Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms
|
|
- Isaac Washington
- 6 years ago
- Views:
Transcription
1 Reversble Data Hdng Based on Two-level HDWT Coeffcent Hstograms Xu-Ren Luo 1, Chen-Hu Jerry Ln 2 and Te-Lung Y 3 1 Department of Electrcal and Electronc Engneerng, Chung Cheng Insttute of Technology, Natonal Defense Unversty, Tahs, Taoyuan 33509, Tawan, Republc of Chna nrgman.luo@gmal.com 2 Department of Electrcal and Electronc Engneerng, Chung Cheng Insttute of Technology, Natonal Defense Unversty, Tahs, Taoyuan 33509, Tawan, Republc of Chna jerryln@ndu.edu.tw 3 Department of Computer Scence and Informaton Engneerng, Chna Unversty of Technology, Hukou, Hsnchu 303, Tawan, Republc of Chna yntl@cute.edu.tw ABSTRACT In recent years, reversble data hdng has attracted much more attenton than before. Reversblty sgnfes that the orgnal meda can be recovered wthout any loss from the marked meda after extractng the embedded message. Ths paper presents a new method that adopts two-level wavelet transform and explots the feature of large wavelet coeffcent varance to acheve the goal of hgh capacty wth mperceptblty. Our method dffers from those of prevous ones n whch the wavelet coeffcents hstogram not gray-level hstogram s manpulated. Besdes, clever shftng rules are ntroduced nto hstogram to avod the decmal problem n pxel values after recovery to acheve reversblty. Wth small alteraton of the wavelet coeffcents n the embeddng process, and therefore low vsual dstorton s obtaned n the marked mage. In addton, an mportant feature of our desgn s that the use of threshold s much dfferent from prevous studes. The results ndcate that our desgn s superor to many other state-of-the-art reversble data hdng schemes. KEYWORDS Reversblty, Marked meda, Wavelet Transform, Wavelet Coeffcent, Dstorton, Hstogram 1. INTRODUCTION Known as lossless, nvertble, or dstorton-free data hdng, reversble data hdng s a type of delcate and vulnerable technque that s manly used for qualty-senstve applcatons such as multmeda content authentcaton, medcal magng systems, law enforcement, and mltary magery. The prmary goal n such applcatons s to recover the orgnal meda exactly. The key factors of reversble data hdng nclude the embeddng capacty and vsual qualty of the marked meda, whch are for achevng satsfactory performance n varous applcatons[1][2]. The scheme we present n ths paper s an attempt to acheve hgh-performance reversble data hdng, n whch embeddng and recoverng processes n the frequency doman are devsed. The partculartes of large wavelet coeffcent varance and mnor changes n wavelet coeffcents followng the embeddng process are exploted to acheve hgh capacty and mperceptble embeddng. The rest of ths paper s organzed as follows. In Secton 2, prevous reversble data DOI : /acj
2 hdng schemes and ther characterstcs wll be brefly revewed n terms of embeddng capacty and vsual qualty. Our proposed scheme s ntroduced n Secton 3. Expermental results and comparatve analyses are presented n Secton 4. Fnally, some conclusons are drawn n Secton PREVIOUS STUDIES The related works reported n the lterature can be classfed nto two major types accordng to the doman for hdng nformaton. In type-i, the schemes work on the transform doman. In 2002, Frdrch et al. [3][4] presented a novel RS scheme starts by dvdng the mage nto three dsjont blocks, and then classfes these blocks nto dfferent groups R, S, and U usng a dscrmnatng functon. The flppng functon s also ntroduced to convert an R-group to an S- group and vce versa. The scheme further compresses the R and S groups wthout loss, and embeds message bts nto the state of each group. Although t s a novel technque, the payload s stll nsuffcent for some applcatons and hghly dependent on the compresson algorthm. Subsequently, Xuan et al. [5] proposed a new scheme n the nteger wavelet transform (IWT) doman. In ths scheme, one or multple mddle bt-plan(s) n the hgh-frequency sub-bands s(are) chosen to embed data bts. In 2003, a dfference expanson (DE) scheme was proposed by Tan [6], who appled the nteger Haar wavelet transform to an mage and exploted the DE technque to embed data bts nto the hgh-frequency coeffcents. However, ths scheme suffers from the locaton map problem that t s dffcult to acheve capacty control. Alattar [7][8] extended Tan s scheme by generalzng the DE technque to the trplets and quads of adjacent pxels. Kamstra et al. [9][10] mproved the DE scheme by predctng the expandable locatons n the hgh-pass band. Ths scheme mproves the effcency of lossless compresson, although the embeddng capacty s small. In 2007, Thod et al. [11] proposed a new scheme combnng hstogram shftng and predcton-error expanson approaches to remedy the problems of Tan s scheme. In type-ii, most of the studes focus on the spatal doman. Frdrch et al. [12] proposed an nvertble method to authentcate dgtal mage usng the jont b-level mage experts group (JBIG) lossless compresson technque to save free space for data embeddng. However, some nosy mages may lead to the use of hgher bt-planes and result n hghly vsble dstortons. The payload s hghly dependent on the lossless compresson algorthm. Celk et al. [13][14] employed the generalzed least-sgnfcant-bt (G-LSB) technque and the context-based adaptve lossless mage codng (CALIC) to acheve lossless data hdng. In 2006, N et al. [15] utlzed multple pars of maxmum and mnmum ponts of mage hstogram to acheve reversblty. In the scheme, the pxels are modfed for data embeddng and extracton. The greater the number of pars that are selected, the larger the payload becomes. Besdes, ths scheme can acheve hgher embeddng capacty through usng a mult-level strategy. However, such a strategy may lead to sgnfcant overhead and nsuffcent vsual qualty. N s scheme was also extended by others usng a locaton map rather than the knowledge of the pars to acheve reversblty [16][17]. Although the scheme s smple comparng to other schemes, sgnfcant overhead and nsuffcent vsual qualty are crtcal problems. In 2009, Km et al. [18] utlzed the feature of hgh spatal correlaton between neghborng pxels to acheve hghperformance data hdng. The embeddng capacty n the paper ranges from 6 to 210 k. For all of the schemes above, addtonal overhead s the most dffcult problems n the restore process. Ths paper proposes a new hstogram shftng technque n the frequency doman and uses the actual payload to acheve hgh-performance lossless data hdng. 3. THE PROPOSED SCHEME Ths secton present a new scheme that combnes the two-level Haar dscrete wavelet transform (HDWT) algorthm and new hstogram shftng rules. The HDWT algorthm can produce a 2
3 complete and lossless reconstructon durng synthess wth approprate flters. Moreover, the hstogram shftng rules used n the frequency doman can provde hgher flexblty n terms of scalablty n resoluton and dstorton. In our scheme, an orgnal mage s frst transformed nto a frequency doman and sub-bands n the mddle- and hgh-frequency ranges are then used to create sub-band dfferences. Each hstogram of these sub-band dfferences s then shfted accordng to a selected threshold. Message bts can then be hdden n the empty bns of the shfted hstograms. Fnally, the marked mage s reconstructed wth the sub-bands carryng and non-carryng hdden message by performng the nverse HDWT algorthm to complete the embeddng process. In the extractng process, the correspondng nverse operatons can exactly extract the hdden message and recover the orgnal mage Segmentaton algorthm The two-level HDWT algorthm utlzes the four-band sub-band codng system to decompose an mage nto a set of dfferent frequency sub-bands. As llustrated n Fgures 1 and 2, the sze of each sub-band s one ethth of the orgnal mage n the spatal doman. The eght dfferent sub-bands can be classfed nto the low-, mddle-, and hgh-frequency sub-bands. Snce the low-frequency sub-band of an mage ncorporates more energy than the other sub-bands, ts coeffcents are the most fragle that f any of them are manpulated, a suspect can vsbly detect the changes on the spatal doman mage. However, f the coeffcents n the mddle- and/or hgh-frequency sub-bands are altered, the changes n the spatal doman mage wll be mperceptble to human eyes. Consequently, ths characterstc s generally exploted to hde secret message. Fgure 1. The decomposton process of two-level HDWT 3.2. Data embeddng algorthm Fgure 2. A tow-level HDWT four-band splt of Lena We assume that the secret message s a random bnary sequence of 0s and 1s. The hstograms of the sub-band dfferences between the reference sub-band and the other destnaton sub-bands are shfted to embed the secret message. Fgure 3 depcts the overall data embeddng process, whch s descrbed n detal below. 3
4 Fgure 3. Flowchart of data embeddng process Embeddng_process ( η, T, ϕ ) Input: η, the orgnal mage; T, the threshold accordng to whch the empty bns n each hstogram are prepared; φ, the secret message. Output: ψ, the marked mage, f, the mark of embeddng status. Advan Proceedngs: Step 1: Create sub-bands by performng two-level HDWT four-band sub-band codng system on an nput mageη. Fve of the sub-bands to be utlzed are denoted by L H ( x, y ), H L ( x, y ), H H ( x, y ), L H 2 ( x, y ), and H H 2 ( x, y ), where ( x, y) ndcates the coordnate of the coeffcents n each sub-band. Step 2: Create sub-band dfferences D, 1 D and 2 D between the reference sub-bands L H, 3 LH 2 and the other destnaton sub-bands HL, HH and HH 2 by the followng formulas: D ( x, y ) = L H ( x, y ) H L ( x, y ) 1, (1) D ( x, y ) = LH ( x, y ) H H ( x, y ) 2, (2) D 3 ( x, y ) = L H 2( x, y ) H H 2( x, y ). (3) 4
5 Step 3: Denote the hstograms of D as h, where = 1,2,3. Step 4: Shft hstogram h accordng to the threshold T selected. The shfted h can be calculated as follows: ( ) ( ) ( ) ( ) h j + 8, f h j T + 1, h h j 8, f h j ( T + 1 ), (4) where 1, 2,3 = and ( ) j ndcates the value of each bn. These can also be obtaned by the followng formulas: D ( x, y ) = L H ( x, y ) H L ( x, y ) 1, (5) D ( x, y ) = L H ( x, y ) H H ( x, y ) 2, (6) D ( x, y ) = L H 2 ( x, y ) H H 2 ( x, y ) 3. (7) where HL ( x, y), HH ( x, y) HL ( x, y) HH ( x, y) HH 2 ( x, y) and HH ( x, y) 2 can be expressed as: HL( x, y ) 8, f h1 T + 1, HL( x, y ) + 8, f h1 ( T + 1 ). (8) HH ( x, y ) 8, f h2 T + 1, HH ( x, y ) + 8, f h2 ( T + 1 ). (9) HH 2( x, y ) 8, f h3 T + 1, HH 2( x, y ) + 8, f h3 ( T + 1 ). (10) Embeddng Data nto HL, HH and HH2: Step 5: We frst set an nteraton ndex l to T and then embed message bts sequentally by modfyng h. Each h s shfted to become h, where = 1, 2 and 3by the followng rules: h h h h h for l > , f h + 4, f h 8, f h 4, f h = = l, l, = l, = l, ϕ( n) = 0, ϕ( n) = 1, ϕ( n) = 0, ϕ( n) = 1, (11) h h ( j ) + 8, f h = 0, φ( n) = 0, h ( j ) + 4, f h = 0, φ( n) = 1, (12) for l = 0. The changes n the dfference hstograms above result n changes n the coeffcents. Ths mples that the modfed sub-band dfference D ( x, y) s scanned and modfed agan. Once the 5
6 value of D ( x, y) s equal to ±l, the message bt s embedded. Ths procedure s repeated untl there are no D ( x, y) wth the value of ±l. We then decrease l by 1 and repeat the step untll < 0. These steps can be formulated as follows: D ( x, y ) = L H ( x, y ) H L ( x, y ) 1, (13) D ( x, y ) = L H ( x, y ) H H ( x, y ) 2, (14) D ( x, y ) = L H 2 ( x, y ) H H 2 ( x, y ) 3. (15) f l > 0, ( ) HL ( x, y ) + 4, f h1 j = l, φ( n) = 1, HL ( x, y ) 4, f h1 = l, φ( n) = 1, HL ( x, y) HL ( x, y ) + 8, f h1 = l, φ( n) = 0, HL ( x, y ) 8, f h1 = l, φ( n) = 0. ( ) HH ( x, y ) + 4, f h2 j = l, φ( n) = 1, HH ( x, y ) 4, f h2 = l, φ( n) = 1, HH ( x, y) HH ( x, y ) + 8, f h2 = l, φ( n) = 0, HH ( x, y ) 8, f h2 = l, φ( n) = 0. ( ) HH 2 ( x, y ) + 4, f h3 j = l, φ( n) = 1, HH 2 ( x, y ) 4, f h3 = l, φ( n) = 1, HH 2 ( x, y) HH 2 ( x, y ) + 8, f h3 = l, φ( n) = 0, HH 2 ( x, y ) 8, f h3 = l, φ( n) = 0. (16) (17) (18) f l = 0, HL ( x, y) HH ( x, y) HH 2 ( x, y) HL ( x, y ) 4, f h1( j) = 0, φ(n) = 1, HL ( x, y ) 8, f h1 = 0, φ(n) = 0. (19) HH ( x, y ) 4, f h2 = 0, φ(n) = 1, HH ( x, y ) 8, f h2 = 0, φ(n) = 0. (20) HH 2( x, y ) 4, f h3( j) = 0, φ(n) = 1, HH 2( x, y ) 8, f h3 = 0, φ(n) = 0. (21) Centralzng Hstogram Step 6: When all the bns n the dfference hstogram are exhausted to hde data, eght bns, valued from 4 to 3, wll become empty. In ths case, the mark f s set to be 1 and all bns on the rght sde wll be moved left 4 bns, and those on the left wll be moved rght 4 bns n order to mprove the mage qualty by decreasng the varance of the dfferences n the coeffcents. Otherwse, the mark f s set to be 0. Each h s shfted to become h by the followng rules: 6
7 h ( j ) 4, f h ( j ) 0, h ( j > ) h ( j ) + 4, f h ( j ) < 0, (22) where = 1, 2 and 3. Shftng hstograms as above creates coeffcent changes, whch can be formulated as follows: D ( x, y ) = LH ( x, y ) H L ( x, y ) 1, (23) D (, ) (, ) (, ) 2 x y = LH x y HH x y, (24) D (, ) 2(, ) 2 (, ) 3 x y = LH x y HH x y, (25) where HL ( x, y), HH ( x, y) and HH ( x, y) 2 can be expressed as: HL ( x, y) HH ( x, y) HH 2 ( x, y) HL ( x, y ) + 4, f h1 > 0, HL ( x, y ) 4, f h1 < 0. (26) HH ( x, y ) + 4, f h2 > 0, HH ( x, y ) 4, f h2 < 0. (27) HH 2 ( x, y ) + 4, f h3 > 0, HH 2 ( x, y ) 4, f h3 < 0. (28) Embeddng Data nto LH: Step 7: Usng the sub-band HL wth the hdden message as the reference, a fourth dfference hstogram s created wth the orgnal sub-band LH. The secret message s then hdden nto ths dfference hstogram accordng to steps 1 to 6; as a result, LH ( x, y) wll be created. Ths completes the embeddng process. Obtanng Marked Image: Step 8: Reconstruct the marked mage by utlzng the nverse of the two-level HDWT fourband sub-band codng on the sub-bands. We frst reconstruct the LL sub-band and then reconstruct the marked mage ψ. Ths procedure can be formulated as follows: LL IDW T S S S S = ( LL 2, LH 2, HL 2, HH 2 ), (29) ψ = IDWT ( S LL, S LH, S HL, S HH ). (30) Preventng overlap and over/underflow A flag-bt s used to ndcate whether the bn n the dfferent hstograms s overlap or not. The flag-bt s set to 1 f a bn value shfted by ± 8 overlaps wth one shfted by ± 4. The flag-bt s set to 0 f no overlap occurs. These flag-bts and the values of T and f n the btmap wll ultmately all be compressed wth an effcent compresson tool based on the LZMA algorthm. The compressed result s then hdden nto the reserved non-overlappng bns. Accordng to expermental results, ths process results n less than 2.74% overhead n full embeddng capacty for many dfferent types of mages. 7
8 Though the generated pxel values n the marked mage may be outsde the allowable range, the method n [12][18] could be used to deal wth the problem. The nterval range s dynamcally selected wth the mage characterstcs that t wll reduce dstortons to mnmum Data extractng and reversng algorthm Before extractng the hdden message, recever needs to verfy whether or not the marked mage ψ has been modfed. If there s more than one occurrence at h = 1, we can conclude that the marked mageψ has been tampered wth. The proposed scheme then stops the followng extracton steps mmedately. The extracton and recovery process s schematzed n Fgure 4. ψ Fgure 4. Flowchart of extracton and recovery process The detaled extracton and recovery process ncludes the followng steps: Extractng_process ( ψ, T, f ) Input: ψ, the marked mage; T, the threshold; f, the mark, accordng to whch the embeddng status s determned. Output: φ, the secret message; η, the orgnal mage. Advan Proceedngs: Step 1: Create sub-bands by performng two-level HDWT four-band codng on the marked mage ψ. Fve of the sub-bands to be utlzed are denoted by ψ ( x, y ), ψ ( x, y), ψ ( x, y), LH HL HL 8
9 x y ndcates the coordnate of the coeffcents n each sub- ψ (, ) LH 2 x y and (, ) HH 2 x y band. ψ, where (, ) Recoverng LL Sub-band Step 2: Create sub-band dfference Dψ 1( x, y) between the reference sub-band ψ LH 2 and the destnaton sub-band ψ HH 2 accordng to the followng formulas: D ψ ( x, y ) = ψ ( x, y ) ψ ( x, y ). (31) 1 L H 2 H H 2 Step 3: Denote the hstogram of D ( x, y) as ψ 1 hψ 1, where ndcates the value of each bn. Step 4: Check the dstrbuton of the hstogram hψ 1. If there s more than one occurrence at h =, the subsequent steps wll be stopped mmedately. ψ 1 1 Step 5: Check the embeddng status. Once the value of f s equal to 1, t can be concluded that the sub-band s completely flled wth hdden message bts. Subsequently, frst restore the orgnal dfference hstogram. The bns greater than or equal to zero wll be shfted to the rght by 4 and those less than zero to the left by 4. The restored hψ 1 can be calculated as follows: ( ) ( ) hψ 1 j + 4, f hψ 1 j 0, h ψ1 hψ 1 4, f hψ 1 < 0. (32) These can also be obtaned by the followng formulas: D ψ 1 ( x, y) = ψ LH 2 ( x, y) ψ HH 2 ( x, y), (33) where ψ (, ) 2 x y can be expressed as: HH ψ HH 2 ( x, y ) 4, f hψ 1 0, ψ HH 2 ( x, y) ψ HH 2 ( x, y ) + 4, f hψ 1 < 0. (34) Extractng Data: Step 6: Extract the hdden message φ ( n), where n denotes the ndex of a message bt, by shftng h 1 teraton ndex l s set to 0. Once a hψ 1 wth a value of ± ( + 4) 1 s retreved. On the other hand, a bnary bt 0 s retreved f h 1 l. Ths procedure s repeated untl there are no h ± ( + 8) ψ wth reference to the btmap and nvertng the embeddng process. Frst, the l s encountered, a bnary bt ψ 1 values of ± ( + 4) ψ has a value of l or ± ( l + 8). Subsequently, l s ncreased by 1. The same procedures as descrbed above are repeated untl l reaches T+1. The retrevng rule s as follows: ( ) ψ ( ) ( ) ( ) h ψ 1 j 8, f h 1 j = 8, h ψ 1 h j 4, f h j = 4, for l = 0. ψ 1 ψ 1 (35) 9
10 ( ) ψ ( ) ( ) ( ) h ψ1 j 8, f h 1 j = l+ 8, h ψ1 j 4, f h ψ1 j = l+ 4, h ψ1 h ψ1( j ) + 8, f h ψ1 = ( l+ 8), h ψ1( j ) + 4, f h ψ1 = ( l+ 4), for 1 l T. (36) Step 7: At the same tme, the modfed sub-band dfference D ψ ( x, y) 1 s also scanned and modfed. The extractng operaton can be expressed as the followng formula: φ ( n) 0, f D ( x, y) = ± ( l + 8 ), 1, f (, ) ( 4 ). ψ 1 D ψ 1 x y = ± l + (37) Ths procedure s executed untl l = T+1. Step 8: Remove the hdden message bts ( n) { 0,1} removng rule s gven by D ψ ( x, y) = ψ ( x, y) ψ ( x, y), (38) 1 LH 2 HH 2 where ψ (, ) 2 x y can be expressed as HH φ from the sub-band dfference. The ψ HH (, ) + 8, f = 8, = 0, ψ HH 2( x, y) ψ HH 2(, ) + 4, f ψ1 = 4, = 1, 2 x y hψ 1 x y h ϕ( n) (39) for l = 0, and ( ) l ) ( ) l ϕ( ) ψ HH 2( x, y ) + 8 f h ψ1 j = + 8, n = 0, ψ HH 2( x, y ) + 4 f h ψ1 j = + 4, n = 1, ψ HH 2( x, y) ψ HH 2( x, y ) 8 f h ψ1 = ( l+ 8), = 0, ψ HH 2( x, y ) 4 f h ψ1 = ( l+ 4), ϕ( n) = 1, (40) for 1 l T. Step 9: Restore the orgnal hstogram. The orgnal hstogram h ψ 1 can be calculated accordng to the followng rules: ( ) ψ ( ) ( ) ( ) h ψ 1 j 8 f h 1 j T + 1, h ψ 1 h ψ 1 j + 8 f h ψ 1 j ( T + 1). (41) for l L. The restoraton of the hstogram as descrbed above results n changes n the coeffcents. Ths can be descrbed by the followng formula: D ψ ( x, y) = ψ ( x, y) ψ ( x, y). (42) 1 LH 2 HH 2 10
11 Here, ψ (, ) 2 x y can be expressed as: HH ψhh ( x, y ) + 8, f h j T+ 1, ψhh 2( x, y) ψhh 2( x, y ) 8, f h ψ1 j ( T+ 1). 2 ψ1( ) ( ) (43) Obtanng the LL Sub-band: Step 10: Recover the orgnal Sub-band LL through the nverse operaton of the HDWT algorthm wth ψ (, ) LL2 x y, ψ (, ) LH 2 x y, ψ ( x HL, y ), and ψ (, ) HH 2 x y. Ths procedure can be formulated as follows: LL = IDWT ( ψ, ψ, ψ, ψ ). (44) LL2 LH 2 HL2 HH 2 Recoverng LH, HL and HH Sub-bands: Step 11: After recoverng the LL sub-band, steps 1 to 9 are repeated to recover the LH, HL and HH sub-bands as ψ ( x, y ), ψ ( x, y ) and ψ ( x, y ). LH Obtanng Orgnal Image: HL HH Step 12: Recover the orgnal mage η through the nverse operaton of the HDWT algorthm wth ψ ( x, y ), ψ ( x, y ), ψ ( x, y ) and ψ ( x, y ). Ths procedure can be formulated as follows: LH HL η = IDWT ( ψ, ψ, ψ, ψ ). (45) LL LH HL HH HH The above steps complete the extracton and recoverng procedure. 4. EXPERIMENTAL RESULTS AND COMPARISON LL In ths secton, a set of experments are conducted to evaluate the embeddng performance of our scheme. For these experments, we used many dfferent types of mages, ncludng some commonly used ones and two medcal mages (Fgure 5). The message bts to be embedded n our experments are randomly generated by a pseudo-random bnary generator. The threshold ranges from 0 to
12 Advanced Computng: An Internatonal Journal ( ACIJ ), Vol.2, No.1, January 2011 Fgure 5. 8-bt mages(a)lena, (b)baboon, (c)boat, (d)arplane, (e)aeral, (f)tank, (g)trucks, (h)medcal mage1, () Medcal mage2 Capacty versus Threshold Fgure 6 depcts relatonshp between the capacty n bpp and threshold. The embeddng rate almost reaches 0.78 bpp at threshold 100 for most the test mages. As expected the capacty s nearly proportonal to the threshold at the begnnng and saturates when the threshold s suffcently hgh. Fgure 6. Embeddng capacty at varous thresholds Vsual Qualty versus Threshold Fgure 7 llustrates the vsual qualty n PSNR of the marked mage versus threshold varyng from 0 to 100 for test mages on the premse that maxmal bts are embedded. The expermental result ndcates that the PSNR rses as the threshold ncreases and ths s not the case for the prevous works. The marked mage can acheve 43.3 db at the threshold 0, and above 46 db at the threshold of 100 for most test mages. It s noteworthy that the larger threshold T can contrbute less varaton n the hstogram of wavelet transform. Snce the mddle/hgh-frequency 12
13 sub-bands ncorporate less energy, the test mages wth larger varance between mddle and hgh-wavelet coeffcents such as MRI 1 and MRI 2 can acheve hgher vsual qualty than Baboon at the threshold 0. Fgure 7. PSNR at varous thresholds Comparson of vsual qualty wth other schemes In terms of actual embeddng capacty and vsual qualty, the proposed scheme was also compared wth the DE scheme [14], G-LSB scheme [5], Km et al. s scheme [9], and N et al. s scheme [6] for the Lena, Baboon, Boat, and Arplane mages as shown n Fgure 8. The embeddng capacty s the amount of embedded bts wth overhead subtracted. It can be observed that our scheme s stable and acheves hghest PSNR at the same bpp. 13
14 Fgure 8. Comparson of embeddng capacty n bpp versus dstorton wth exstng reversble schemes: DE scheme, G-LSB scheme, Km et al. s scheme, and N et al s scheme: (A) Baboon; (B) Lena; (C) Boat; (D) Arplane 5. CONCLUSIONS In ths paper, we propose a smple and hgh-performance reversble data hdng scheme, whch utlzes the large varance of wavelet coeffcents and ngenous hstogram shftng rules to 14
15 avod the decmal problem n pxel values durng recovery process. Our scheme, compared wth those reported prevously, can obtan better vsual qualty of the marked mages gven the same payload. The man reason s that the vsual qualty of our scheme does not decay wth ncreasng threshold as n the other schemes because the larger threshold can contrbute less varaton to the sub-band dfference hstograms. In addton, our scheme provdes the greatest embeddng capacty under nearly equvalent vsual qualty, as the partculartes of large wavelet coeffcent varance and mnor changes n the wavelet coeffcents followng the embeddng process are utlzed. It may be of nterest for future research that the threshold predctons, mult-round schemes, and fast algorthms wll be explored to meet real-tme applcaton requrements. REFERENCES [1] W. Bender, D. Gruhl, N. Mormoto, and A. Lu, (1996) Technques for data hdng, IBM systems Journal, vol.35, no.3, pp [2] M. Awrangjeb, An overvew of reversble data hdng, (December 2003) Proceedngs Sxth Internatonal Conference on Computer and Informaton Technology, Jahangrnagar Unversty, Bangladesh, pp [3] J. Frdrch, M. Goljan, and R. Du, Dstorton-free data embeddng, (2001) Proceedngs 4th Informaton Hdng Workshop, New York, vol.2137, pp.27 41, Lecture Notes n Computer Scence. [4] J. Frdrch, M. Goljan, and R. Du, (2002) Lossless data embeddng new paradgm n dgtal watermarkng, EURASIP J. Appl. Sgnal Process. vol.2, pp [5] G. Xuan, Y.Q. Sh, J. Chen, J. Zhu, and Z. N, W. Su, (2002) Lossless data hdng based on nteger wavelet transform, IEEE Internatonal Workshop on Multmeda Sgnal Processng, St. Thomas, Vrgn Islands, USA, December [6] J. Tan, (2003) Reversble data embeddng usng a dfference expanson, IEEE Transacton on Crcuts and Systems for Vdeo Technology,vol.13, no.8, pp [7] A.M. Alattar, (2003) Reversble watermark usng dfference expanson of trplets, Proceedngs IEEE Internatonal Conference on Image Processng, vol.1, Barcelona, Span, pp , September. [8] A.M. Alattar, (May 2004) Reversble watermark usng dfference expanson of quads, Proceedngs IEEE Internatonal Conference on Acoustcs, Speech, and Sgnal Processng, Montreal, Canada, vol.3, pp [9] L. Kamstra and H.J.A.M. Hejmans, (August 2004) Wavelet technques for reversble data embeddng nto mages, Centrum voorwskunde en Informatca Rep. [10] L. Kamstra and H.J.A.M. Hejmans, (December 2005) Reversble data embeddng nto mages usng wavelet technques and sortng, IEEE Transactons on Image Processng, vol.14, no.12, pp [11] D.M. Thod, J.J. Rodrguez, (2007) Expanson embeddng technques for reversble watermarkng, IEEE Transactons on Image Processng, vol.16, no.3, pp [12] J. Frdrch, M. Goljan, and R. Du, (January 2001) Invertble authentcaton, Proceedngs of the SPIE, Securty and Watermarkng of Multmeda Contents, vol.4314, San Jose, CA, pp [13] M.U. Celk, G. Sharma, and A.M. Tekalp, (2002) Reversble data hdng, Proceedngs IEEE Internatonal Conference on Image Processng, Rochester, NY, pp [14] M.U. Celk, G. Sharma, A.M. Tekalp, and E. Saber, (February 2005) Lossless generalzed-lsb data embeddng, IEEE Transactons on Image Proceedngs, vol.14, no.2, pp [15] Z. N, Y.Q. Sh, N. Ansar, and W. Su, (March 2006) Reversble data hdng, IEEE Transactons on Crcuts and Systems for Vdeo Technology, vol.16, no.3, pp
16 [16] J. Hwang, J.W. Km, and J.U. Cho, (2006) A reversble watermarkng based on hstogram shftng, Internatonal Workshop on Dgtal Watermarkng, Lecture Notes n Computer Scence, Sprnger-Verlag, Jeju Island, Korea,, vol.4283, pp [17] W.-C. Kuo, D.-J. Jang, and Y.-C. Huang, (2007) Reversble data hdng based on hstogram, Internatonal Conference on Intellgent Computng, Lecture Notes n Artfcal Intellgence, Sprnger-Verlag, Qng Dao, Chna, vol.4682, pp [18] K.-S. Km, M.-J. Lee, H.-Y. Lee, and H.-K. Lee, (2009) Reversble data hdng explotng spatal correlaton between sub-sampled mages, Pattern Recognton, vol.42, pp Authors Xu-Ren Luo receved the B.S. degree n Computer Scence and the M.S. degree n Electrcal and Electronc Engneerng, both from Chung Cheng Insttute of Technology (CCIT), Natonal Defense Unversty, Tawan, R.O.C., n 1997 and 2004, respectvely. He s currently pursung the Ph.D. degree n the area of nformaton assurance at the Electrcal and Electronc Engneerng Department, CCIT. Hs research nterests are focused on nformaton securty, data hdng, multmeda securty, and mage processng. Chen-Hu Jerry Ln receved the M.S. degree from the Department of Electrcal Engneerng, Unversty of Mssour at Rolla n He then began hs career of teachng computer programmng at several colleges and unverstes of technology. He receved the Ph.D. degree n electrcal engneerng from Natonal Tawan Unversty n He has joned the faculty of Natonal Defense Unversty as an assocate professor snce Hs research nterests nclude sgnal processng and computer programmng. Te-Lung Yn receved the B.S., M.S. and Ph.D. degree from the Chung Cheng Insttute of Technology, Natonal Defense Unversty, Tawan, R.O.C., n 1989, 1995 and 2001, respectvely, n electrcal engneerng. He now s an assocate professor of the Department of Computer Scence and Informaton Engneerng at the Chna Unversty of Technology, Tawan, R. O. C.. Dr. Yn s a member of the IEICE socety and hs research nterests nclude data hdng, cryptography and mage processng. 16
Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification
Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp.495-507, 2018 Improved Lossless Data Hdng for JPEG Images Based on Hstogram Modfcaton Yang Du 1, Zhaoxa Yn 1, 2, * and Xnpeng Zhang 3 Abstract: Ths
More informationHiding data in images by simple LSB substitution
Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty
More informationA New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane
A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,
More informationAN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT
AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT Changqng Zhu 1 Zhwe Wang 2 Y Long 1 Chengsong Yang 2 1 Key Laboratory of Vrtual Geographc Envronment, Nanjng Normal Unversty, Nanjng 210054;2 Insttute
More informationPop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing
Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,
More informationCONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION
CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala
More informationA Self-embedding Robust Digital Watermarking Algorithm with Blind Detection
Sensors & Transducers Vol 77 Issue 8 August 04 pp 50-55 Sensors & Transducers 04 by IFSA Publshng S L http://wwwsensorsportalcom A Self-embeddng Robust Dgtal Watermarkng Algorthm wth Blnd Detecton Gong
More informationA NEW DISCRETE WAVELET TRANSFORM
A NEW DISCRETE WAVELET TRANSFORM ALEXANDRU ISAR, DORINA ISAR Keywords: Dscrete wavelet, Best energy concentraton, Low SNR sgnals The Dscrete Wavelet Transform (DWT) has two parameters: the mother of wavelets
More informationA Novel Quality Measure for Information Hiding in Images
A Novel Qualty Measure for Informaton Hdng n s KA Navas Aravnd M SasKumar M Asstant rofessor G student rofessor College Of Engneerng College of Engneerng Maran Engneerng College Trvandrum,Inda Trvandrum,Inda
More informationOptimum Reversible Information Hiding Based on Adaptive Joint Processing
Internatonal Forum on Energy, Envronment and Sustanable Development (IFEESD 2016 Optmum Reversble Informaton Hdng Based on Adaptve Jont Processng Zhe Mao1,a, Ynfa Zhang1, Ln Zhou1, and Tnglong Du2 1 Department
More informationNovel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000
Novel Pre-Compresson Rate-Dstorton Optmzaton Algorthm for JPEG 2000 Yu-We Chang, Hung-Ch Fang, Chung-Jr Lan, and Lang-Gee Chen DSP/IC Desgn Laboratory, Graduate Insttute of Electroncs Engneerng Natonal
More informationThe Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp
More informationTutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant
Tutoral 2 COMP434 ometrcs uthentcaton Jun Xu, Teachng sstant csjunxu@comp.polyu.edu.hk February 9, 207 Table of Contents Problems Problem : nswer the questons Problem 2: Power law functon Problem 3: Convoluton
More informationA Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling
Proceedngs of the World Congress on Engneerng and Computer Scence 007 WCECS 007, October 4-6, 007, San Francsco, USA A Fast Fractal Image Compresson Algorthm Usng Predefned Values for Contrast Scalng H.
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationMicrowave Diversity Imaging Compression Using Bioinspired
Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,
More informationScroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator
Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua
More informationDepartment of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification
Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled
More informationRegularized Discriminant Analysis for Face Recognition
1 Regularzed Dscrmnant Analyss for Face Recognton Itz Pma, Mayer Aladem Department of Electrcal and Computer Engneerng, Ben-Guron Unversty of the Negev P.O.Box 653, Beer-Sheva, 845, Israel. Abstract Ths
More information829. An adaptive method for inertia force identification in cantilever under moving mass
89. An adaptve method for nerta force dentfcaton n cantlever under movng mass Qang Chen 1, Mnzhuo Wang, Hao Yan 3, Haonan Ye 4, Guola Yang 5 1,, 3, 4 Department of Control and System Engneerng, Nanng Unversty,
More informationA Fast Computer Aided Design Method for Filters
2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method
More informationOrientation Model of Elite Education and Mass Education
Proceedngs of the 8th Internatonal Conference on Innovaton & Management 723 Orentaton Model of Elte Educaton and Mass Educaton Ye Peng Huanggang Normal Unversty, Huanggang, P.R.Chna, 438 (E-mal: yepeng@hgnc.edu.cn)
More informationOdd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits
Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School
More informationFormulas for the Determinant
page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use
More informationDAta hiding embeds messages into digital multimedia
1 Reversble Data Hdng n Color Image wth Grayscale Invarance Dongdong Hou, Wemng Zhang, Kejang Chen, San-Jheng Ln and Nengha Yu Abstract Dfferent from all the prevous reversble data hdng schemes, a completely
More informationA Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition
(IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer
More informationA Novel Fuzzy logic Based Impulse Noise Filtering Technique
Internatonal Journal of Advanced Scence and Technology A Novel Fuzzy logc Based Impulse Nose Flterng Technque Aborsade, D.O Department of Electroncs Engneerng, Ladoke Akntola Unversty of Tech., Ogbomoso.
More informationA New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic
Internatonal Journal of Computer Applcatons Technology and Research A New Desgn of Multpler usng Modfed Booth Algorthm and Reversble Gate Logc K.Nagarjun Department of ECE Vardhaman College of Engneerng,
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationCOMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION. Erdem Bala, Dept. of Electrical and Computer Engineering,
COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION Erdem Bala, Dept. of Electrcal and Computer Engneerng, Unversty of Delaware, 40 Evans Hall, Newar, DE, 976 A. Ens Cetn,
More informationAn Improved multiple fractal algorithm
Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton
More informationPulse Coded Modulation
Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal
More informationCalculation of time complexity (3%)
Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add
More informationKernel Methods and SVMs Extension
Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general
More informationReversible Data Hiding under Inconsistent Distortion Metrics
Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted Content may change pror to fnal publcaton Ctaton nformaton: DOI 009/TIP208285074, IEEE Reversble
More informationImprovement of Histogram Equalization for Minimum Mean Brightness Error
Proceedngs of the 7 WSEAS Int. Conference on Crcuts, Systems, Sgnal and elecommuncatons, Gold Coast, Australa, January 7-9, 7 3 Improvement of Hstogram Equalzaton for Mnmum Mean Brghtness Error AAPOG PHAHUA*,
More informationIMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER
Sgnal & Image Processng : An Internatonal Journal (SIPIJ) Vol.5, No.4, August 2014 IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Suman Shrestha 1, 2 1 Unversty of Massachusetts Medcal School,
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationMultigradient for Neural Networks for Equalizers 1
Multgradent for Neural Netorks for Equalzers 1 Chulhee ee, Jnook Go and Heeyoung Km Department of Electrcal and Electronc Engneerng Yonse Unversty 134 Shnchon-Dong, Seodaemun-Ku, Seoul 1-749, Korea ABSTRACT
More informationThe Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model
Journal of Computer and Communcatons, 04,, -6 Publshed Onlne July 04 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.436/cc.04.906 The Dgtal Fngerprntng Method for Statc Images Based on Weghted
More informationResource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud
Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationGrover s Algorithm + Quantum Zeno Effect + Vaidman
Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the
More informationThe Study of Teaching-learning-based Optimization Algorithm
Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute
More informationOperating conditions of a mine fan under conditions of variable resistance
Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety
More informationRotation Invariant Shape Contexts based on Feature-space Fourier Transformation
Fourth Internatonal Conference on Image and Graphcs Rotaton Invarant Shape Contexts based on Feature-space Fourer Transformaton Su Yang 1, Yuanyuan Wang Dept of Computer Scence and Engneerng, Fudan Unversty,
More informationQuantitative Discrimination of Effective Porosity Using Digital Image Analysis - Implications for Porosity-Permeability Transforms
2004, 66th EAGE Conference, Pars Quanttatve Dscrmnaton of Effectve Porosty Usng Dgtal Image Analyss - Implcatons for Porosty-Permeablty Transforms Gregor P. Eberl 1, Gregor T. Baechle 1, Ralf Weger 1,
More informationOn the Repeating Group Finding Problem
The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng
More informationComments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards
Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com
More informationA Robust Method for Calculating the Correlation Coefficient
A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal
More informationCryptanalysis of pairing-free certificateless authenticated key agreement protocol
Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen
More informationResearch Article Green s Theorem for Sign Data
Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of
More informationUsing Immune Genetic Algorithm to Optimize BP Neural Network and Its Application Peng-fei LIU1,Qun-tai SHEN1 and Jun ZHI2,*
Advances n Computer Scence Research (ACRS), volume 54 Internatonal Conference on Computer Networks and Communcaton Technology (CNCT206) Usng Immune Genetc Algorthm to Optmze BP Neural Network and Its Applcaton
More informationarxiv:cs.cv/ Jun 2000
Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São
More informationReport on Image warping
Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.
More informationVQ widely used in coding speech, image, and video
at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng
More informationCopyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for P Charts. Dr. Wayne A. Taylor
Taylor Enterprses, Inc. Control Lmts for P Charts Copyrght 2017 by Taylor Enterprses, Inc., All Rghts Reserved. Control Lmts for P Charts Dr. Wayne A. Taylor Abstract: P charts are used for count data
More informationChapter 3 Describing Data Using Numerical Measures
Chapter 3 Student Lecture Notes 3-1 Chapter 3 Descrbng Data Usng Numercal Measures Fall 2006 Fundamentals of Busness Statstcs 1 Chapter Goals To establsh the usefulness of summary measures of data. The
More informationReal-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling
Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for
More informationFast Copy-Move Forgery Detection
Fast Copy-Move Forgery Detecton HWEI-JEN LIN 1, CHUN-WEI WANG 1 and YANG-TA KAO 2 1 Department of Informaton Engneerng and Computer Scence Tamkang Unversty 2 Department of Network Informaton Technology
More informationGEMINI GEneric Multimedia INdexIng
GEMINI GEnerc Multmeda INdexIng Last lecture, LSH http://www.mt.edu/~andon/lsh/ Is there another possble soluton? Do we need to perform ANN? 1 GEnerc Multmeda INdexIng dstance measure Sub-pattern Match
More informationAP Physics 1 & 2 Summer Assignment
AP Physcs 1 & 2 Summer Assgnment AP Physcs 1 requres an exceptonal profcency n algebra, trgonometry, and geometry. It was desgned by a select group of college professors and hgh school scence teachers
More informationA Network Intrusion Detection Method Based on Improved K-means Algorithm
Advanced Scence and Technology Letters, pp.429-433 http://dx.do.org/10.14257/astl.2014.53.89 A Network Intruson Detecton Method Based on Improved K-means Algorthm Meng Gao 1,1, Nhong Wang 1, 1 Informaton
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationLow Complexity Soft-Input Soft-Output Hamming Decoder
Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg
More informationImpulse Noise Removal Technique Based on Fuzzy Logic
Impulse Nose Removal Technque Based on Fuzzy Logc 1 Mthlesh Atulkar, 2 A.S. Zadgaonkar and 3 Sanjay Kumar C V Raman Unversty, Kota, Blaspur, Inda 1 m.atulkar@gmal.com, 2 arunzad28@hotmal.com, 3 sanrapur@redffmal.com
More informationCHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE
CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng
More informationConstructing Control Process for Wafer Defects Using Data Mining Technique
The Fourth nternatonal Conference on Electronc Busness (CEB004) / Bejng 5 Constructng Control ocess for Wafer Defects Usng Data Mnng Technque Leeng Tong Hsngyn Lee Chfeng Huang Changke Ln Chenhu Yang Department
More informationHigh-Speed Decoding of the Binary Golay Code
Hgh-Speed Decodng of the Bnary Golay Code H. P. Lee *1, C. H. Chang 1, S. I. Chu 2 1 Department of Computer Scence and Informaton Engneerng, Fortune Insttute of Technology, Kaohsung 83160, Tawan *hpl@fotech.edu.tw
More informationLINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity
LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationWavelet chaotic neural networks and their application to continuous function optimization
Vol., No.3, 04-09 (009) do:0.436/ns.009.307 Natural Scence Wavelet chaotc neural networks and ther applcaton to contnuous functon optmzaton Ja-Ha Zhang, Yao-Qun Xu College of Electrcal and Automatc Engneerng,
More informationChange Detection: Current State of the Art and Future Directions
Change Detecton: Current State of the Art and Future Drectons Dapeng Olver Wu Electrcal & Computer Engneerng Unversty of Florda http://www.wu.ece.ufl.edu/ Outlne Motvaton & problem statement Change detecton
More informationA New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1
A New Metrc for Qualty Assessment of Dgtal Images Based on Weghted-Mean Square Error Proceedngs of SPIE, vol. 4875, 2002 Kawen Zhang, Shuozhong Wang, and Xnpen Zhang School of Communcaton and Informaton
More informationA New Evolutionary Computation Based Approach for Learning Bayesian Network
Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang
More informationAudio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression
Journal of Informaton Securty, 2011, 2, 99-112 do:10.4236/js.2011.23010 Publshed Onlne July 2011 (http://www.scrp.org/journal/js) Audo Watermarkng Usng Wavelet Transform and Genetc Algorthm for Realzng
More informationGrey prediction model in world women s pentathlon performance prediction applied research
Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 4, 6(6):36-4 Research Artcle ISSN : 975-7384 CODEN(USA) : JCPRC5 Grey predcton model n world women s pentathlon performance predcton
More informationGeneral theory of fuzzy connectedness segmentations: reconciliation of two tracks of FC theory
General theory of fuzzy connectedness segmentatons: reconclaton of two tracks of FC theory Krzysztof Chrs Ceselsk Department of Mathematcs, West Vrgna Unversty and MIPG, Department of Radology, Unversty
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationDesign and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm
Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:
More informationLossy Compression. Compromise accuracy of reconstruction for increased compression.
Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost
More informationBoostrapaggregating (Bagging)
Boostrapaggregatng (Baggng) An ensemble meta-algorthm desgned to mprove the stablty and accuracy of machne learnng algorthms Can be used n both regresson and classfcaton Reduces varance and helps to avod
More informationBACKGROUND SUBTRACTION WITH EIGEN BACKGROUND METHODS USING MATLAB
BACKGROUND SUBTRACTION WITH EIGEN BACKGROUND METHODS USING MATLAB 1 Ilmyat Sar 2 Nola Marna 1 Pusat Stud Komputas Matematka, Unverstas Gunadarma e-mal: lmyat@staff.gunadarma.ac.d 2 Pusat Stud Komputas
More informationNON LINEAR ANALYSIS OF STRUCTURES ACCORDING TO NEW EUROPEAN DESIGN CODE
October 1-17, 008, Bejng, Chna NON LINEAR ANALYSIS OF SRUCURES ACCORDING O NEW EUROPEAN DESIGN CODE D. Mestrovc 1, D. Czmar and M. Pende 3 1 Professor, Dept. of Structural Engneerng, Faculty of Cvl Engneerng,
More informationPsychology 282 Lecture #24 Outline Regression Diagnostics: Outliers
Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.
More informationTornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003
Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel
More informationClock-Gating and Its Application to Low Power Design of Sequential Circuits
Clock-Gatng and Its Applcaton to Low Power Desgn of Sequental Crcuts ng WU Department of Electrcal Engneerng-Systems, Unversty of Southern Calforna Los Angeles, CA 989, USA, Phone: (23)74-448 Massoud PEDRAM
More informationAn Interactive Optimisation Tool for Allocation Problems
An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents
More informationWhite Noise Reduction of Audio Signal using Wavelets Transform with Modified Universal Threshold
Whte Nose Reducton of Audo Sgnal usng Wavelets Transform wth Modfed Unversal Threshold MATKO SARIC, LUKI BILICIC, HRVOJE DUJMIC Unversty of Splt R.Boskovca b.b, HR 1000 Splt CROATIA Abstract: - Ths paper
More informationComparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method
Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method
More informationMULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN
MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN S. Chtwong, S. Wtthayapradt, S. Intajag, and F. Cheevasuvt Faculty of Engneerng, Kng Mongkut s Insttute of Technology
More informationComparative Analysis between Different Linear Filtering Algorithms of Gamma Ray Spectroscopy
Comparatve Analyss between Dfferent Lnear Flterng Algorthms of Gamma Ray Spectroscopy Mohamed S. El_Tokhy, Imbaby I. Mahmoud, and Hussen A. Konber Abstract Ths paper presents a method to evaluate and mprove
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationCHAPTER-5 INFORMATION MEASURE OF FUZZY MATRIX AND FUZZY BINARY RELATION
CAPTER- INFORMATION MEASURE OF FUZZY MATRI AN FUZZY BINARY RELATION Introducton The basc concept of the fuzz matr theor s ver smple and can be appled to socal and natural stuatons A branch of fuzz matr
More informationChapter 8 SCALAR QUANTIZATION
Outlne Chapter 8 SCALAR QUANTIZATION Yeuan-Kuen Lee [ CU, CSIE ] 8.1 Overvew 8. Introducton 8.4 Unform Quantzer 8.5 Adaptve Quantzaton 8.6 Nonunform Quantzaton 8.7 Entropy-Coded Quantzaton Ch 8 Scalar
More informationMulti-Scale Weighted Nuclear Norm Image Restoration: Supplementary Material
Mult-Scale Weghted Nuclear Norm Image Restoraton: Supplementary Materal 1. We provde a detaled dervaton of the z-update step (Equatons (9)-(11)).. We report the deblurrng results for the ndvdual mages
More informationPolynomial Regression Models
LINEAR REGRESSION ANALYSIS MODULE XII Lecture - 6 Polynomal Regresson Models Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur Test of sgnfcance To test the sgnfcance
More informationInteractive Bi-Level Multi-Objective Integer. Non-linear Programming Problem
Appled Mathematcal Scences Vol 5 0 no 65 3 33 Interactve B-Level Mult-Objectve Integer Non-lnear Programmng Problem O E Emam Department of Informaton Systems aculty of Computer Scence and nformaton Helwan
More informationThe internal structure of natural numbers and one method for the definition of large prime numbers
The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract
More informationNP-Completeness : Proofs
NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem
More information