Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms

Size: px
Start display at page:

Download "Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms"

Transcription

1 Reversble Data Hdng Based on Two-level HDWT Coeffcent Hstograms Xu-Ren Luo 1, Chen-Hu Jerry Ln 2 and Te-Lung Y 3 1 Department of Electrcal and Electronc Engneerng, Chung Cheng Insttute of Technology, Natonal Defense Unversty, Tahs, Taoyuan 33509, Tawan, Republc of Chna nrgman.luo@gmal.com 2 Department of Electrcal and Electronc Engneerng, Chung Cheng Insttute of Technology, Natonal Defense Unversty, Tahs, Taoyuan 33509, Tawan, Republc of Chna jerryln@ndu.edu.tw 3 Department of Computer Scence and Informaton Engneerng, Chna Unversty of Technology, Hukou, Hsnchu 303, Tawan, Republc of Chna yntl@cute.edu.tw ABSTRACT In recent years, reversble data hdng has attracted much more attenton than before. Reversblty sgnfes that the orgnal meda can be recovered wthout any loss from the marked meda after extractng the embedded message. Ths paper presents a new method that adopts two-level wavelet transform and explots the feature of large wavelet coeffcent varance to acheve the goal of hgh capacty wth mperceptblty. Our method dffers from those of prevous ones n whch the wavelet coeffcents hstogram not gray-level hstogram s manpulated. Besdes, clever shftng rules are ntroduced nto hstogram to avod the decmal problem n pxel values after recovery to acheve reversblty. Wth small alteraton of the wavelet coeffcents n the embeddng process, and therefore low vsual dstorton s obtaned n the marked mage. In addton, an mportant feature of our desgn s that the use of threshold s much dfferent from prevous studes. The results ndcate that our desgn s superor to many other state-of-the-art reversble data hdng schemes. KEYWORDS Reversblty, Marked meda, Wavelet Transform, Wavelet Coeffcent, Dstorton, Hstogram 1. INTRODUCTION Known as lossless, nvertble, or dstorton-free data hdng, reversble data hdng s a type of delcate and vulnerable technque that s manly used for qualty-senstve applcatons such as multmeda content authentcaton, medcal magng systems, law enforcement, and mltary magery. The prmary goal n such applcatons s to recover the orgnal meda exactly. The key factors of reversble data hdng nclude the embeddng capacty and vsual qualty of the marked meda, whch are for achevng satsfactory performance n varous applcatons[1][2]. The scheme we present n ths paper s an attempt to acheve hgh-performance reversble data hdng, n whch embeddng and recoverng processes n the frequency doman are devsed. The partculartes of large wavelet coeffcent varance and mnor changes n wavelet coeffcents followng the embeddng process are exploted to acheve hgh capacty and mperceptble embeddng. The rest of ths paper s organzed as follows. In Secton 2, prevous reversble data DOI : /acj

2 hdng schemes and ther characterstcs wll be brefly revewed n terms of embeddng capacty and vsual qualty. Our proposed scheme s ntroduced n Secton 3. Expermental results and comparatve analyses are presented n Secton 4. Fnally, some conclusons are drawn n Secton PREVIOUS STUDIES The related works reported n the lterature can be classfed nto two major types accordng to the doman for hdng nformaton. In type-i, the schemes work on the transform doman. In 2002, Frdrch et al. [3][4] presented a novel RS scheme starts by dvdng the mage nto three dsjont blocks, and then classfes these blocks nto dfferent groups R, S, and U usng a dscrmnatng functon. The flppng functon s also ntroduced to convert an R-group to an S- group and vce versa. The scheme further compresses the R and S groups wthout loss, and embeds message bts nto the state of each group. Although t s a novel technque, the payload s stll nsuffcent for some applcatons and hghly dependent on the compresson algorthm. Subsequently, Xuan et al. [5] proposed a new scheme n the nteger wavelet transform (IWT) doman. In ths scheme, one or multple mddle bt-plan(s) n the hgh-frequency sub-bands s(are) chosen to embed data bts. In 2003, a dfference expanson (DE) scheme was proposed by Tan [6], who appled the nteger Haar wavelet transform to an mage and exploted the DE technque to embed data bts nto the hgh-frequency coeffcents. However, ths scheme suffers from the locaton map problem that t s dffcult to acheve capacty control. Alattar [7][8] extended Tan s scheme by generalzng the DE technque to the trplets and quads of adjacent pxels. Kamstra et al. [9][10] mproved the DE scheme by predctng the expandable locatons n the hgh-pass band. Ths scheme mproves the effcency of lossless compresson, although the embeddng capacty s small. In 2007, Thod et al. [11] proposed a new scheme combnng hstogram shftng and predcton-error expanson approaches to remedy the problems of Tan s scheme. In type-ii, most of the studes focus on the spatal doman. Frdrch et al. [12] proposed an nvertble method to authentcate dgtal mage usng the jont b-level mage experts group (JBIG) lossless compresson technque to save free space for data embeddng. However, some nosy mages may lead to the use of hgher bt-planes and result n hghly vsble dstortons. The payload s hghly dependent on the lossless compresson algorthm. Celk et al. [13][14] employed the generalzed least-sgnfcant-bt (G-LSB) technque and the context-based adaptve lossless mage codng (CALIC) to acheve lossless data hdng. In 2006, N et al. [15] utlzed multple pars of maxmum and mnmum ponts of mage hstogram to acheve reversblty. In the scheme, the pxels are modfed for data embeddng and extracton. The greater the number of pars that are selected, the larger the payload becomes. Besdes, ths scheme can acheve hgher embeddng capacty through usng a mult-level strategy. However, such a strategy may lead to sgnfcant overhead and nsuffcent vsual qualty. N s scheme was also extended by others usng a locaton map rather than the knowledge of the pars to acheve reversblty [16][17]. Although the scheme s smple comparng to other schemes, sgnfcant overhead and nsuffcent vsual qualty are crtcal problems. In 2009, Km et al. [18] utlzed the feature of hgh spatal correlaton between neghborng pxels to acheve hghperformance data hdng. The embeddng capacty n the paper ranges from 6 to 210 k. For all of the schemes above, addtonal overhead s the most dffcult problems n the restore process. Ths paper proposes a new hstogram shftng technque n the frequency doman and uses the actual payload to acheve hgh-performance lossless data hdng. 3. THE PROPOSED SCHEME Ths secton present a new scheme that combnes the two-level Haar dscrete wavelet transform (HDWT) algorthm and new hstogram shftng rules. The HDWT algorthm can produce a 2

3 complete and lossless reconstructon durng synthess wth approprate flters. Moreover, the hstogram shftng rules used n the frequency doman can provde hgher flexblty n terms of scalablty n resoluton and dstorton. In our scheme, an orgnal mage s frst transformed nto a frequency doman and sub-bands n the mddle- and hgh-frequency ranges are then used to create sub-band dfferences. Each hstogram of these sub-band dfferences s then shfted accordng to a selected threshold. Message bts can then be hdden n the empty bns of the shfted hstograms. Fnally, the marked mage s reconstructed wth the sub-bands carryng and non-carryng hdden message by performng the nverse HDWT algorthm to complete the embeddng process. In the extractng process, the correspondng nverse operatons can exactly extract the hdden message and recover the orgnal mage Segmentaton algorthm The two-level HDWT algorthm utlzes the four-band sub-band codng system to decompose an mage nto a set of dfferent frequency sub-bands. As llustrated n Fgures 1 and 2, the sze of each sub-band s one ethth of the orgnal mage n the spatal doman. The eght dfferent sub-bands can be classfed nto the low-, mddle-, and hgh-frequency sub-bands. Snce the low-frequency sub-band of an mage ncorporates more energy than the other sub-bands, ts coeffcents are the most fragle that f any of them are manpulated, a suspect can vsbly detect the changes on the spatal doman mage. However, f the coeffcents n the mddle- and/or hgh-frequency sub-bands are altered, the changes n the spatal doman mage wll be mperceptble to human eyes. Consequently, ths characterstc s generally exploted to hde secret message. Fgure 1. The decomposton process of two-level HDWT 3.2. Data embeddng algorthm Fgure 2. A tow-level HDWT four-band splt of Lena We assume that the secret message s a random bnary sequence of 0s and 1s. The hstograms of the sub-band dfferences between the reference sub-band and the other destnaton sub-bands are shfted to embed the secret message. Fgure 3 depcts the overall data embeddng process, whch s descrbed n detal below. 3

4 Fgure 3. Flowchart of data embeddng process Embeddng_process ( η, T, ϕ ) Input: η, the orgnal mage; T, the threshold accordng to whch the empty bns n each hstogram are prepared; φ, the secret message. Output: ψ, the marked mage, f, the mark of embeddng status. Advan Proceedngs: Step 1: Create sub-bands by performng two-level HDWT four-band sub-band codng system on an nput mageη. Fve of the sub-bands to be utlzed are denoted by L H ( x, y ), H L ( x, y ), H H ( x, y ), L H 2 ( x, y ), and H H 2 ( x, y ), where ( x, y) ndcates the coordnate of the coeffcents n each sub-band. Step 2: Create sub-band dfferences D, 1 D and 2 D between the reference sub-bands L H, 3 LH 2 and the other destnaton sub-bands HL, HH and HH 2 by the followng formulas: D ( x, y ) = L H ( x, y ) H L ( x, y ) 1, (1) D ( x, y ) = LH ( x, y ) H H ( x, y ) 2, (2) D 3 ( x, y ) = L H 2( x, y ) H H 2( x, y ). (3) 4

5 Step 3: Denote the hstograms of D as h, where = 1,2,3. Step 4: Shft hstogram h accordng to the threshold T selected. The shfted h can be calculated as follows: ( ) ( ) ( ) ( ) h j + 8, f h j T + 1, h h j 8, f h j ( T + 1 ), (4) where 1, 2,3 = and ( ) j ndcates the value of each bn. These can also be obtaned by the followng formulas: D ( x, y ) = L H ( x, y ) H L ( x, y ) 1, (5) D ( x, y ) = L H ( x, y ) H H ( x, y ) 2, (6) D ( x, y ) = L H 2 ( x, y ) H H 2 ( x, y ) 3. (7) where HL ( x, y), HH ( x, y) HL ( x, y) HH ( x, y) HH 2 ( x, y) and HH ( x, y) 2 can be expressed as: HL( x, y ) 8, f h1 T + 1, HL( x, y ) + 8, f h1 ( T + 1 ). (8) HH ( x, y ) 8, f h2 T + 1, HH ( x, y ) + 8, f h2 ( T + 1 ). (9) HH 2( x, y ) 8, f h3 T + 1, HH 2( x, y ) + 8, f h3 ( T + 1 ). (10) Embeddng Data nto HL, HH and HH2: Step 5: We frst set an nteraton ndex l to T and then embed message bts sequentally by modfyng h. Each h s shfted to become h, where = 1, 2 and 3by the followng rules: h h h h h for l > , f h + 4, f h 8, f h 4, f h = = l, l, = l, = l, ϕ( n) = 0, ϕ( n) = 1, ϕ( n) = 0, ϕ( n) = 1, (11) h h ( j ) + 8, f h = 0, φ( n) = 0, h ( j ) + 4, f h = 0, φ( n) = 1, (12) for l = 0. The changes n the dfference hstograms above result n changes n the coeffcents. Ths mples that the modfed sub-band dfference D ( x, y) s scanned and modfed agan. Once the 5

6 value of D ( x, y) s equal to ±l, the message bt s embedded. Ths procedure s repeated untl there are no D ( x, y) wth the value of ±l. We then decrease l by 1 and repeat the step untll < 0. These steps can be formulated as follows: D ( x, y ) = L H ( x, y ) H L ( x, y ) 1, (13) D ( x, y ) = L H ( x, y ) H H ( x, y ) 2, (14) D ( x, y ) = L H 2 ( x, y ) H H 2 ( x, y ) 3. (15) f l > 0, ( ) HL ( x, y ) + 4, f h1 j = l, φ( n) = 1, HL ( x, y ) 4, f h1 = l, φ( n) = 1, HL ( x, y) HL ( x, y ) + 8, f h1 = l, φ( n) = 0, HL ( x, y ) 8, f h1 = l, φ( n) = 0. ( ) HH ( x, y ) + 4, f h2 j = l, φ( n) = 1, HH ( x, y ) 4, f h2 = l, φ( n) = 1, HH ( x, y) HH ( x, y ) + 8, f h2 = l, φ( n) = 0, HH ( x, y ) 8, f h2 = l, φ( n) = 0. ( ) HH 2 ( x, y ) + 4, f h3 j = l, φ( n) = 1, HH 2 ( x, y ) 4, f h3 = l, φ( n) = 1, HH 2 ( x, y) HH 2 ( x, y ) + 8, f h3 = l, φ( n) = 0, HH 2 ( x, y ) 8, f h3 = l, φ( n) = 0. (16) (17) (18) f l = 0, HL ( x, y) HH ( x, y) HH 2 ( x, y) HL ( x, y ) 4, f h1( j) = 0, φ(n) = 1, HL ( x, y ) 8, f h1 = 0, φ(n) = 0. (19) HH ( x, y ) 4, f h2 = 0, φ(n) = 1, HH ( x, y ) 8, f h2 = 0, φ(n) = 0. (20) HH 2( x, y ) 4, f h3( j) = 0, φ(n) = 1, HH 2( x, y ) 8, f h3 = 0, φ(n) = 0. (21) Centralzng Hstogram Step 6: When all the bns n the dfference hstogram are exhausted to hde data, eght bns, valued from 4 to 3, wll become empty. In ths case, the mark f s set to be 1 and all bns on the rght sde wll be moved left 4 bns, and those on the left wll be moved rght 4 bns n order to mprove the mage qualty by decreasng the varance of the dfferences n the coeffcents. Otherwse, the mark f s set to be 0. Each h s shfted to become h by the followng rules: 6

7 h ( j ) 4, f h ( j ) 0, h ( j > ) h ( j ) + 4, f h ( j ) < 0, (22) where = 1, 2 and 3. Shftng hstograms as above creates coeffcent changes, whch can be formulated as follows: D ( x, y ) = LH ( x, y ) H L ( x, y ) 1, (23) D (, ) (, ) (, ) 2 x y = LH x y HH x y, (24) D (, ) 2(, ) 2 (, ) 3 x y = LH x y HH x y, (25) where HL ( x, y), HH ( x, y) and HH ( x, y) 2 can be expressed as: HL ( x, y) HH ( x, y) HH 2 ( x, y) HL ( x, y ) + 4, f h1 > 0, HL ( x, y ) 4, f h1 < 0. (26) HH ( x, y ) + 4, f h2 > 0, HH ( x, y ) 4, f h2 < 0. (27) HH 2 ( x, y ) + 4, f h3 > 0, HH 2 ( x, y ) 4, f h3 < 0. (28) Embeddng Data nto LH: Step 7: Usng the sub-band HL wth the hdden message as the reference, a fourth dfference hstogram s created wth the orgnal sub-band LH. The secret message s then hdden nto ths dfference hstogram accordng to steps 1 to 6; as a result, LH ( x, y) wll be created. Ths completes the embeddng process. Obtanng Marked Image: Step 8: Reconstruct the marked mage by utlzng the nverse of the two-level HDWT fourband sub-band codng on the sub-bands. We frst reconstruct the LL sub-band and then reconstruct the marked mage ψ. Ths procedure can be formulated as follows: LL IDW T S S S S = ( LL 2, LH 2, HL 2, HH 2 ), (29) ψ = IDWT ( S LL, S LH, S HL, S HH ). (30) Preventng overlap and over/underflow A flag-bt s used to ndcate whether the bn n the dfferent hstograms s overlap or not. The flag-bt s set to 1 f a bn value shfted by ± 8 overlaps wth one shfted by ± 4. The flag-bt s set to 0 f no overlap occurs. These flag-bts and the values of T and f n the btmap wll ultmately all be compressed wth an effcent compresson tool based on the LZMA algorthm. The compressed result s then hdden nto the reserved non-overlappng bns. Accordng to expermental results, ths process results n less than 2.74% overhead n full embeddng capacty for many dfferent types of mages. 7

8 Though the generated pxel values n the marked mage may be outsde the allowable range, the method n [12][18] could be used to deal wth the problem. The nterval range s dynamcally selected wth the mage characterstcs that t wll reduce dstortons to mnmum Data extractng and reversng algorthm Before extractng the hdden message, recever needs to verfy whether or not the marked mage ψ has been modfed. If there s more than one occurrence at h = 1, we can conclude that the marked mageψ has been tampered wth. The proposed scheme then stops the followng extracton steps mmedately. The extracton and recovery process s schematzed n Fgure 4. ψ Fgure 4. Flowchart of extracton and recovery process The detaled extracton and recovery process ncludes the followng steps: Extractng_process ( ψ, T, f ) Input: ψ, the marked mage; T, the threshold; f, the mark, accordng to whch the embeddng status s determned. Output: φ, the secret message; η, the orgnal mage. Advan Proceedngs: Step 1: Create sub-bands by performng two-level HDWT four-band codng on the marked mage ψ. Fve of the sub-bands to be utlzed are denoted by ψ ( x, y ), ψ ( x, y), ψ ( x, y), LH HL HL 8

9 x y ndcates the coordnate of the coeffcents n each sub- ψ (, ) LH 2 x y and (, ) HH 2 x y band. ψ, where (, ) Recoverng LL Sub-band Step 2: Create sub-band dfference Dψ 1( x, y) between the reference sub-band ψ LH 2 and the destnaton sub-band ψ HH 2 accordng to the followng formulas: D ψ ( x, y ) = ψ ( x, y ) ψ ( x, y ). (31) 1 L H 2 H H 2 Step 3: Denote the hstogram of D ( x, y) as ψ 1 hψ 1, where ndcates the value of each bn. Step 4: Check the dstrbuton of the hstogram hψ 1. If there s more than one occurrence at h =, the subsequent steps wll be stopped mmedately. ψ 1 1 Step 5: Check the embeddng status. Once the value of f s equal to 1, t can be concluded that the sub-band s completely flled wth hdden message bts. Subsequently, frst restore the orgnal dfference hstogram. The bns greater than or equal to zero wll be shfted to the rght by 4 and those less than zero to the left by 4. The restored hψ 1 can be calculated as follows: ( ) ( ) hψ 1 j + 4, f hψ 1 j 0, h ψ1 hψ 1 4, f hψ 1 < 0. (32) These can also be obtaned by the followng formulas: D ψ 1 ( x, y) = ψ LH 2 ( x, y) ψ HH 2 ( x, y), (33) where ψ (, ) 2 x y can be expressed as: HH ψ HH 2 ( x, y ) 4, f hψ 1 0, ψ HH 2 ( x, y) ψ HH 2 ( x, y ) + 4, f hψ 1 < 0. (34) Extractng Data: Step 6: Extract the hdden message φ ( n), where n denotes the ndex of a message bt, by shftng h 1 teraton ndex l s set to 0. Once a hψ 1 wth a value of ± ( + 4) 1 s retreved. On the other hand, a bnary bt 0 s retreved f h 1 l. Ths procedure s repeated untl there are no h ± ( + 8) ψ wth reference to the btmap and nvertng the embeddng process. Frst, the l s encountered, a bnary bt ψ 1 values of ± ( + 4) ψ has a value of l or ± ( l + 8). Subsequently, l s ncreased by 1. The same procedures as descrbed above are repeated untl l reaches T+1. The retrevng rule s as follows: ( ) ψ ( ) ( ) ( ) h ψ 1 j 8, f h 1 j = 8, h ψ 1 h j 4, f h j = 4, for l = 0. ψ 1 ψ 1 (35) 9

10 ( ) ψ ( ) ( ) ( ) h ψ1 j 8, f h 1 j = l+ 8, h ψ1 j 4, f h ψ1 j = l+ 4, h ψ1 h ψ1( j ) + 8, f h ψ1 = ( l+ 8), h ψ1( j ) + 4, f h ψ1 = ( l+ 4), for 1 l T. (36) Step 7: At the same tme, the modfed sub-band dfference D ψ ( x, y) 1 s also scanned and modfed. The extractng operaton can be expressed as the followng formula: φ ( n) 0, f D ( x, y) = ± ( l + 8 ), 1, f (, ) ( 4 ). ψ 1 D ψ 1 x y = ± l + (37) Ths procedure s executed untl l = T+1. Step 8: Remove the hdden message bts ( n) { 0,1} removng rule s gven by D ψ ( x, y) = ψ ( x, y) ψ ( x, y), (38) 1 LH 2 HH 2 where ψ (, ) 2 x y can be expressed as HH φ from the sub-band dfference. The ψ HH (, ) + 8, f = 8, = 0, ψ HH 2( x, y) ψ HH 2(, ) + 4, f ψ1 = 4, = 1, 2 x y hψ 1 x y h ϕ( n) (39) for l = 0, and ( ) l ) ( ) l ϕ( ) ψ HH 2( x, y ) + 8 f h ψ1 j = + 8, n = 0, ψ HH 2( x, y ) + 4 f h ψ1 j = + 4, n = 1, ψ HH 2( x, y) ψ HH 2( x, y ) 8 f h ψ1 = ( l+ 8), = 0, ψ HH 2( x, y ) 4 f h ψ1 = ( l+ 4), ϕ( n) = 1, (40) for 1 l T. Step 9: Restore the orgnal hstogram. The orgnal hstogram h ψ 1 can be calculated accordng to the followng rules: ( ) ψ ( ) ( ) ( ) h ψ 1 j 8 f h 1 j T + 1, h ψ 1 h ψ 1 j + 8 f h ψ 1 j ( T + 1). (41) for l L. The restoraton of the hstogram as descrbed above results n changes n the coeffcents. Ths can be descrbed by the followng formula: D ψ ( x, y) = ψ ( x, y) ψ ( x, y). (42) 1 LH 2 HH 2 10

11 Here, ψ (, ) 2 x y can be expressed as: HH ψhh ( x, y ) + 8, f h j T+ 1, ψhh 2( x, y) ψhh 2( x, y ) 8, f h ψ1 j ( T+ 1). 2 ψ1( ) ( ) (43) Obtanng the LL Sub-band: Step 10: Recover the orgnal Sub-band LL through the nverse operaton of the HDWT algorthm wth ψ (, ) LL2 x y, ψ (, ) LH 2 x y, ψ ( x HL, y ), and ψ (, ) HH 2 x y. Ths procedure can be formulated as follows: LL = IDWT ( ψ, ψ, ψ, ψ ). (44) LL2 LH 2 HL2 HH 2 Recoverng LH, HL and HH Sub-bands: Step 11: After recoverng the LL sub-band, steps 1 to 9 are repeated to recover the LH, HL and HH sub-bands as ψ ( x, y ), ψ ( x, y ) and ψ ( x, y ). LH Obtanng Orgnal Image: HL HH Step 12: Recover the orgnal mage η through the nverse operaton of the HDWT algorthm wth ψ ( x, y ), ψ ( x, y ), ψ ( x, y ) and ψ ( x, y ). Ths procedure can be formulated as follows: LH HL η = IDWT ( ψ, ψ, ψ, ψ ). (45) LL LH HL HH HH The above steps complete the extracton and recoverng procedure. 4. EXPERIMENTAL RESULTS AND COMPARISON LL In ths secton, a set of experments are conducted to evaluate the embeddng performance of our scheme. For these experments, we used many dfferent types of mages, ncludng some commonly used ones and two medcal mages (Fgure 5). The message bts to be embedded n our experments are randomly generated by a pseudo-random bnary generator. The threshold ranges from 0 to

12 Advanced Computng: An Internatonal Journal ( ACIJ ), Vol.2, No.1, January 2011 Fgure 5. 8-bt mages(a)lena, (b)baboon, (c)boat, (d)arplane, (e)aeral, (f)tank, (g)trucks, (h)medcal mage1, () Medcal mage2 Capacty versus Threshold Fgure 6 depcts relatonshp between the capacty n bpp and threshold. The embeddng rate almost reaches 0.78 bpp at threshold 100 for most the test mages. As expected the capacty s nearly proportonal to the threshold at the begnnng and saturates when the threshold s suffcently hgh. Fgure 6. Embeddng capacty at varous thresholds Vsual Qualty versus Threshold Fgure 7 llustrates the vsual qualty n PSNR of the marked mage versus threshold varyng from 0 to 100 for test mages on the premse that maxmal bts are embedded. The expermental result ndcates that the PSNR rses as the threshold ncreases and ths s not the case for the prevous works. The marked mage can acheve 43.3 db at the threshold 0, and above 46 db at the threshold of 100 for most test mages. It s noteworthy that the larger threshold T can contrbute less varaton n the hstogram of wavelet transform. Snce the mddle/hgh-frequency 12

13 sub-bands ncorporate less energy, the test mages wth larger varance between mddle and hgh-wavelet coeffcents such as MRI 1 and MRI 2 can acheve hgher vsual qualty than Baboon at the threshold 0. Fgure 7. PSNR at varous thresholds Comparson of vsual qualty wth other schemes In terms of actual embeddng capacty and vsual qualty, the proposed scheme was also compared wth the DE scheme [14], G-LSB scheme [5], Km et al. s scheme [9], and N et al. s scheme [6] for the Lena, Baboon, Boat, and Arplane mages as shown n Fgure 8. The embeddng capacty s the amount of embedded bts wth overhead subtracted. It can be observed that our scheme s stable and acheves hghest PSNR at the same bpp. 13

14 Fgure 8. Comparson of embeddng capacty n bpp versus dstorton wth exstng reversble schemes: DE scheme, G-LSB scheme, Km et al. s scheme, and N et al s scheme: (A) Baboon; (B) Lena; (C) Boat; (D) Arplane 5. CONCLUSIONS In ths paper, we propose a smple and hgh-performance reversble data hdng scheme, whch utlzes the large varance of wavelet coeffcents and ngenous hstogram shftng rules to 14

15 avod the decmal problem n pxel values durng recovery process. Our scheme, compared wth those reported prevously, can obtan better vsual qualty of the marked mages gven the same payload. The man reason s that the vsual qualty of our scheme does not decay wth ncreasng threshold as n the other schemes because the larger threshold can contrbute less varaton to the sub-band dfference hstograms. In addton, our scheme provdes the greatest embeddng capacty under nearly equvalent vsual qualty, as the partculartes of large wavelet coeffcent varance and mnor changes n the wavelet coeffcents followng the embeddng process are utlzed. It may be of nterest for future research that the threshold predctons, mult-round schemes, and fast algorthms wll be explored to meet real-tme applcaton requrements. REFERENCES [1] W. Bender, D. Gruhl, N. Mormoto, and A. Lu, (1996) Technques for data hdng, IBM systems Journal, vol.35, no.3, pp [2] M. Awrangjeb, An overvew of reversble data hdng, (December 2003) Proceedngs Sxth Internatonal Conference on Computer and Informaton Technology, Jahangrnagar Unversty, Bangladesh, pp [3] J. Frdrch, M. Goljan, and R. Du, Dstorton-free data embeddng, (2001) Proceedngs 4th Informaton Hdng Workshop, New York, vol.2137, pp.27 41, Lecture Notes n Computer Scence. [4] J. Frdrch, M. Goljan, and R. Du, (2002) Lossless data embeddng new paradgm n dgtal watermarkng, EURASIP J. Appl. Sgnal Process. vol.2, pp [5] G. Xuan, Y.Q. Sh, J. Chen, J. Zhu, and Z. N, W. Su, (2002) Lossless data hdng based on nteger wavelet transform, IEEE Internatonal Workshop on Multmeda Sgnal Processng, St. Thomas, Vrgn Islands, USA, December [6] J. Tan, (2003) Reversble data embeddng usng a dfference expanson, IEEE Transacton on Crcuts and Systems for Vdeo Technology,vol.13, no.8, pp [7] A.M. Alattar, (2003) Reversble watermark usng dfference expanson of trplets, Proceedngs IEEE Internatonal Conference on Image Processng, vol.1, Barcelona, Span, pp , September. [8] A.M. Alattar, (May 2004) Reversble watermark usng dfference expanson of quads, Proceedngs IEEE Internatonal Conference on Acoustcs, Speech, and Sgnal Processng, Montreal, Canada, vol.3, pp [9] L. Kamstra and H.J.A.M. Hejmans, (August 2004) Wavelet technques for reversble data embeddng nto mages, Centrum voorwskunde en Informatca Rep. [10] L. Kamstra and H.J.A.M. Hejmans, (December 2005) Reversble data embeddng nto mages usng wavelet technques and sortng, IEEE Transactons on Image Processng, vol.14, no.12, pp [11] D.M. Thod, J.J. Rodrguez, (2007) Expanson embeddng technques for reversble watermarkng, IEEE Transactons on Image Processng, vol.16, no.3, pp [12] J. Frdrch, M. Goljan, and R. Du, (January 2001) Invertble authentcaton, Proceedngs of the SPIE, Securty and Watermarkng of Multmeda Contents, vol.4314, San Jose, CA, pp [13] M.U. Celk, G. Sharma, and A.M. Tekalp, (2002) Reversble data hdng, Proceedngs IEEE Internatonal Conference on Image Processng, Rochester, NY, pp [14] M.U. Celk, G. Sharma, A.M. Tekalp, and E. Saber, (February 2005) Lossless generalzed-lsb data embeddng, IEEE Transactons on Image Proceedngs, vol.14, no.2, pp [15] Z. N, Y.Q. Sh, N. Ansar, and W. Su, (March 2006) Reversble data hdng, IEEE Transactons on Crcuts and Systems for Vdeo Technology, vol.16, no.3, pp

16 [16] J. Hwang, J.W. Km, and J.U. Cho, (2006) A reversble watermarkng based on hstogram shftng, Internatonal Workshop on Dgtal Watermarkng, Lecture Notes n Computer Scence, Sprnger-Verlag, Jeju Island, Korea,, vol.4283, pp [17] W.-C. Kuo, D.-J. Jang, and Y.-C. Huang, (2007) Reversble data hdng based on hstogram, Internatonal Conference on Intellgent Computng, Lecture Notes n Artfcal Intellgence, Sprnger-Verlag, Qng Dao, Chna, vol.4682, pp [18] K.-S. Km, M.-J. Lee, H.-Y. Lee, and H.-K. Lee, (2009) Reversble data hdng explotng spatal correlaton between sub-sampled mages, Pattern Recognton, vol.42, pp Authors Xu-Ren Luo receved the B.S. degree n Computer Scence and the M.S. degree n Electrcal and Electronc Engneerng, both from Chung Cheng Insttute of Technology (CCIT), Natonal Defense Unversty, Tawan, R.O.C., n 1997 and 2004, respectvely. He s currently pursung the Ph.D. degree n the area of nformaton assurance at the Electrcal and Electronc Engneerng Department, CCIT. Hs research nterests are focused on nformaton securty, data hdng, multmeda securty, and mage processng. Chen-Hu Jerry Ln receved the M.S. degree from the Department of Electrcal Engneerng, Unversty of Mssour at Rolla n He then began hs career of teachng computer programmng at several colleges and unverstes of technology. He receved the Ph.D. degree n electrcal engneerng from Natonal Tawan Unversty n He has joned the faculty of Natonal Defense Unversty as an assocate professor snce Hs research nterests nclude sgnal processng and computer programmng. Te-Lung Yn receved the B.S., M.S. and Ph.D. degree from the Chung Cheng Insttute of Technology, Natonal Defense Unversty, Tawan, R.O.C., n 1989, 1995 and 2001, respectvely, n electrcal engneerng. He now s an assocate professor of the Department of Computer Scence and Informaton Engneerng at the Chna Unversty of Technology, Tawan, R. O. C.. Dr. Yn s a member of the IEICE socety and hs research nterests nclude data hdng, cryptography and mage processng. 16

Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification

Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp.495-507, 2018 Improved Lossless Data Hdng for JPEG Images Based on Hstogram Modfcaton Yang Du 1, Zhaoxa Yn 1, 2, * and Xnpeng Zhang 3 Abstract: Ths

More information

Hiding data in images by simple LSB substitution

Hiding data in images by simple LSB substitution Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT Changqng Zhu 1 Zhwe Wang 2 Y Long 1 Chengsong Yang 2 1 Key Laboratory of Vrtual Geographc Envronment, Nanjng Normal Unversty, Nanjng 210054;2 Insttute

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

A Self-embedding Robust Digital Watermarking Algorithm with Blind Detection

A Self-embedding Robust Digital Watermarking Algorithm with Blind Detection Sensors & Transducers Vol 77 Issue 8 August 04 pp 50-55 Sensors & Transducers 04 by IFSA Publshng S L http://wwwsensorsportalcom A Self-embeddng Robust Dgtal Watermarkng Algorthm wth Blnd Detecton Gong

More information

A NEW DISCRETE WAVELET TRANSFORM

A NEW DISCRETE WAVELET TRANSFORM A NEW DISCRETE WAVELET TRANSFORM ALEXANDRU ISAR, DORINA ISAR Keywords: Dscrete wavelet, Best energy concentraton, Low SNR sgnals The Dscrete Wavelet Transform (DWT) has two parameters: the mother of wavelets

More information

A Novel Quality Measure for Information Hiding in Images

A Novel Quality Measure for Information Hiding in Images A Novel Qualty Measure for Informaton Hdng n s KA Navas Aravnd M SasKumar M Asstant rofessor G student rofessor College Of Engneerng College of Engneerng Maran Engneerng College Trvandrum,Inda Trvandrum,Inda

More information

Optimum Reversible Information Hiding Based on Adaptive Joint Processing

Optimum Reversible Information Hiding Based on Adaptive Joint Processing Internatonal Forum on Energy, Envronment and Sustanable Development (IFEESD 2016 Optmum Reversble Informaton Hdng Based on Adaptve Jont Processng Zhe Mao1,a, Ynfa Zhang1, Ln Zhou1, and Tnglong Du2 1 Department

More information

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000 Novel Pre-Compresson Rate-Dstorton Optmzaton Algorthm for JPEG 2000 Yu-We Chang, Hung-Ch Fang, Chung-Jr Lan, and Lang-Gee Chen DSP/IC Desgn Laboratory, Graduate Insttute of Electroncs Engneerng Natonal

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant Tutoral 2 COMP434 ometrcs uthentcaton Jun Xu, Teachng sstant csjunxu@comp.polyu.edu.hk February 9, 207 Table of Contents Problems Problem : nswer the questons Problem 2: Power law functon Problem 3: Convoluton

More information

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling Proceedngs of the World Congress on Engneerng and Computer Scence 007 WCECS 007, October 4-6, 007, San Francsco, USA A Fast Fractal Image Compresson Algorthm Usng Predefned Values for Contrast Scalng H.

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Microwave Diversity Imaging Compression Using Bioinspired

Microwave Diversity Imaging Compression Using Bioinspired Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,

More information

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

Regularized Discriminant Analysis for Face Recognition

Regularized Discriminant Analysis for Face Recognition 1 Regularzed Dscrmnant Analyss for Face Recognton Itz Pma, Mayer Aladem Department of Electrcal and Computer Engneerng, Ben-Guron Unversty of the Negev P.O.Box 653, Beer-Sheva, 845, Israel. Abstract Ths

More information

829. An adaptive method for inertia force identification in cantilever under moving mass

829. An adaptive method for inertia force identification in cantilever under moving mass 89. An adaptve method for nerta force dentfcaton n cantlever under movng mass Qang Chen 1, Mnzhuo Wang, Hao Yan 3, Haonan Ye 4, Guola Yang 5 1,, 3, 4 Department of Control and System Engneerng, Nanng Unversty,

More information

A Fast Computer Aided Design Method for Filters

A Fast Computer Aided Design Method for Filters 2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method

More information

Orientation Model of Elite Education and Mass Education

Orientation Model of Elite Education and Mass Education Proceedngs of the 8th Internatonal Conference on Innovaton & Management 723 Orentaton Model of Elte Educaton and Mass Educaton Ye Peng Huanggang Normal Unversty, Huanggang, P.R.Chna, 438 (E-mal: yepeng@hgnc.edu.cn)

More information

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

DAta hiding embeds messages into digital multimedia

DAta hiding embeds messages into digital multimedia 1 Reversble Data Hdng n Color Image wth Grayscale Invarance Dongdong Hou, Wemng Zhang, Kejang Chen, San-Jheng Ln and Nengha Yu Abstract Dfferent from all the prevous reversble data hdng schemes, a completely

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

A Novel Fuzzy logic Based Impulse Noise Filtering Technique

A Novel Fuzzy logic Based Impulse Noise Filtering Technique Internatonal Journal of Advanced Scence and Technology A Novel Fuzzy logc Based Impulse Nose Flterng Technque Aborsade, D.O Department of Electroncs Engneerng, Ladoke Akntola Unversty of Tech., Ogbomoso.

More information

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic Internatonal Journal of Computer Applcatons Technology and Research A New Desgn of Multpler usng Modfed Booth Algorthm and Reversble Gate Logc K.Nagarjun Department of ECE Vardhaman College of Engneerng,

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION. Erdem Bala, Dept. of Electrical and Computer Engineering,

COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION. Erdem Bala, Dept. of Electrical and Computer Engineering, COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION Erdem Bala, Dept. of Electrcal and Computer Engneerng, Unversty of Delaware, 40 Evans Hall, Newar, DE, 976 A. Ens Cetn,

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Reversible Data Hiding under Inconsistent Distortion Metrics

Reversible Data Hiding under Inconsistent Distortion Metrics Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted Content may change pror to fnal publcaton Ctaton nformaton: DOI 009/TIP208285074, IEEE Reversble

More information

Improvement of Histogram Equalization for Minimum Mean Brightness Error

Improvement of Histogram Equalization for Minimum Mean Brightness Error Proceedngs of the 7 WSEAS Int. Conference on Crcuts, Systems, Sgnal and elecommuncatons, Gold Coast, Australa, January 7-9, 7 3 Improvement of Hstogram Equalzaton for Mnmum Mean Brghtness Error AAPOG PHAHUA*,

More information

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Sgnal & Image Processng : An Internatonal Journal (SIPIJ) Vol.5, No.4, August 2014 IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Suman Shrestha 1, 2 1 Unversty of Massachusetts Medcal School,

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Multigradient for Neural Networks for Equalizers 1

Multigradient for Neural Networks for Equalizers 1 Multgradent for Neural Netorks for Equalzers 1 Chulhee ee, Jnook Go and Heeyoung Km Department of Electrcal and Electronc Engneerng Yonse Unversty 134 Shnchon-Dong, Seodaemun-Ku, Seoul 1-749, Korea ABSTRACT

More information

The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model

The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model Journal of Computer and Communcatons, 04,, -6 Publshed Onlne July 04 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.436/cc.04.906 The Dgtal Fngerprntng Method for Statc Images Based on Weghted

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Operating conditions of a mine fan under conditions of variable resistance

Operating conditions of a mine fan under conditions of variable resistance Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety

More information

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation Fourth Internatonal Conference on Image and Graphcs Rotaton Invarant Shape Contexts based on Feature-space Fourer Transformaton Su Yang 1, Yuanyuan Wang Dept of Computer Scence and Engneerng, Fudan Unversty,

More information

Quantitative Discrimination of Effective Porosity Using Digital Image Analysis - Implications for Porosity-Permeability Transforms

Quantitative Discrimination of Effective Porosity Using Digital Image Analysis - Implications for Porosity-Permeability Transforms 2004, 66th EAGE Conference, Pars Quanttatve Dscrmnaton of Effectve Porosty Usng Dgtal Image Analyss - Implcatons for Porosty-Permeablty Transforms Gregor P. Eberl 1, Gregor T. Baechle 1, Ralf Weger 1,

More information

On the Repeating Group Finding Problem

On the Repeating Group Finding Problem The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Research Article Green s Theorem for Sign Data

Research Article Green s Theorem for Sign Data Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of

More information

Using Immune Genetic Algorithm to Optimize BP Neural Network and Its Application Peng-fei LIU1,Qun-tai SHEN1 and Jun ZHI2,*

Using Immune Genetic Algorithm to Optimize BP Neural Network and Its Application Peng-fei LIU1,Qun-tai SHEN1 and Jun ZHI2,* Advances n Computer Scence Research (ACRS), volume 54 Internatonal Conference on Computer Networks and Communcaton Technology (CNCT206) Usng Immune Genetc Algorthm to Optmze BP Neural Network and Its Applcaton

More information

arxiv:cs.cv/ Jun 2000

arxiv:cs.cv/ Jun 2000 Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for P Charts. Dr. Wayne A. Taylor

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for P Charts. Dr. Wayne A. Taylor Taylor Enterprses, Inc. Control Lmts for P Charts Copyrght 2017 by Taylor Enterprses, Inc., All Rghts Reserved. Control Lmts for P Charts Dr. Wayne A. Taylor Abstract: P charts are used for count data

More information

Chapter 3 Describing Data Using Numerical Measures

Chapter 3 Describing Data Using Numerical Measures Chapter 3 Student Lecture Notes 3-1 Chapter 3 Descrbng Data Usng Numercal Measures Fall 2006 Fundamentals of Busness Statstcs 1 Chapter Goals To establsh the usefulness of summary measures of data. The

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

Fast Copy-Move Forgery Detection

Fast Copy-Move Forgery Detection Fast Copy-Move Forgery Detecton HWEI-JEN LIN 1, CHUN-WEI WANG 1 and YANG-TA KAO 2 1 Department of Informaton Engneerng and Computer Scence Tamkang Unversty 2 Department of Network Informaton Technology

More information

GEMINI GEneric Multimedia INdexIng

GEMINI GEneric Multimedia INdexIng GEMINI GEnerc Multmeda INdexIng Last lecture, LSH http://www.mt.edu/~andon/lsh/ Is there another possble soluton? Do we need to perform ANN? 1 GEnerc Multmeda INdexIng dstance measure Sub-pattern Match

More information

AP Physics 1 & 2 Summer Assignment

AP Physics 1 & 2 Summer Assignment AP Physcs 1 & 2 Summer Assgnment AP Physcs 1 requres an exceptonal profcency n algebra, trgonometry, and geometry. It was desgned by a select group of college professors and hgh school scence teachers

More information

A Network Intrusion Detection Method Based on Improved K-means Algorithm

A Network Intrusion Detection Method Based on Improved K-means Algorithm Advanced Scence and Technology Letters, pp.429-433 http://dx.do.org/10.14257/astl.2014.53.89 A Network Intruson Detecton Method Based on Improved K-means Algorthm Meng Gao 1,1, Nhong Wang 1, 1 Informaton

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Low Complexity Soft-Input Soft-Output Hamming Decoder

Low Complexity Soft-Input Soft-Output Hamming Decoder Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg

More information

Impulse Noise Removal Technique Based on Fuzzy Logic

Impulse Noise Removal Technique Based on Fuzzy Logic Impulse Nose Removal Technque Based on Fuzzy Logc 1 Mthlesh Atulkar, 2 A.S. Zadgaonkar and 3 Sanjay Kumar C V Raman Unversty, Kota, Blaspur, Inda 1 m.atulkar@gmal.com, 2 arunzad28@hotmal.com, 3 sanrapur@redffmal.com

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Constructing Control Process for Wafer Defects Using Data Mining Technique

Constructing Control Process for Wafer Defects Using Data Mining Technique The Fourth nternatonal Conference on Electronc Busness (CEB004) / Bejng 5 Constructng Control ocess for Wafer Defects Usng Data Mnng Technque Leeng Tong Hsngyn Lee Chfeng Huang Changke Ln Chenhu Yang Department

More information

High-Speed Decoding of the Binary Golay Code

High-Speed Decoding of the Binary Golay Code Hgh-Speed Decodng of the Bnary Golay Code H. P. Lee *1, C. H. Chang 1, S. I. Chu 2 1 Department of Computer Scence and Informaton Engneerng, Fortune Insttute of Technology, Kaohsung 83160, Tawan *hpl@fotech.edu.tw

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Wavelet chaotic neural networks and their application to continuous function optimization

Wavelet chaotic neural networks and their application to continuous function optimization Vol., No.3, 04-09 (009) do:0.436/ns.009.307 Natural Scence Wavelet chaotc neural networks and ther applcaton to contnuous functon optmzaton Ja-Ha Zhang, Yao-Qun Xu College of Electrcal and Automatc Engneerng,

More information

Change Detection: Current State of the Art and Future Directions

Change Detection: Current State of the Art and Future Directions Change Detecton: Current State of the Art and Future Drectons Dapeng Olver Wu Electrcal & Computer Engneerng Unversty of Florda http://www.wu.ece.ufl.edu/ Outlne Motvaton & problem statement Change detecton

More information

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1 A New Metrc for Qualty Assessment of Dgtal Images Based on Weghted-Mean Square Error Proceedngs of SPIE, vol. 4875, 2002 Kawen Zhang, Shuozhong Wang, and Xnpen Zhang School of Communcaton and Informaton

More information

A New Evolutionary Computation Based Approach for Learning Bayesian Network

A New Evolutionary Computation Based Approach for Learning Bayesian Network Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang

More information

Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression

Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression Journal of Informaton Securty, 2011, 2, 99-112 do:10.4236/js.2011.23010 Publshed Onlne July 2011 (http://www.scrp.org/journal/js) Audo Watermarkng Usng Wavelet Transform and Genetc Algorthm for Realzng

More information

Grey prediction model in world women s pentathlon performance prediction applied research

Grey prediction model in world women s pentathlon performance prediction applied research Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 4, 6(6):36-4 Research Artcle ISSN : 975-7384 CODEN(USA) : JCPRC5 Grey predcton model n world women s pentathlon performance predcton

More information

General theory of fuzzy connectedness segmentations: reconciliation of two tracks of FC theory

General theory of fuzzy connectedness segmentations: reconciliation of two tracks of FC theory General theory of fuzzy connectedness segmentatons: reconclaton of two tracks of FC theory Krzysztof Chrs Ceselsk Department of Mathematcs, West Vrgna Unversty and MIPG, Department of Radology, Unversty

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

Lossy Compression. Compromise accuracy of reconstruction for increased compression. Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost

More information

Boostrapaggregating (Bagging)

Boostrapaggregating (Bagging) Boostrapaggregatng (Baggng) An ensemble meta-algorthm desgned to mprove the stablty and accuracy of machne learnng algorthms Can be used n both regresson and classfcaton Reduces varance and helps to avod

More information

BACKGROUND SUBTRACTION WITH EIGEN BACKGROUND METHODS USING MATLAB

BACKGROUND SUBTRACTION WITH EIGEN BACKGROUND METHODS USING MATLAB BACKGROUND SUBTRACTION WITH EIGEN BACKGROUND METHODS USING MATLAB 1 Ilmyat Sar 2 Nola Marna 1 Pusat Stud Komputas Matematka, Unverstas Gunadarma e-mal: lmyat@staff.gunadarma.ac.d 2 Pusat Stud Komputas

More information

NON LINEAR ANALYSIS OF STRUCTURES ACCORDING TO NEW EUROPEAN DESIGN CODE

NON LINEAR ANALYSIS OF STRUCTURES ACCORDING TO NEW EUROPEAN DESIGN CODE October 1-17, 008, Bejng, Chna NON LINEAR ANALYSIS OF SRUCURES ACCORDING O NEW EUROPEAN DESIGN CODE D. Mestrovc 1, D. Czmar and M. Pende 3 1 Professor, Dept. of Structural Engneerng, Faculty of Cvl Engneerng,

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

Clock-Gating and Its Application to Low Power Design of Sequential Circuits

Clock-Gating and Its Application to Low Power Design of Sequential Circuits Clock-Gatng and Its Applcaton to Low Power Desgn of Sequental Crcuts ng WU Department of Electrcal Engneerng-Systems, Unversty of Southern Calforna Los Angeles, CA 989, USA, Phone: (23)74-448 Massoud PEDRAM

More information

An Interactive Optimisation Tool for Allocation Problems

An Interactive Optimisation Tool for Allocation Problems An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents

More information

White Noise Reduction of Audio Signal using Wavelets Transform with Modified Universal Threshold

White Noise Reduction of Audio Signal using Wavelets Transform with Modified Universal Threshold Whte Nose Reducton of Audo Sgnal usng Wavelets Transform wth Modfed Unversal Threshold MATKO SARIC, LUKI BILICIC, HRVOJE DUJMIC Unversty of Splt R.Boskovca b.b, HR 1000 Splt CROATIA Abstract: - Ths paper

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN

MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN S. Chtwong, S. Wtthayapradt, S. Intajag, and F. Cheevasuvt Faculty of Engneerng, Kng Mongkut s Insttute of Technology

More information

Comparative Analysis between Different Linear Filtering Algorithms of Gamma Ray Spectroscopy

Comparative Analysis between Different Linear Filtering Algorithms of Gamma Ray Spectroscopy Comparatve Analyss between Dfferent Lnear Flterng Algorthms of Gamma Ray Spectroscopy Mohamed S. El_Tokhy, Imbaby I. Mahmoud, and Hussen A. Konber Abstract Ths paper presents a method to evaluate and mprove

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

CHAPTER-5 INFORMATION MEASURE OF FUZZY MATRIX AND FUZZY BINARY RELATION

CHAPTER-5 INFORMATION MEASURE OF FUZZY MATRIX AND FUZZY BINARY RELATION CAPTER- INFORMATION MEASURE OF FUZZY MATRI AN FUZZY BINARY RELATION Introducton The basc concept of the fuzz matr theor s ver smple and can be appled to socal and natural stuatons A branch of fuzz matr

More information

Chapter 8 SCALAR QUANTIZATION

Chapter 8 SCALAR QUANTIZATION Outlne Chapter 8 SCALAR QUANTIZATION Yeuan-Kuen Lee [ CU, CSIE ] 8.1 Overvew 8. Introducton 8.4 Unform Quantzer 8.5 Adaptve Quantzaton 8.6 Nonunform Quantzaton 8.7 Entropy-Coded Quantzaton Ch 8 Scalar

More information

Multi-Scale Weighted Nuclear Norm Image Restoration: Supplementary Material

Multi-Scale Weighted Nuclear Norm Image Restoration: Supplementary Material Mult-Scale Weghted Nuclear Norm Image Restoraton: Supplementary Materal 1. We provde a detaled dervaton of the z-update step (Equatons (9)-(11)).. We report the deblurrng results for the ndvdual mages

More information

Polynomial Regression Models

Polynomial Regression Models LINEAR REGRESSION ANALYSIS MODULE XII Lecture - 6 Polynomal Regresson Models Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur Test of sgnfcance To test the sgnfcance

More information

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem Appled Mathematcal Scences Vol 5 0 no 65 3 33 Interactve B-Level Mult-Objectve Integer Non-lnear Programmng Problem O E Emam Department of Informaton Systems aculty of Computer Scence and nformaton Helwan

More information

The internal structure of natural numbers and one method for the definition of large prime numbers

The internal structure of natural numbers and one method for the definition of large prime numbers The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information