The mage shown n Fg. 4 s a tampered result, where the regons enclosed by dotted rectangles are duplcated, of the orgnal mage gven n Fg. 4 by ncurrng copy-move forgery. Dvdng the tempered mage nto overlappng blocks for forgery detecton, we can observe that, for example, blocks B 1, B 2, and B 3 are copes of blocks A 1, A 2, and A 3, Fg. 4.. An orgnal mage;. Three pars of dentcal blocks are enclosed by blue squares;. Sorted lst of feature vectors, n whch dentcal vectors. ISSN: Issue 5, Volume 5, May 2009

4 A. C. Popescu et al. [24] used the prncple component analyss (PCA) and represented each block of sze as a feature vector of length 32, and lexcographcally sorted the vectors n O(32 k lgk) tme. The tme complexty for sortng was reduced by G. L et al. [25] to O(8k lgk) by the use of SVD. W. Luo et al. [26] defned a feature vector of 7-dmenson to represent blocks so as the tme complexty for sortng was further reduced to O(7k lgk). In ths paper, we shall propose a further effcent method for sortng the feature vectors, whose tme complexty s reduced to O(9k ). f x f = Ave ( B) = Ave ( S 1 ) /(4 Ave ( B) + ε 1 ) f = Ave ( S 5 ) Ave ( B) = where f 255 f f m m 1 m 2 + ε 2 m 1 = max 6 9 f = 1, { f } and m = mn { f }. 2 f 2 5, f 6 9. f = 1, f 2 5, f 6 9, 6 9 (1) (2 ) 3 The Proposed Method For resstng aganst varous modfcatons and mprovng the effcency for sortng feature vectors, we represent each block B of sze b b ( = ) by a 9-dmensonal feature vector v B = (x 1, x 2,, x 9 ), whch s defned as follows. Frstly, the block B s dvded nto four equal-szed sub-blocks, S 1, S 2, S 3, and S 4, as shown n Fg. 5 and let Ave(.) denote the average ntensty functon. Then as descrbed n (1), f 1 denotes the average ntensty of the block B, the entres f 2, f 3, f 4, and f 5 denote the ratos of the average ntenstes of the blocks S 1, S 2, S 3, and S 4 to f 1, respectvely, and f 6, f 7, f 8, and f 9 stand for the dfferences of the average ntenstes of the blocks S 1, S 2, S 3, and S 4 from f 1, respectvely. Fnally, entres f s are normalzed to ntegers x s rangng from 0 to 255, as descrbed n (2), where denotes a floor operator. Although these 9 enttes contan duplcated nformaton, they together possess hgher capablty of resstance aganst some modfcatons, such as JPEG compresson and Gaussan nose. Unlke the matrx constructed by A. C. Popescu et al. [24], whch stores floatng numbers, the feature vectors we extract store ntegers. As a result, we may use the effcent radx sort algorthm to perform lexcographcal sortng over those vectors. If the gven mage of sze N N s dvded nto overlappng blocks of sze b b, then there are 2 totally k blocks, where k = ( N b +1). Let v 1, v 2,,v k be the feature vectors correspondng to these k blocks. To perform radx sort on these vectors of sze 9, we regard each of them as a 9-dgt number wth each dgt rangng from 0 to 255. The sortng algorthm s gven n the followng, where the nput array A stores these vectors; that s, A[] = v, 1 k, and d = 9. RADIX-SORT(A,d) for j 1 to d do use a stable sort to sort array A on dgt j Block B Fg. 5. A block B s dvded nto four equal-szed sub-blocks S 1, S 2, S 3, and S 4. Snce each dgt n the vectors, rangng from 0 to 255, s not large, countng sort s chosen as the stable sort used n the radx sort. Each pass over k numbers then takes tme O(256+k). There are 9 passes, so the total tme for sortng the feature vectors s O(9(256+k)) = O(9k) snce 256 << k. From what follow, we let v 1, v 2,,v k denote sorted lst of the feature vectors of blocks B 1, B 2,, B k, respectvely. The poston of the top-left corner pont of each block B s recorded n P(B ) and a shft vector s defned as the dfference of two adjacent feature vectors n the sorted lst as shown n (3).Two duplcated regons caused by copy-move forgery form a number of pars of dentcal feature vectors, each par then make the same shft vector, thus the ISSN: Issue 5, Volume 5, May 2009

5 accumulatve number of a shft vector can be used to detect the duplcated regons. u( ) = P( B + 1) P( B ) (3) As the example llustrated n Fg. 6, several pars of correspondng feature vector make same vector u, whose accumulatve number s 7 n ths example. Wth those accumulatve numbers of shft vectors, we detect the duplcated regons as follows. For the accumulatve number of a shft vector greater than a gven threshold T 1, the four corner ponts of all the correspondng blocks are marked. For example, f the accumulated number of a shft vector u 0 s greater than T 1, then for each, the top-left ponts of the respectve blocks B and B +1 correspondng to v and v +1 are marked f u() = u 0. Fg. 7 shows the result of marked ponts for Fg. 4. Fnally, the medum flterng s performed to remove noses and the connected component analyss s appled to obtan the fnal detected result as gven n Fg. 7. Fg. 7.. Corner ponts of detected blocks are marked accordng to the accumulated numbers of shft vectors for the tampered mage gven n Fg. 4;. fnal detected result. Fg. 6. Duplcated regons form several dentcal shft vector u. To deal wth rotaton, we smply detect on the gven mage assocated wth ts rotated versons. In our experments, we consdered rotatons through angles of 90, 180, and 270 degrees. Ths way we may detect rotated copy-move forgeres wth any angle of rotaton. As shown n Fg. 8, the regon s coped, rotated by angle 90 degrees, and pasted to another regon n the mage. In ths case, the accumulated number of shft vectors cannot reflect the duplcaton. To detect rotated coped mages, we combne three rotated versons of the mage wth the orgnal one, and perform forgery detecton on ths combned mage. Fg. 8. A regon s coped, rotated through 90 degrees, and pasted to another regon. 4 The Expermental Results The proposed method was mplemented on a computer of CPU 3.0GHz wth memory 1GB. The ISSN: Issue 5, Volume 5, May 2009

6 test mages were cropped from 50 natural mages. We tested over 50 tampered mages wth no modfcaton, 150 tampered mages wth JPEG compresson, and 150 tampered mages wth Gaussan nose, 50 tampered mages wth rotaton mages, 150 tampered mages wth rotaton and Gaussan nose, and 150 tampered mages wth rotaton and JPEG compresson. For detectng on color mages, only the green channel s used snce the human eyes are most senstve to the green color. For parameter settng, we set b = 16, T 1 = 100, and T 2 = 10. More detected results over tampered mages are shown n Fg.s 9~11. Fg. 12 shows the detected results over compressed tampered mages wth varous qualty factors. Fg. 13 shows the detected results over some mages wth Gaussan nose at varous SNRs (sgnal to nose ratos). Fg. 14 shows the detected results over some mages wth rotaton. Table 1 shows detecton rates for some datasets of copy-move mages wth some modfcaton. Table 2 detecton rates for some datasets of copy-move mages wth rotaton and some other modfcaton. Fg. 9.. The orgnal mages;. the tampered mages;. the detectng results. Fg The orgnal mages;. the tampered mages;. the detectng results. ISSN: Issue 5, Volume 5, May 2009

7 Fg. 12. Detected results over compressed versons of the mage gven n Fg. (4a), wth varous qualty factors (QFs):. QF = 90;. QF = 70;. QF = 50. Fg The orgnal mages;. the tampered mages;. the detectng results. Fg. 13. Detected results for the mage gven n Fg. (4a) wth Gaussan nose at varous SNRs:. SNR = 10db;. SNR = 20db;. SNR = 35db. ISSN: Issue 5, Volume 5, May 2009

8 Table 1. Detecton rates for datasets of copy-move wth/wthout modfcaton. Data sets of Copy-move mages wthout mdfcaton JPEGcompresson QF = 100 JPEG compresson QF = 90 JPEG compresson QF = 80 Gaussan nose SNR = 10 Gaussan nose SNR = 20 Gaussan nose SNR = 35 No. of Detecton mages rate (%) be detected, our method does not deal wth rotaton arbtrary angles. In the future, we would lke to search for some feature nvarant to rotaton to deal wth ths problem. In addton to rotaton problem, we would try to extend our work to vdeo mages. Table 2. Detecton rates for datasets of copy-move mages wth rotaton and some other modfcaton. Data sets of Copy-move mages wth rotaton wthout mdfcaton JPEGcompresson QF = 100 JPEG compresson QF = 90 JPEG compresson QF = 80 Gaussan nose SNR = 10 Gaussan nose SNR = 20 Gaussan nose SNR = 35 No. of mages Detecton rate (%) Concluson and Future Work In ths paper, we propose an effcent method for copy-move forgery detecton. Usng of radx sort dramatcally mproves the tme complexty and the adopted features enhance the capablty of resstng of varous attacks such as JPEG compresson and Gaussan nose. Both effcency and hgh detecton rates have been demonstrated n our expermental results. However, a few small coped regons were not successfully detected. Although duplcated regons wth rotaton through some fxed angles can (d) Fg. 14. Detectng results for the rotated duplcated regons. ISSN: Issue 5, Volume 5, May 2009

9 Acknowledgements The work presented n ths paper was supported by the Natonal Scence Councl, grant NSC E References: [1] C. T. Hseh and Y. K. Wu, Geometrc Invarant Sem-fragle Image Watermarkng Usng Real Symmetrc Matrx, WSEAS Transacton on Sgnal Processng, Vol. 2, Issue 5, May 2006, pp [2] C. T. Hseh, Y. K. Wu, and K. M. Hung, An Adaptve Image Watermarkng System Usng Complementary Quantzaton, WSEAS Transacton on Informaton Scence and Applcatons, Vol. 3, Issue 12, 2006, pp [3] K. M. Hung, C. T. Hseh and Y. K. Wu, Mult-Purpose Watermarkng Schemes for Color Halftone Image Based on Wavelet and Zernke Transform, WSEAS Transacton on Computer, Vol. 6, Issue 1, 2007, pp [4] F. Hartung and M. Kutter, Multmeda Watermarkng Technques, n Proceedngs of the IEEE, Vol. 87, No. 7, July 1999, pp [5] P. Meerwald and A. Uhl, A Survey of Wavelet-Doman Watermarkng Algorthms, n Proceedubgs of SPIE, Electronc Imagng, Securty and Watermarkng of Multmeda Contents, Vol. 4314, 2001, pp [6] W. Lu, F. L. Chung, and H. Lu, Blnd Fake Image Detecton Scheme Usng SVD, IEICE Transacton on Communcatons, Vol. E89-B, No. 5, May 2006, pp [7] M. S. Wang and W. C. Chen, A Majorty-Votng based Watermarkng Scheme for Color Image Tamper Detecton and Recovery, Computer Standards & Interfaces, Vol. 29, Issue 5, 2007, pp [8] P. L. Ln, C. K. Hseh, and P. W. Huang, A Herarchcal Dgtal Watermarkng Method for Image Tamper Detecton and Recovery, Pattern Recognton, Vol. 38, Issue 12, 2005, pp [9] K. F. L, T. S. Chen, and S. C. Wu, Image Tamper Detecton and Recovery System Based on Dscrete Wavelet Transformaton, Internatonal Conference Communcatons, Computers and Sgnal Processng, Vol. 1, 2001, pp [10] A. C. Popescu and H. Fard, Exposng Dgtal Forgeres by Detectng Traces of Resamplng, IEEE Transactons on Sgnal Processng, Vol. 53, 2005, pp [11] E. S. Gop, N. Lakshmanan, T. Gokul, S. KumaraGanesh, and P. R. Shah, Dgtal Image Forgery Detecton usng Artfcal Neural Network and Auto Regressve Coeffcents, Electrcal and Computer Engneerng, 2006, pp [12] M. K. Johnson and H. Fard, Exposng Dgtal Forgeres by Detectng Inconsstences n Lghtng, n Proceedngs of ACM Multmeda and Securty Workshop, New York, 2005, pp [13] R. Brunell, Estmaton of Pose and Illumnant Drecton for Face Processng, Image and Vson Computng, Vol. 15, No. 10, October 1997, pp [14] A. P. Pentland, Fndng the llumnant drecton, Journal of the Optcal Socety of Amerca, Vol. 72, Issue 4, 1982, pp [15] W. Zhou and C. Kambhamettu, Estmaton of Illumnant Drecton and Intensty of Multple Lght Sources, n Proceedngs of the 7th European Conference on Computer Vson-Part IV, 2002, pp [16] P. Nllus and J. O. Eklundh, Automatc Estmaton of the Projected Lght Source Drecton, n Proceedngs of 2001 IEEE Computer Socety Conference on Computer Vson and Pattern Recognton, Vol. 1, 2001, pp [17] T. E. Boult and G. Wolberg, Correctng Chromatc Aberratons Usng Image Warpng, n Proceedngs of Computer Vson and Pattern Recognton, 1992, pp [18] M. K. Johnson and H. Fard, Exposng Dgtal Forgeres Through Chromatc Aberraton, n Proceedngs of the 8th workshop on Multmeda and securty, 2006, pp [19] J. Lukas, J. Frdch, and M. Goljan, Detectng Dgtal Image Forgeres Usng Sensor Pattern Nose, n Proceedngs of the SPIE Conference on Securty, Steganography, and Watermarkng of Multmeda Contents, Vol. 6072, January 2006, pp [20] N. Khanna, A. K. Mkklnen, G. T. C. Chu, J. P. Allebach, and E. J. Delp, Scanner Identfcaton Usng Sensor Pattern Nose, n Proceedngs of the SPIE Internatonal Conference on Securty, Steganography, and Watermarkng of Multmeda Contents IX, Vol. 6505, No. 1, 2007, pp K. [21] J. Lukas, J. Frdrch, and M. Goljan, Determnng Dgtal Image Orgn Usng Sensor Imperfectons, n Proceedngs of SPIE Electronc Imagng, Image and Vdeo ISSN: Issue 5, Volume 5, May 2009

10 Communcaton and Processng, January 16-20, 2005, pp [22] A. C. Popescu and H. Fard, Exposng Dgtal Forgeres n Color Flter Array Interpolated Images, IEEE Transactons on Sgnal Processng, Vol. 53, 2005, pp [23] J. Frdrch, D. Soukal, and J. Lukas, Detecton of Copy-Move Forgery n Dgtal Images, n Proceedngs of Dgtal Forensc Research Workshop, August [24] A. C. Popescu and H. Fard, Exposng Dgtal Forgeres by Detectng Duplcated Image Regons, Techncal Report, TR , Department of Computer Scence, Dartmouth College, [25] G. L, Q. Wu, D. Tu, and S. Sun, A Sorted Neghborhood Approach for Detectng Duplcated Regons n Image Forgeres based on DWT and SVD, n Proceedngs of IEEE Internatonal Conference on Multmeda and Expo, Bejng Chna, July 2-5, 2007, pp [26] W. Luo, J. Huang, and G. Qu, Robust Detecton of Regon Duplcaton Forgery n Dgtal Image, n Proceedngs of the 18th Internatonal Conference on Pattern Recognton, Vol. 4, 2006, pp [27] A. N. Myna, M. G. Venkateshmurthy, and C. G. Patl, Detecton of Regon Duplcaton Forgery n Dgtal Images Usng Wavelets and Log-Polar Mappng, n Proceedngs of the Internatonal Conference on Computatonal Intellgence and Multmeda Applcatons (ICCIMA 2007), Vol. 3, 2007, pp [28] H. Huang, W. Guo, and Y. Zhang, Detecton of Copy-Move Forgery n Dgtal Images Usng SIFT Algorthm, n Proceedngs of IEEE Pacfc-Asa Workshop on Computatonal Intellgence and Industral Applcaton, Vol. 2, 2008, pp ISSN: Issue 5, Volume 5, May 2009

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT Changqng Zhu 1 Zhwe Wang 2 Y Long 1 Chengsong Yang 2 1 Key Laboratory of Vrtual Geographc Envronment, Nanjng Normal Unversty, Nanjng 210054;2 Insttute

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

A NEW DISCRETE WAVELET TRANSFORM

A NEW DISCRETE WAVELET TRANSFORM A NEW DISCRETE WAVELET TRANSFORM ALEXANDRU ISAR, DORINA ISAR Keywords: Dscrete wavelet, Best energy concentraton, Low SNR sgnals The Dscrete Wavelet Transform (DWT) has two parameters: the mother of wavelets

More information

COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION. Erdem Bala, Dept. of Electrical and Computer Engineering,

COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION. Erdem Bala, Dept. of Electrical and Computer Engineering, COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION Erdem Bala, Dept. of Electrcal and Computer Engneerng, Unversty of Delaware, 40 Evans Hall, Newar, DE, 976 A. Ens Cetn,

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Regularized Discriminant Analysis for Face Recognition

Regularized Discriminant Analysis for Face Recognition 1 Regularzed Dscrmnant Analyss for Face Recognton Itz Pma, Mayer Aladem Department of Electrcal and Computer Engneerng, Ben-Guron Unversty of the Negev P.O.Box 653, Beer-Sheva, 845, Israel. Abstract Ths

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

A Self-embedding Robust Digital Watermarking Algorithm with Blind Detection

A Self-embedding Robust Digital Watermarking Algorithm with Blind Detection Sensors & Transducers Vol 77 Issue 8 August 04 pp 50-55 Sensors & Transducers 04 by IFSA Publshng S L http://wwwsensorsportalcom A Self-embeddng Robust Dgtal Watermarkng Algorthm wth Blnd Detecton Gong

More information

Unified Subspace Analysis for Face Recognition

Unified Subspace Analysis for Face Recognition Unfed Subspace Analyss for Face Recognton Xaogang Wang and Xaoou Tang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, Hong Kong {xgwang, xtang}@e.cuhk.edu.hk Abstract PCA, LDA

More information

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation Fourth Internatonal Conference on Image and Graphcs Rotaton Invarant Shape Contexts based on Feature-space Fourer Transformaton Su Yang 1, Yuanyuan Wang Dept of Computer Scence and Engneerng, Fudan Unversty,

More information

Hiding data in images by simple LSB substitution

Hiding data in images by simple LSB substitution Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty

More information

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant Tutoral 2 COMP434 ometrcs uthentcaton Jun Xu, Teachng sstant csjunxu@comp.polyu.edu.hk February 9, 207 Table of Contents Problems Problem : nswer the questons Problem 2: Power law functon Problem 3: Convoluton

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Change Detection: Current State of the Art and Future Directions

Change Detection: Current State of the Art and Future Directions Change Detecton: Current State of the Art and Future Drectons Dapeng Olver Wu Electrcal & Computer Engneerng Unversty of Florda http://www.wu.ece.ufl.edu/ Outlne Motvaton & problem statement Change detecton

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

GEMINI GEneric Multimedia INdexIng

GEMINI GEneric Multimedia INdexIng GEMINI GEnerc Multmeda INdexIng Last lecture, LSH http://www.mt.edu/~andon/lsh/ Is there another possble soluton? Do we need to perform ANN? 1 GEnerc Multmeda INdexIng dstance measure Sub-pattern Match

More information

Pattern Matching Based on a Generalized Transform [Final Report]

Pattern Matching Based on a Generalized Transform [Final Report] Pattern Matchng ased on a Generalzed Transform [Fnal Report] Ram Rajagopal Natonal Instruments 5 N. Mopac Expwy., uldng, Austn, T 78759-354 ram.rajagopal@n.com Abstract In a two-dmensonal pattern matchng

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

arxiv:cs.cv/ Jun 2000

arxiv:cs.cv/ Jun 2000 Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São

More information

Semi-supervised Classification with Active Query Selection

Semi-supervised Classification with Active Query Selection Sem-supervsed Classfcaton wth Actve Query Selecton Jao Wang and Swe Luo School of Computer and Informaton Technology, Beng Jaotong Unversty, Beng 00044, Chna Wangjao088@63.com Abstract. Labeled samples

More information

Microwave Diversity Imaging Compression Using Bioinspired

Microwave Diversity Imaging Compression Using Bioinspired Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,

More information

BACKGROUND SUBTRACTION WITH EIGEN BACKGROUND METHODS USING MATLAB

BACKGROUND SUBTRACTION WITH EIGEN BACKGROUND METHODS USING MATLAB BACKGROUND SUBTRACTION WITH EIGEN BACKGROUND METHODS USING MATLAB 1 Ilmyat Sar 2 Nola Marna 1 Pusat Stud Komputas Matematka, Unverstas Gunadarma e-mal: lmyat@staff.gunadarma.ac.d 2 Pusat Stud Komputas

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

Comparison of Wiener Filter solution by SVD with decompositions QR and QLP

Comparison of Wiener Filter solution by SVD with decompositions QR and QLP Proceedngs of the 6th WSEAS Int Conf on Artfcal Intellgence, Knowledge Engneerng and Data Bases, Corfu Island, Greece, February 6-9, 007 7 Comparson of Wener Flter soluton by SVD wth decompostons QR and

More information

A Novel Fuzzy logic Based Impulse Noise Filtering Technique

A Novel Fuzzy logic Based Impulse Noise Filtering Technique Internatonal Journal of Advanced Scence and Technology A Novel Fuzzy logc Based Impulse Nose Flterng Technque Aborsade, D.O Department of Electroncs Engneerng, Ladoke Akntola Unversty of Tech., Ogbomoso.

More information

CS 468 Lecture 16: Isometry Invariance and Spectral Techniques

CS 468 Lecture 16: Isometry Invariance and Spectral Techniques CS 468 Lecture 16: Isometry Invarance and Spectral Technques Justn Solomon Scrbe: Evan Gawlk Introducton. In geometry processng, t s often desrable to characterze the shape of an object n a manner that

More information

On the Repeating Group Finding Problem

On the Repeating Group Finding Problem The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng

More information

A SVD-BASED WATERMARKING SCHEME FOR PROTECTING RIGHTFUL OWNERSHIP *

A SVD-BASED WATERMARKING SCHEME FOR PROTECTING RIGHTFUL OWNERSHIP * SVD-BSED TERMRKIG SCEME OR PROTECTIG RIGTUL OERSIP * Ruzhen Lu and Tenu Tan atonal Lab of Pattern Recognton Insttute of utomaton, Chnese cademy of Scences P. O. Box 78, Bejng, 18, P. R. Chna Emal: {lurz,

More information

Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification

Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp.495-507, 2018 Improved Lossless Data Hdng for JPEG Images Based on Hstogram Modfcaton Yang Du 1, Zhaoxa Yn 1, 2, * and Xnpeng Zhang 3 Abstract: Ths

More information

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000 Novel Pre-Compresson Rate-Dstorton Optmzaton Algorthm for JPEG 2000 Yu-We Chang, Hung-Ch Fang, Chung-Jr Lan, and Lang-Gee Chen DSP/IC Desgn Laboratory, Graduate Insttute of Electroncs Engneerng Natonal

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k) ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of

More information

Automatic Object Trajectory- Based Motion Recognition Using Gaussian Mixture Models

Automatic Object Trajectory- Based Motion Recognition Using Gaussian Mixture Models Automatc Object Trajectory- Based Moton Recognton Usng Gaussan Mxture Models Fasal I. Bashr, Ashfaq A. Khokhar, Dan Schonfeld Electrcal and Computer Engneerng, Unversty of Illnos at Chcago. Chcago, IL,

More information

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1 A New Metrc for Qualty Assessment of Dgtal Images Based on Weghted-Mean Square Error Proceedngs of SPIE, vol. 4875, 2002 Kawen Zhang, Shuozhong Wang, and Xnpen Zhang School of Communcaton and Informaton

More information

Non-linear Canonical Correlation Analysis Using a RBF Network

Non-linear Canonical Correlation Analysis Using a RBF Network ESANN' proceedngs - European Smposum on Artfcal Neural Networks Bruges (Belgum), 4-6 Aprl, d-sde publ., ISBN -97--, pp. 57-5 Non-lnear Canoncal Correlaton Analss Usng a RBF Network Sukhbnder Kumar, Elane

More information

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua

More information

A Two-Level Detection Algorithm for Optical Fiber Vibration

A Two-Level Detection Algorithm for Optical Fiber Vibration PHOTOIC SESORS/ Vol. 5, o. 3, 05: 84 88 A Two-Level Detecton Algorthm for Optcal Fber Vbraton Fukun BI, uecong RE *, Hongquan QU, and Ruqng JIAG College of Informaton Engneerng, orth Chna Unversty of Technology,

More information

1 Derivation of Point-to-Plane Minimization

1 Derivation of Point-to-Plane Minimization 1 Dervaton of Pont-to-Plane Mnmzaton Consder the Chen-Medon (pont-to-plane) framework for ICP. Assume we have a collecton of ponts (p, q ) wth normals n. We want to determne the optmal rotaton and translaton

More information

MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN

MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN S. Chtwong, S. Wtthayapradt, S. Intajag, and F. Cheevasuvt Faculty of Engneerng, Kng Mongkut s Insttute of Technology

More information

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling Proceedngs of the World Congress on Engneerng and Computer Scence 007 WCECS 007, October 4-6, 007, San Francsco, USA A Fast Fractal Image Compresson Algorthm Usng Predefned Values for Contrast Scalng H.

More information

Orientation Model of Elite Education and Mass Education

Orientation Model of Elite Education and Mass Education Proceedngs of the 8th Internatonal Conference on Innovaton & Management 723 Orentaton Model of Elte Educaton and Mass Educaton Ye Peng Huanggang Normal Unversty, Huanggang, P.R.Chna, 438 (E-mal: yepeng@hgnc.edu.cn)

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

A Novel Quality Measure for Information Hiding in Images

A Novel Quality Measure for Information Hiding in Images A Novel Qualty Measure for Informaton Hdng n s KA Navas Aravnd M SasKumar M Asstant rofessor G student rofessor College Of Engneerng College of Engneerng Maran Engneerng College Trvandrum,Inda Trvandrum,Inda

More information

COMPARING NOISE REMOVAL IN THE WAVELET AND FOURIER DOMAINS

COMPARING NOISE REMOVAL IN THE WAVELET AND FOURIER DOMAINS COMPARING NOISE REMOVAL IN THE WAVELET AND FOURIER DOMAINS Robert J. Barsant, and Jordon Glmore Department of Electrcal and Computer Engneerng The Ctadel Charleston, SC, 29407 e-mal: robert.barsant@ctadel.edu

More information

Integrating Neural Networks and PCA for Fast Covert Surveillance

Integrating Neural Networks and PCA for Fast Covert Surveillance Integratng Neural Networks and PCA for Fast Covert Survellance Hazem M. El-Bakry, and Mamoon H. Mamoon Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, EGYPT E-mal: helbakry0@yahoo.com

More information

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School

More information

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl RECURSIVE SPLINE INTERPOLATION METHOD FOR REAL TIME ENGINE CONTROL APPLICATIONS A. Stotsky Volvo Car Corporaton Engne Desgn and Development Dept. 97542, HA1N, SE- 405 31 Gothenburg Sweden. Emal: astotsky@volvocars.com

More information

Multigradient for Neural Networks for Equalizers 1

Multigradient for Neural Networks for Equalizers 1 Multgradent for Neural Netorks for Equalzers 1 Chulhee ee, Jnook Go and Heeyoung Km Department of Electrcal and Electronc Engneerng Yonse Unversty 134 Shnchon-Dong, Seodaemun-Ku, Seoul 1-749, Korea ABSTRACT

More information

Efficient, General Point Cloud Registration with Kernel Feature Maps

Efficient, General Point Cloud Registration with Kernel Feature Maps Effcent, General Pont Cloud Regstraton wth Kernel Feature Maps Hanchen Xong, Sandor Szedmak, Justus Pater Insttute of Computer Scence Unversty of Innsbruck 30 May 2013 Hanchen Xong (Un.Innsbruck) 3D Regstraton

More information

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1 Estmatng the Fundamental Matrx by Transformng Image Ponts n Projectve Space 1 Zhengyou Zhang and Charles Loop Mcrosoft Research, One Mcrosoft Way, Redmond, WA 98052, USA E-mal: fzhang,cloopg@mcrosoft.com

More information

Internet Engineering. Jacek Mazurkiewicz, PhD Softcomputing. Part 3: Recurrent Artificial Neural Networks Self-Organising Artificial Neural Networks

Internet Engineering. Jacek Mazurkiewicz, PhD Softcomputing. Part 3: Recurrent Artificial Neural Networks Self-Organising Artificial Neural Networks Internet Engneerng Jacek Mazurkewcz, PhD Softcomputng Part 3: Recurrent Artfcal Neural Networks Self-Organsng Artfcal Neural Networks Recurrent Artfcal Neural Networks Feedback sgnals between neurons Dynamc

More information

Tracking with Kalman Filter

Tracking with Kalman Filter Trackng wth Kalman Flter Scott T. Acton Vrgna Image and Vdeo Analyss (VIVA), Charles L. Brown Department of Electrcal and Computer Engneerng Department of Bomedcal Engneerng Unversty of Vrgna, Charlottesvlle,

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

Multi-user Detection Based on Weight approaching particle filter in Impulsive Noise

Multi-user Detection Based on Weight approaching particle filter in Impulsive Noise Internatonal Symposum on Computers & Informatcs (ISCI 2015) Mult-user Detecton Based on Weght approachng partcle flter n Impulsve Nose XIAN Jn long 1, a, LI Sheng Je 2,b 1 College of Informaton Scence

More information

Research Article Green s Theorem for Sign Data

Research Article Green s Theorem for Sign Data Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Fourier Transform. Additive noise. Fourier Tansform. I = S + N. Noise doesn t depend on signal. We ll consider:

Fourier Transform. Additive noise. Fourier Tansform. I = S + N. Noise doesn t depend on signal. We ll consider: Flterng Announcements HW2 wll be posted later today Constructng a mosac by warpng mages. CSE252A Lecture 10a Flterng Exampel: Smoothng by Averagng Kernel: (From Bll Freeman) m=2 I Kernel sze s m+1 by m+1

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Sgnal & Image Processng : An Internatonal Journal (SIPIJ) Vol.5, No.4, August 2014 IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Suman Shrestha 1, 2 1 Unversty of Massachusetts Medcal School,

More information

Low Complexity Soft-Input Soft-Output Hamming Decoder

Low Complexity Soft-Input Soft-Output Hamming Decoder Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg

More information

High Precision Edge Detection Algorithm for Mechanical Parts

High Precision Edge Detection Algorithm for Mechanical Parts MEASUREMENT SCIENCE REVIEW, 18, (018), No., 65-71 Journal homepage: http://www.degruyter.com/vew/j/msr Hgh Precson Edge Detecton Algorthm for Mechancal Parts Zhenyun Duan 1, Nng Wang 1, Jngshun Fu 1, Wenhu

More information

Discretization of Continuous Attributes in Rough Set Theory and Its Application*

Discretization of Continuous Attributes in Rough Set Theory and Its Application* Dscretzaton of Contnuous Attrbutes n Rough Set Theory and Its Applcaton* Gexang Zhang 1,2, Lazhao Hu 1, and Wedong Jn 2 1 Natonal EW Laboratory, Chengdu 610036 Schuan, Chna dylan7237@sna.com 2 School of

More information

Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms

Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms Reversble Data Hdng Based on Two-level HDWT Coeffcent Hstograms Xu-Ren Luo 1, Chen-Hu Jerry Ln 2 and Te-Lung Y 3 1 Department of Electrcal and Electronc Engneerng, Chung Cheng Insttute of Technology, Natonal

More information

Modal Strain Energy Decomposition Method for Damage Detection of an Offshore Structure Using Modal Testing Information

Modal Strain Energy Decomposition Method for Damage Detection of an Offshore Structure Using Modal Testing Information Thrd Chnese-German Jont Symposum on Coastal and Ocean Engneerng Natonal Cheng Kung Unversty, Tanan November 8-16, 2006 Modal Stran Energy Decomposton Method for Damage Detecton of an Offshore Structure

More information

Identification of Linear Partial Difference Equations with Constant Coefficients

Identification of Linear Partial Difference Equations with Constant Coefficients J. Basc. Appl. Sc. Res., 3(1)6-66, 213 213, TextRoad Publcaton ISSN 29-434 Journal of Basc and Appled Scentfc Research www.textroad.com Identfcaton of Lnear Partal Dfference Equatons wth Constant Coeffcents

More information

Annexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances

Annexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances ec Annexes Ths Annex frst llustrates a cycle-based move n the dynamc-block generaton tabu search. It then dsplays the characterstcs of the nstance sets, followed by detaled results of the parametercalbraton

More information

The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model

The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model Journal of Computer and Communcatons, 04,, -6 Publshed Onlne July 04 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.436/cc.04.906 The Dgtal Fngerprntng Method for Statc Images Based on Weghted

More information

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for U Charts. Dr. Wayne A. Taylor

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for U Charts. Dr. Wayne A. Taylor Taylor Enterprses, Inc. Adjusted Control Lmts for U Charts Copyrght 207 by Taylor Enterprses, Inc., All Rghts Reserved. Adjusted Control Lmts for U Charts Dr. Wayne A. Taylor Abstract: U charts are used

More information

Impulse Noise Removal Technique Based on Fuzzy Logic

Impulse Noise Removal Technique Based on Fuzzy Logic Impulse Nose Removal Technque Based on Fuzzy Logc 1 Mthlesh Atulkar, 2 A.S. Zadgaonkar and 3 Sanjay Kumar C V Raman Unversty, Kota, Blaspur, Inda 1 m.atulkar@gmal.com, 2 arunzad28@hotmal.com, 3 sanrapur@redffmal.com

More information

A New Evolutionary Computation Based Approach for Learning Bayesian Network

A New Evolutionary Computation Based Approach for Learning Bayesian Network Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Feature Selection & Dynamic Tracking F&P Textbook New: Ch 11, Old: Ch 17 Guido Gerig CS 6320, Spring 2013

Feature Selection & Dynamic Tracking F&P Textbook New: Ch 11, Old: Ch 17 Guido Gerig CS 6320, Spring 2013 Feature Selecton & Dynamc Trackng F&P Textbook New: Ch 11, Old: Ch 17 Gudo Gerg CS 6320, Sprng 2013 Credts: Materal Greg Welch & Gary Bshop, UNC Chapel Hll, some sldes modfed from J.M. Frahm/ M. Pollefeys,

More information

An efficient algorithm for multivariate Maclaurin Newton transformation

An efficient algorithm for multivariate Maclaurin Newton transformation Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Application of Dynamic Time Warping on Kalman Filtering Framework for Abnormal ECG Filtering

Application of Dynamic Time Warping on Kalman Filtering Framework for Abnormal ECG Filtering Applcaton of Dynamc Tme Warpng on Kalman Flterng Framework for Abnormal ECG Flterng Abstract. Mohammad Nknazar, Bertrand Rvet, and Chrstan Jutten GIPSA-lab (UMR CNRS 5216) - Unversty of Grenoble Grenoble,

More information

Mixed Noise Suppression in Color Images by Signal-Dependent LMS L-Filters

Mixed Noise Suppression in Color Images by Signal-Dependent LMS L-Filters 46 R. HUDEC MIXED OISE SUPPRESSIO I COLOR IMAGES BY SIGAL-DEPEDET LMS L-FILTERS Mxed ose Suppresson n Color Images by Sgnal-Dependent LMS L-Flters Róbert HUDEC Dept. of Telecommuncatons Unversty of Žlna

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

on the improved Partial Least Squares regression

on the improved Partial Least Squares regression Internatonal Conference on Manufacturng Scence and Engneerng (ICMSE 05) Identfcaton of the multvarable outlers usng T eclpse chart based on the mproved Partal Least Squares regresson Lu Yunlan,a X Yanhu,b

More information

SDR Forum Technical Conference 2007

SDR Forum Technical Conference 2007 USE OF WAVELET TECHNIQUES IN SPECTRUM HOLES DETECTION IN OPPORTUNISTIC RADIO Shyamale Thlakawardana and Klaus Moessner Moble Communcatons Research Group, CCSR, Unversty of Surrey, Guldford, UK Emal: {S.Thlakawardana@surrey.ac.uk,

More information

A Multimodal Fusion Algorithm Based on FRR and FAR Using SVM

A Multimodal Fusion Algorithm Based on FRR and FAR Using SVM Internatonal Journal of Securty and Its Applcatons A Multmodal Fuson Algorthm Based on FRR and FAR Usng SVM Yong L 1, Meme Sh 2, En Zhu 3, Janpng Yn 3, Janmn Zhao 4 1 Department of Informaton Engneerng,

More information

The Expectation-Maximization Algorithm

The Expectation-Maximization Algorithm The Expectaton-Maxmaton Algorthm Charles Elan elan@cs.ucsd.edu November 16, 2007 Ths chapter explans the EM algorthm at multple levels of generalty. Secton 1 gves the standard hgh-level verson of the algorthm.

More information

Camera Identification from Cropped and Scaled Images

Camera Identification from Cropped and Scaled Images Camera Identfcaton from Cropped and Scaled Images Mroslav Goljan * and Jessca Frdrch Department of Electrcal and Computer Engneerng SUNY Bnghamton, Bnghamton, NY 390-6000 ABSTRACT In ths paper, we extend

More information

Parameter Estimation for Dynamic System using Unscented Kalman filter

Parameter Estimation for Dynamic System using Unscented Kalman filter Parameter Estmaton for Dynamc System usng Unscented Kalman flter Jhoon Seung 1,a, Amr Atya F. 2,b, Alexander G.Parlos 3,c, and Klto Chong 1,4,d* 1 Dvson of Electroncs Engneerng, Chonbuk Natonal Unversty,

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

Improvement of Histogram Equalization for Minimum Mean Brightness Error

Improvement of Histogram Equalization for Minimum Mean Brightness Error Proceedngs of the 7 WSEAS Int. Conference on Crcuts, Systems, Sgnal and elecommuncatons, Gold Coast, Australa, January 7-9, 7 3 Improvement of Hstogram Equalzaton for Mnmum Mean Brghtness Error AAPOG PHAHUA*,

More information

High-Speed Decoding of the Binary Golay Code

High-Speed Decoding of the Binary Golay Code Hgh-Speed Decodng of the Bnary Golay Code H. P. Lee *1, C. H. Chang 1, S. I. Chu 2 1 Department of Computer Scence and Informaton Engneerng, Fortune Insttute of Technology, Kaohsung 83160, Tawan *hpl@fotech.edu.tw

More information

White Noise Reduction of Audio Signal using Wavelets Transform with Modified Universal Threshold

White Noise Reduction of Audio Signal using Wavelets Transform with Modified Universal Threshold Whte Nose Reducton of Audo Sgnal usng Wavelets Transform wth Modfed Unversal Threshold MATKO SARIC, LUKI BILICIC, HRVOJE DUJMIC Unversty of Splt R.Boskovca b.b, HR 1000 Splt CROATIA Abstract: - Ths paper

More information

Color Rendering Uncertainty

Color Rendering Uncertainty Australan Journal of Basc and Appled Scences 4(10): 4601-4608 010 ISSN 1991-8178 Color Renderng Uncertanty 1 A.el Bally M.M. El-Ganany 3 A. Al-amel 1 Physcs Department Photometry department- NIS Abstract:

More information

A New Facial Expression Recognition Method Based on * Local Gabor Filter Bank and PCA plus LDA

A New Facial Expression Recognition Method Based on * Local Gabor Filter Bank and PCA plus LDA Hong-Bo Deng, Lan-Wen Jn, L-Xn Zhen, Jan-Cheng Huang A New Facal Expresson Recognton Method Based on Local Gabor Flter Bank and PCA plus LDA A New Facal Expresson Recognton Method Based on * Local Gabor

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Saliency and Active Contour based Traffic Sign Detection

Saliency and Active Contour based Traffic Sign Detection ISSN 1746-7659, England, UK Journal of Informaton and Computng Scence Vol. 7, No. 3, 01, pp. 35-40 Salency and ctve Contour based Traffc Sgn Detecton Shangbng Gao 1 and Yunyang Yan 1 1 The School Computer

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

CS4495/6495 Introduction to Computer Vision. 3C-L3 Calibrating cameras

CS4495/6495 Introduction to Computer Vision. 3C-L3 Calibrating cameras CS4495/6495 Introducton to Computer Vson 3C-L3 Calbratng cameras Fnally (last tme): Camera parameters Projecton equaton the cumulatve effect of all parameters: M (3x4) f s x ' 1 0 0 0 c R 0 I T 3 3 3 x1

More information

High resolution entropy stable scheme for shallow water equations

High resolution entropy stable scheme for shallow water equations Internatonal Symposum on Computers & Informatcs (ISCI 05) Hgh resoluton entropy stable scheme for shallow water equatons Xaohan Cheng,a, Yufeng Ne,b, Department of Appled Mathematcs, Northwestern Polytechncal

More information

A Bayes Algorithm for the Multitask Pattern Recognition Problem Direct Approach

A Bayes Algorithm for the Multitask Pattern Recognition Problem Direct Approach A Bayes Algorthm for the Multtask Pattern Recognton Problem Drect Approach Edward Puchala Wroclaw Unversty of Technology, Char of Systems and Computer etworks, Wybrzeze Wyspanskego 7, 50-370 Wroclaw, Poland

More information

CSE4210 Architecture and Hardware for DSP

CSE4210 Architecture and Hardware for DSP 4210 Archtecture and Hardware for DSP Lecture 1 Introducton & Number systems Admnstratve Stuff 4210 Archtecture and Hardware for DSP Text: VLSI Dgtal Sgnal Processng Systems: Desgn and Implementaton. K.

More information