The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model
|
|
- Theodore Gibbs
- 5 years ago
- Views:
Transcription
1 Journal of Computer and Communcatons, 04,, -6 Publshed Onlne July 04 n ScRes. The Dgtal Fngerprntng Method for Statc Images Based on Weghted Hammng Metrc and on Weghted Contaner Model Sergey Bezzateev, Natala Voloshna Informaton Securty Technologes Department, Sant-Petersburg State Unversty of Aerospace Instrumentaton, Sant-Petersburg, Russa Emal: bsv@aanet.ru, natal@vu.spb.ru Receved May 04 Abstract The algorthm of fngerprnt constructng for stll mages based on weghted mage structure model s proposed. The error correctng codes that are perfect n weghted Hammng metrc are used as a base for fngerprnt constructng. Keywords Fngerprntng, Error Correctng Codes, Perfect Codes n Weghted Hammng Metrc, Weghted Contaner Model, Dgtal Rghts Management. Introducton The author rghts protecton s one of the most mportant problems for the multmeda data dstrbuton. Two knds of methods are used to solve ths problem such as dgtal watermarkng (DWM and dgtal fngerprntng (DFP [] []. In the DWM methods the addtonal nformaton about author (watermark s embedded nto ntal data (for example mage to protect t. Ths nformaton should be resstant aganst wde class of attack (flterng, compresson, etc. on the watermarked mage as long as the level of vsual qualty s hgher than predefned level. The second type of protecton means that the addtonal nformaton (fngerprnt should be formed based on the ntal nformaton (mage based on ts specfc salent features. For example n [3] the edges and corners obtaned from an mage were used as salent features. The fngerprnt s used then to fnd copes of orgnal mage ncludng llegal ones. Fngerprntng method should provde stable fngerprnt formng process for dfferent knd of mage processng (flterng, compresson, etc.. Man dfferences between these copy rght protecton methods are: Some part of the ntal obect s changed whle watermark embeddng process (for example LSB method. Fngerprntng does not mply any changes of ntal nformaton. Dgtal watermark s constructed by the user (author. It can be represented n dfferent forms (ID nformaton, pcture, text, etc. to prove author rghts. Dgtal fngerprnt does not contan any author nformaton. It forms based on ntal nformaton. How to cte ths paper: Bezzateev, S. and Voloshna, N. (04 The Dgtal Fngerprntng Method for Statc Images Based on Weghted Hammng Metrc and on Weghted Contaner Model. Journal of Computer and Communcatons,, -6.
2 S. Bezzateev, N. Voloshna The combnaton of these two types of author rghts protecton methods s proposed n ths paper. The dea s to add small dstortons to the ntal mage to get stable fngerprnt. In ths paper the term salent feature refers to a specal vector b n weghted Hammng metrc obtaned from the mage and to nearest (L, G code perfect n the weghted Hammng metrc [4]. The nearest means a code that have codeword a on the mnmal dstance n weghted Hammng metrc from the vector b.. Proposed Method Descrpton The author rghts protecton systems are developed n a way they gve stable nformaton about the person that has author rghts on t. Ths nformaton should be stable for wde class of dstortons that could happen. At the same tme author rghts protecton method should not change the ntal nformaton more than t defned for exact markng obect. For example t should keep vsual qualty of the mage. Fngerprntng methods do not change ntal obects. They only use salent features of these obects to construct fngerprnt. The problem s that not always such features could be found or they could be not resstant to attacks. At the same tme t s not necessary to avod any dstortons of ntal nformaton (for example for dgtal mages. In ths case t s possble to use watermarkng approach that changes some part of ntal nformaton to embed addtonal author nformaton. But t s not always possble to embed watermark wth acceptable dstorton level due to nconsstency of watermark and protected obect structure. The method of dgtal fngerprnt constructon based on the property of codeword presence n mage (F5 concept [5] s proposed. If the codeword can t be found then codeword should be added by the watermarkng approach. For example for the stll mages the essence of the method can be explaned as followng. The ntal mage or ts part s transformed nto bt stream. Ths bt stream s dvded nto blocks a wth length n. These blocks a are looked at as a code words of code G wth error vector e. If a s a codeword of G then e = 0 and syndrome s = 0. It means that ths block has requred for fngerprntng property. If s 0 then ths block does not have requred property. It s necessary to decode ths codeword.e. to correct ts errors to get ths property. As a result the dstortons wll be added to the ntal nformaton. The problem of gettng s = 0 for any block of bt stream could be solved by perfect codes usage [4]. It s possble to use several codes wth equal parameters that are defned for weghted Hammng metrc. For ths approach the code sequence G that s formed as a result of the blocks a decodng and for whch the blocks are the closest to ther code words can be looked at as a fngerprnt. The structure of the blocks a should be weghted because the error corrected codes that are concerted wth the weghted Hammng metrc are used to construct fngerprnt. These weghted blocks could be looked at as a weghted contaner that s formed for weghted watermarkng [6] [7]. It s necessary to dved ntal mage nto several zones to construct weghted blocks a. The dvson s performed based on the nfluence of the errors that happened durng the decodng process on the resultng dstortons (vsual qualty of resultng mage. Blocks a are formed as a combnaton of the parts of these dfferent sgnfcance zones. The basc scheme of the proposed fngerprntng method s shown n the Fgure. 3. Error Correctng Codes Consstent wth Weghted Hammng Metrc Error correctng codes n weghted Hammng metrc are defned as followng [4]: l Length n of a code word s n, n,, nl, n= n. = l l n n nl = have the weght ω. Let us consder these weghts as growng sequence.e. ω < ω < ω < < ωl. The weght of the code word a n weghted Hammng metrc s defned as followng: Any poston of the code word a ( a a a a a a a wt ( a = ω. It s obvous that Hammng dstance between two vectors n weghted Hammng metrc can be defned as l l l l a a a a a a a a b= b b b b b b b : a 0 = ( n n n and ( n n n l l
3 S. Bezzateev, N. Voloshna Fgure. The basc scheme of the fngerprntng method for three zone contaner.. For bnary codes n weghted Hammng metrc t s possble to wrte the Hammng dstance for code wth parameters the same way as for codes n ordnary Hammng metrc where -number of a code words n the code (for bnary lnear code -number of vectors of length n a sphere of radus n weghted Hammng metrc. where. Therefore we can defne a perfect code,.e. the code wth parameters les on ths bound. For lnear bnary code we obtan the followng equaton:. Codes that are perfect n a weghted Hammng metrc can be constructed by usng well-known methods for optmal codes constructon (for example Glbert-Varshamov bound. But such constructon method has hgh calculaton complexty and doesn t gve any desgn decodng method for such codes. By usng specal classes of Goppa codes n weghted Hammng metrc t s possble to solve both these problems. Specal Class of Goppa Codes n Weghted Hammng Metrc To construct Goppa codes consstent wth a weghted Hammng metrc the constructon of generalzaton (L,G codes wth poston numerators of dfferent degrees [4] s used. Therefore we use locator set where s formal dervatve of denomnator, and 3
4 S. Bezzateev, N. Voloshna s an rreducble polynomal on F [ ] m x. Goppa polynomal for such code s rreducble polynomal G x, G x F x, deg G x = τ ω, ( ( m [ ] ( l ( G( x u ( x = = nl gcd,, :, Number of dfferent Goppa codes wth the same parameters ( nkd,, from ths class s determned by the number of dfferent rreducble polynomals wth degree τ on F [ ] m x. 4. Fngerprnt Calculaton Algorthm Based on Famly of Goppa Codes Γ(n,k,d Perfect n Weghted Hammng Metrc We descrbe here the smplest verson of the fngerprnt calculatons algorthm for statc mage that contans dfferent sgnfcance zones that s based on the famly of Goppa codes perfect n the weghted Hammng metrc. Wthout loss of generalty we consder here a statc mage that contans three zones. Thrd zone does not assume any dstortons,.e. ω 3 =. Second zone has relatve weght ω of dstortons equal to. Frst zone allows to make the maxmum number of dstortons wthout maor consequences for the qualty of the resultng mage and therefore has mnmal relatve weght ω =. For such mage let us chose a famly of Goppa codes perfect n weghted Hammng metrc Γ ( nkd,, wth a followng parameters: m m m n= n+ n = +, n =, m m n =, k= + = m m md, 5. As mentoned n the prevous secton the number of dfferent codes n ths famly s determned by the numm ber of rreducble polynomals of second degree wth coeffcents from GF ( : I GF m m =. ( m ( = that s obtaned from mage that was prelmnarly spltted nto dfferent sgnfcance zones can be represented n the weghted Hammng metrc as followng: Obvously as we consder perfect codes any vector a ( a a an a an where ( a a an a an = ( c c cn c cn ( e e en e en, ( c c cn c ( cn Γ L G wt ( e e en e e n t,, = Thus usng for vector a varous Γ ( L, G codes of the famly Γ ( nkd,, n decodng procedure we wll get error vectors wth dfferent weghts t, 0 t. Fngerprnt wll consder as a set of numbers λ, λ,, λr of a codes from the famly Γ ( nkd,, cor- respondng to the vectors obtaned from the mage splttng nto zones as follows: Vector a = ( a a an a an assgn the smallest number λ of such Γ ( L, G code for whch error vector e= ( e e en e en provdes the least weght by decodng procedure. That means ( ( λ = mn : wt e e e e e n n = mn wt e e e e e. n n l The algorthm of fngerprnt calculaton based on a famly of Γ ( L, G codes can be descrbed as: The mage s dvded nto zones of dfferent sgnfcance. In accordance wth found mage zones the blocks are formed and the approprate parameters of the codes 4
5 S. Bezzateev, N. Voloshna famly are selected. 3 Fngerprnt λ, λ,, λm s formed n followng way. Found error vectors e= ( e e en e en are corrected and correspondng blocks a = ( a a an a an of source mage are converted to code words of the Goppa codes from the famly Γ ( nkd,,. For example the frst block s transformed nto a codeword ( c c cn c cn Γ( L, G. λ λ The dstorton of the source mage wll be mnmal accordng to the pre- vously descrbed algorthm of obtanng the numbers λ. 5. The Fngerprnt Checkng and Its Resstance to Random and Delberate Dstortons In accordance wth the descrbed algorthm of fngerprnt λ, λ,, λr creaton n the processed mage P there are R blocks ( c c cn c cn Γ( Lλ Gλ,, =,, R. Each block should be the codeword of correspondng Goppa code from the famly Γ ( nkd,,. The presence of the fngerprnt λ, λ,, λr s verfed by the decodng the blocks a by the correspondng code. The fngerprnt s decded to be found f all syndromes for all blocks s = 0. The presence of mnor dstorton n the processed mage P may cause errors n these blocks. So n dstorted mage P* there are blocks ( b b bn b ( ( bn = c c cn c cn e e en e e n = ( c c cn c ( cn e e en e e n wt ( ˆ ˆ ˆ ˆ ˆ e e en e en = wt, ( c c cn c cn, ( cˆ ˆ ˆ ˆ ˆ c cn c cn Γ( L, G,,, R λ λ =. ˆ ˆ ˆ ˆ ˆ ˆ ˆ ˆ ˆ ˆ, Usng fngerprnt λ, λ,, λr and corrupted mage P* t s easy to fnd an approprate error vector ( eˆ eˆ ˆ ˆ ˆ en e en and the weght wt correspondng to ths vector. Obvously that n case of small corrup- tons ( c c c c c = ( cˆ cˆ cˆ cˆ cˆ and therefore ( e e e e e = ( eˆ eˆ eˆ eˆ eˆ. n n n n R Let s defne now the penalty functon weght coeffcents f { f, f } F = wt f = wt n n n n. In the smplest case t s possble to consder that the wt of the penalty functon have the same value and are equal to. However the more flexble way where f f s possble too. By takng nto account the nature of the corruptons and ther mpact on the percepton of the resultng mage.e. ts vsual qualty we can chose dfferent values of the weght coeffcents. Decson of the defnte fngerprnt avalablty n an exstng pcture P* s made by the value of the penalty functon F and threshold values B and B that are defne the events of the false alarm and skp goal respectvely. 6. Concluson A new method of fngerprnt constructon that uses the features of the orgnal mage structure (weghted contaner assocated wth the dfferent degree of ts senstvty to the corruptons n dfferent zones of the contaner s proposed. In order to use ths property of the contaner t s proposed to use the weghted Hammng metrc unlke used n prevously known schemes usual Hammng metrc. For effectve use of ths metrc t s proposed a famly of generalzed Goppa codes perfect n weghted Hammng metrc. Thanks to the usage of such famly of codes t s possble to make the mnmum number of dstortons when fngerprnt s constructed. Addtonally the use of error-correctng codes constructon allows to correct random corruptons that can occurred durng contaner (mage storng or transmttng. Stll open queston n optmal choce of the coeffcents n the penalty 5
6 S. Bezzateev, N. Voloshna functon provdes the mnmal probablty of false alarm and skp goals when decdng on the avalablty of the fngerprnt presence n the analyzed mage. References [] Durc, Z., Johnson, N.F. and Jaoda, S. (999 Recoverng Watermarks from Images. Techncal Report ISE-TR-99-04, Center for Secure Informaton Systems, George Mason Unversty. [] Johnson, N.F., Durc, Z. and Jaoda, S. (999 A Role for Dgtal Watermarkng n Electronc Commerce. Accepted for Publcaton ACM Computng Surveys. Publcaton TBA. [3] Johnson, N.F., Durc, Z. and Jaoda, S. (999 On Fngerprntng Images for Recognton. In: Multmeda Informaton Systems, 4-. [4] Bezzateev S. and Shekhunova N. (0 Bnary Generalzed (L, G Codes That Are Perfect n a Weghted Hammng Metrc. Problems of Informaton Transmsson, 48, [5] Westfeld, A. (00 Hgh Capacty Despte Better Steganalyss (F5-A Steganographc Algorthm. In: Moskowtz, I.S., Eds., Informaton Hdng. 4th Internatonal Workshop. Lecture Notes Computer Scence, Vol. 37, Sprnger-Verlag, Berln, Hedelberg, New York. [6] Bezzateev, S., Voloshna, N. and Zhdanov, K. (0 Specal Class of Error-Correctng Codes for Steganography Systems. Proceedngs TUSUR (Novosbrsk,, -8. [7] Neeta, D. (006 Implementaton of LSB Steganography and Its Evaluaton for Varous Bts. Dgtal Informaton Management, st Internatonal Conference. 6
Lecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationCalculation of time complexity (3%)
Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationKernel Methods and SVMs Extension
Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general
More informationVQ widely used in coding speech, image, and video
at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationGeneralized Linear Methods
Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set
More informationHiding data in images by simple LSB substitution
Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty
More informationA New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane
A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationAffine transformations and convexity
Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationPulse Coded Modulation
Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal
More informationThe Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp
More informationLinear Approximation with Regularization and Moving Least Squares
Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...
More informationModule 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationAppendix B: Resampling Algorithms
407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationChapter 13: Multiple Regression
Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to
More informationCONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION
CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala
More informationNonorthogonal RGB-space decomposition
onorthogonal R-space decomposton atala Vaganova nsttute of Computatonal Mathematcs and Mathematcal eophyscs ovosbrsk Russa vaganova@oapmgssccru Abstract hs paper deals wth some new deas of mage color models
More informationECE559VV Project Report
ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate
More informationPop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing
Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,
More informationConsider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder.
PASSBAND DIGITAL MODULATION TECHNIQUES Consder the followng passband dgtal communcaton system model. cos( ω + φ ) c t message source m sgnal encoder s modulator s () t communcaton xt () channel t r a n
More informationDC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms
Proceedngs of the 5th WSEAS Internatonal Conference on Telecommuncatons and Informatcs, Istanbul, Turkey, May 27-29, 26 (pp192-197 DC-Free Turbo Codng Scheme Usng MAP/SOVA Algorthms Prof. Dr. M. Amr Mokhtar
More informationMessage modification, neutral bits and boomerangs
Message modfcaton, neutral bts and boomerangs From whch round should we start countng n SHA? Antone Joux DGA and Unversty of Versalles St-Quentn-en-Yvelnes France Jont work wth Thomas Peyrn 1 Dfferental
More informationDepartment of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution
Department of Statstcs Unversty of Toronto STA35HS / HS Desgn and Analyss of Experments Term Test - Wnter - Soluton February, Last Name: Frst Name: Student Number: Instructons: Tme: hours. Ads: a non-programmable
More informationA Robust Method for Calculating the Correlation Coefficient
A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal
More informationThe internal structure of natural numbers and one method for the definition of large prime numbers
The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract
More informationSuppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl
RECURSIVE SPLINE INTERPOLATION METHOD FOR REAL TIME ENGINE CONTROL APPLICATIONS A. Stotsky Volvo Car Corporaton Engne Desgn and Development Dept. 97542, HA1N, SE- 405 31 Gothenburg Sweden. Emal: astotsky@volvocars.com
More informationA new Approach for Solving Linear Ordinary Differential Equations
, ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of
More informationx = , so that calculated
Stat 4, secton Sngle Factor ANOVA notes by Tm Plachowsk n chapter 8 we conducted hypothess tests n whch we compared a sngle sample s mean or proporton to some hypotheszed value Chapter 9 expanded ths to
More informationA combinatorial problem associated with nonograms
A combnatoral problem assocated wth nonograms Jessca Benton Ron Snow Nolan Wallach March 21, 2005 1 Introducton. Ths work was motvated by a queston posed by the second named author to the frst named author
More informationSimulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests
Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth
More informationA Bayes Algorithm for the Multitask Pattern Recognition Problem Direct Approach
A Bayes Algorthm for the Multtask Pattern Recognton Problem Drect Approach Edward Puchala Wroclaw Unversty of Technology, Char of Systems and Computer etworks, Wybrzeze Wyspanskego 7, 50-370 Wroclaw, Poland
More informationLecture 10: May 6, 2013
TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,
More informationFor now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.
Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson
More informationReport on Image warping
Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.
More informationDepartment of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification
Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled
More informationIntroduction to information theory and data compression
Introducton to nformaton theory and data compresson Adel Magra, Emma Gouné, Irène Woo March 8, 207 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on March 9th 207 for a Data Structures
More informationSystem in Weibull Distribution
Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co
More informationComparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method
Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method
More informationMaximizing the number of nonnegative subsets
Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum
More informationLecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.
Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from
More informationLecture 4: Universal Hash Functions/Streaming Cont d
CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected
More informationDecoding of the Triple-Error-Correcting Binary Quadratic Residue Codes
Automatc Control and Informaton Scences, 04, Vol., No., 7- Avalable onlne at http://pubs.scepub.com/acs/// Scence and Educaton Publshng DOI:0.69/acs--- Decodng of the rple-error-correctng Bnary Quadratc
More informationWeek3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity
Week3, Chapter 4 Moton n Two Dmensons Lecture Quz A partcle confned to moton along the x axs moves wth constant acceleraton from x =.0 m to x = 8.0 m durng a 1-s tme nterval. The velocty of the partcle
More informationOn the correction of the h-index for career length
1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationGeometry of Müntz Spaces
WDS'12 Proceedngs of Contrbuted Papers, Part I, 31 35, 212. ISBN 978-8-7378-224-5 MATFYZPRESS Geometry of Müntz Spaces P. Petráček Charles Unversty, Faculty of Mathematcs and Physcs, Prague, Czech Republc.
More informationMore metrics on cartesian products
More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of
More informationStanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011
Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected
More informationNodal analysis of finite square resistive grids and the teaching effectiveness of students projects
2 nd World Conference on Technology and Engneerng Educaton 2 WIETE Lublana Slovena 5-8 September 2 Nodal analyss of fnte square resstve grds and the teachng effectveness of students proects P. Zegarmstrz
More informationIntroduction to Information Theory, Data Compression,
Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures
More informationPsychology 282 Lecture #24 Outline Regression Diagnostics: Outliers
Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.
More informationStatistical analysis using matlab. HY 439 Presented by: George Fortetsanakis
Statstcal analyss usng matlab HY 439 Presented by: George Fortetsanaks Roadmap Probablty dstrbutons Statstcal estmaton Fttng data to probablty dstrbutons Contnuous dstrbutons Contnuous random varable X
More informationImage Encryption Using Chaotic Signal and Max Heap Tree
Image Encrypton Usng Chaotc Sgnal and Max Heap Tree Farborz Mahmoud 1, Rasul Enayatfar 2, and Mohsen Mrzashaer 1 1 Electrcal and Computer Engneerng Department, Islamc Azad Unversty, Qazvn Branch, Iran
More informationError Probability for M Signals
Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationPower law and dimension of the maximum value for belief distribution with the max Deng entropy
Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng
More informationAn Admission Control Algorithm in Cloud Computing Systems
An Admsson Control Algorthm n Cloud Computng Systems Authors: Frank Yeong-Sung Ln Department of Informaton Management Natonal Tawan Unversty Tape, Tawan, R.O.C. ysln@m.ntu.edu.tw Yngje Lan Management Scence
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)
Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of
More informationChapter 3 Describing Data Using Numerical Measures
Chapter 3 Student Lecture Notes 3-1 Chapter 3 Descrbng Data Usng Numercal Measures Fall 2006 Fundamentals of Busness Statstcs 1 Chapter Goals To establsh the usefulness of summary measures of data. The
More informationA NEW DISCRETE WAVELET TRANSFORM
A NEW DISCRETE WAVELET TRANSFORM ALEXANDRU ISAR, DORINA ISAR Keywords: Dscrete wavelet, Best energy concentraton, Low SNR sgnals The Dscrete Wavelet Transform (DWT) has two parameters: the mother of wavelets
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More information2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification
E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton
More informationLecture 12: Discrete Laplacian
Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly
More information10-701/ Machine Learning, Fall 2005 Homework 3
10-701/15-781 Machne Learnng, Fall 2005 Homework 3 Out: 10/20/05 Due: begnnng of the class 11/01/05 Instructons Contact questons-10701@autonlaborg for queston Problem 1 Regresson and Cross-valdaton [40
More informationLecture 10 Support Vector Machines II
Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed
More informationAdiabatic Sorption of Ammonia-Water System and Depicting in p-t-x Diagram
Adabatc Sorpton of Ammona-Water System and Depctng n p-t-x Dagram J. POSPISIL, Z. SKALA Faculty of Mechancal Engneerng Brno Unversty of Technology Techncka 2, Brno 61669 CZECH REPUBLIC Abstract: - Absorpton
More informationWinter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan
Wnter 2008 CS567 Stochastc Lnear/Integer Programmng Guest Lecturer: Xu, Huan Class 2: More Modelng Examples 1 Capacty Expanson Capacty expanson models optmal choces of the tmng and levels of nvestments
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationBasically, if you have a dummy dependent variable you will be estimating a probability.
ECON 497: Lecture Notes 13 Page 1 of 1 Metropoltan State Unversty ECON 497: Research and Forecastng Lecture Notes 13 Dummy Dependent Varable Technques Studenmund Chapter 13 Bascally, f you have a dummy
More informationParameter Estimation for Dynamic System using Unscented Kalman filter
Parameter Estmaton for Dynamc System usng Unscented Kalman flter Jhoon Seung 1,a, Amr Atya F. 2,b, Alexander G.Parlos 3,c, and Klto Chong 1,4,d* 1 Dvson of Electroncs Engneerng, Chonbuk Natonal Unversty,
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationReal-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling
Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for
More informationFormulas for the Determinant
page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use
More informationOn the Multicriteria Integer Network Flow Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of
More informationInductance Calculation for Conductors of Arbitrary Shape
CRYO/02/028 Aprl 5, 2002 Inductance Calculaton for Conductors of Arbtrary Shape L. Bottura Dstrbuton: Internal Summary In ths note we descrbe a method for the numercal calculaton of nductances among conductors
More informationConvexity preserving interpolation by splines of arbitrary degree
Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete
More informationResource Allocation and Decision Analysis (ECON 8010) Spring 2014 Foundations of Regression Analysis
Resource Allocaton and Decson Analss (ECON 800) Sprng 04 Foundatons of Regresson Analss Readng: Regresson Analss (ECON 800 Coursepak, Page 3) Defntons and Concepts: Regresson Analss statstcal technques
More informationCHAPTER IV RESEARCH FINDING AND DISCUSSIONS
CHAPTER IV RESEARCH FINDING AND DISCUSSIONS A. Descrpton of Research Fndng. The Implementaton of Learnng Havng ganed the whole needed data, the researcher then dd analyss whch refers to the statstcal data
More informationA Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition
(IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer
More information4DVAR, according to the name, is a four-dimensional variational method.
4D-Varatonal Data Assmlaton (4D-Var) 4DVAR, accordng to the name, s a four-dmensonal varatonal method. 4D-Var s actually a drect generalzaton of 3D-Var to handle observatons that are dstrbuted n tme. The
More informationCHALMERS, GÖTEBORGS UNIVERSITET. SOLUTIONS to RE-EXAM for ARTIFICIAL NEURAL NETWORKS. COURSE CODES: FFR 135, FIM 720 GU, PhD
CHALMERS, GÖTEBORGS UNIVERSITET SOLUTIONS to RE-EXAM for ARTIFICIAL NEURAL NETWORKS COURSE CODES: FFR 35, FIM 72 GU, PhD Tme: Place: Teachers: Allowed materal: Not allowed: January 2, 28, at 8 3 2 3 SB
More informationThis column is a continuation of our previous column
Comparson of Goodness of Ft Statstcs for Lnear Regresson, Part II The authors contnue ther dscusson of the correlaton coeffcent n developng a calbraton for quanttatve analyss. Jerome Workman Jr. and Howard
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationCS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016
CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng
More informationAnalytical Chemistry Calibration Curve Handout
I. Quck-and Drty Excel Tutoral Analytcal Chemstry Calbraton Curve Handout For those of you wth lttle experence wth Excel, I ve provded some key technques that should help you use the program both for problem
More informationDifferential Polynomials
JASS 07 - Polynomals: Ther Power and How to Use Them Dfferental Polynomals Stephan Rtscher March 18, 2007 Abstract Ths artcle gves an bref ntroducton nto dfferental polynomals, deals and manfolds and ther
More informationComparative Studies of Law of Conservation of Energy. and Law Clusters of Conservation of Generalized Energy
Comparatve Studes of Law of Conservaton of Energy and Law Clusters of Conservaton of Generalzed Energy No.3 of Comparatve Physcs Seres Papers Fu Yuhua (CNOOC Research Insttute, E-mal:fuyh1945@sna.com)
More informationMAE140 - Linear Circuits - Winter 16 Final, March 16, 2016
ME140 - Lnear rcuts - Wnter 16 Fnal, March 16, 2016 Instructons () The exam s open book. You may use your class notes and textbook. You may use a hand calculator wth no communcaton capabltes. () You have
More informationHigh-Speed Decoding of the Binary Golay Code
Hgh-Speed Decodng of the Bnary Golay Code H. P. Lee *1, C. H. Chang 1, S. I. Chu 2 1 Department of Computer Scence and Informaton Engneerng, Fortune Insttute of Technology, Kaohsung 83160, Tawan *hpl@fotech.edu.tw
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run
More informationImproved Lossless Data Hiding for JPEG Images Based on Histogram Modification
Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp.495-507, 2018 Improved Lossless Data Hdng for JPEG Images Based on Hstogram Modfcaton Yang Du 1, Zhaoxa Yn 1, 2, * and Xnpeng Zhang 3 Abstract: Ths
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationNatural Language Processing and Information Retrieval
Natural Language Processng and Informaton Retreval Support Vector Machnes Alessandro Moschtt Department of nformaton and communcaton technology Unversty of Trento Emal: moschtt@ds.untn.t Summary Support
More information