A SVD-BASED WATERMARKING SCHEME FOR PROTECTING RIGHTFUL OWNERSHIP *

Size: px
Start display at page:

Download "A SVD-BASED WATERMARKING SCHEME FOR PROTECTING RIGHTFUL OWNERSHIP *"

Transcription

1 SVD-BSED TERMRKIG SCEME OR PROTECTIG RIGTUL OERSIP * Ruzhen Lu and Tenu Tan atonal Lab of Pattern Recognton Insttute of utomaton, Chnese cademy of Scences P. O. Box 78, Bejng, 18, P. R. Chna Emal: {lurz, tnt}@nlpr.a.ac.cn BSTRCT Dgtal watermarkng has been proposed as a soluton to the problem of copyrght protecton of multmeda documents n networked envronments. There are two mportant ssues that watermarkng algorthms need to address. rstly, watermarkng schemes are requred to provde trustworthy evdence for protectng rghtful ownershp; Secondly, good watermarkng schemes should satsfy the requrement of robustness and resst dstortons due to common mage manpulatons (such as flterng, compresson, etc.). In ths paper, we propose a novel watermarkng algorthm based on sngular value decomposton (SVD). nalyss and expermental results show that the new watermarkng method performs well n both securty and robustness. 1. ITRODUCTIO The advent of the Internet and the wde avalablty of computers, scanners and prnters make dgtal data acquston, exchange and transmsson a smple task. owever, makng dgtal * Ths work s supported by the Chnese S (Grant o ) and the Chnese cademy of Scences. 1

2 data accessble to others through networks also creates opportuntes for malcous partes to make salable copes of copyrghted content wthout permsson of the content owner. Dgtal watermarkng technques have been proposed n recent years as methods to protect the copyrght of multmeda data [1,,3,4]. In general, an effectve watermarkng scheme should satsfy the followng basc requrements: 1. Imperceptblty: the perceptual dfference between the watermarked and the orgnal documents should be unnotceable to the human observer,.e., watermarks should not nterfere wth the meda beng protected.. Trustworthness [5,6,7,8]: a satsfactory watermarkng scheme should also guarantee that t s mpossble to generate counterfet watermarks, and should provde trustworthy evdence to protect the rghtful ownershp. 3. Robustness [9,1,11,1]: gven a watermarked document, an unauthorzed party should not be able to destroy the watermark wthout also makng the document useless,.e., watermarks should be robust to common sgnal processng and ntentonal attacks. In partcular, they should stll be detectable or extractable even after common sgnal processng operatons have been appled to the watermarked mage (such as dgtal-to-analog, analog-to-dgtal conversons, resamplng, flterng, compresson, geometrc transformaton, croppng, scalng, rotaton, etc.). Most exstng watermarkng schemes focus on robust means to make the watermark mperceptble rather than on addressng the mportant ssue of how to resolve the rghtful ownershp of an mage embedded wth multple sgnatures (or watermarks, labels, etc.) [5,8,13].

3 Craver et al [13] were among the frst to note that resolvng the rghtful ownershp of watermarked mages s a very mportant ssue. They smulated the cases of attackng exstng watermarkng technques by provdng counterfet watermarkng schemes that can be performed on a watermarked mage to allow multple clams of ownershp. Ther proposed attack s sometmes known as the IBM ambguty attack (or protocol level attack). n example s the nverson attack by Craver et al. that attempts to dscredt the authorty to the watermark by embeddng one or several addtonal watermarks such that t s unclear whch was the frst authortatve watermark embedded by the IPR owner. Currently only a few methods have been reported that try to solve the ownershp problem. The frst such method s probably the one presented by Craver et al. They desgn a non-nvertble scheme whch s a modfed verson of the watermarkng method proposed by Cox et al [9]. owever, the non-nvertblty of ther scheme s based on an nvald assumpton [8]. The second s based on tme-stampng as proposed by olfgang and Delp [14]. The owner wth the earlest tmestamp s the true owner of the watermarked documents. owever tme stampng has the dsadvantages of requrng ongong nvolvement of a thrd party and beng unsutable for tme senstve applcatons. In addton, tmestamps can be manpulated by anyone else besdes the true owners. Ths scheme can thus be easly defeated. The thrd method s proposed by Zeng et al [15]. Because ther watermarkng scheme detects the embedded watermark wthout usng the orgnal mage, t actually cannot resolve rghtful ownershp [8]. In ther algorthm, the watermarkng scheme protects the embedded watermark rather than the ownershp of dgtal mages. The key ssue les n that because watermark detecton n the ther algorthm does not need orgnal mages, an attacker can always 3

4 create hs counterfet orgnal mages and clam hs/her ownershp (see [8] further dscussons). Qao et al [8] proposed the fourth scheme to try to solve the ownershp problem. They combne ther scheme wth cryptography and use a standard encrypton algorthm (.e. DES) to generate the randomzed watermarks from the orgnal mage or vdeo chp. The embedded watermark s a functon of the encrypton key and the orgnal mage. n obvous drawback of ther scheme s that the algorthm cannot nsert semantcally meanngful watermarks and the capacty of watermarks s serously restrcted. In addton, t s a non-lnear watermarkng model, so t s dffcult to estmate the nserted watermark's energy and capacty and control the vsual qualty of the watermarked mages. In ths paper, we present a new dgtal mage watermarkng method based on sngular value decomposton. e wll show later that because SVD s n fact a one-way decomposton algorthm and s an optmal matrx decomposton n a least-square sense, the new method performs well both n resolvng rghtful ownershp and n resstng common attacks. The rest of ths paper s organzed as follows. Secton outlnes the problem of rghtful ownershp; Secton 3 descrbes the prncple of SVD and the proposed method; Secton 4 presents further analyss and dscusson on the method; Secton 5 dscusses expermental results. The paper s concluded n Secton 6.. PROBLEM O RIGTUL OERSIP One of the man purposes of a watermark s to protect the owner's copyrght. owever, for many exstng watermarkng schemes, an attacker can easly confuse one by manpulatng the watermarked mage (or vdeo, audo) and clam that he or she s the legtmate owner [13]. Some 4

5 watermarkng schemes requre the orgnal mage (or vdeo chp) to perform watermark verfcaton. owever even wth the presence of the orgnal mage, the rghtful ownershp problem stll exsts. The class of watermarkng schemes that can be attacked by creatng a "counterfet orgnal" s called nvertble. Craver et al [13] defne the concept of non-nvertblty to address the ssue of rghtful ownershp. Informally, non-nvertblty means that t s computatonally unfeasble for an attacker to fnd a faked mage and a watermark such that the par can result n the same watermarked mage created by the real owner. e wll revew the defnton of the class of nvertble watermarkng schemes n the followng. Suppose the orgnal mage s. The owner of uses the watermark (denoted as ) to make a watermarked mage. That s ( 1 ) or n functon representaton = E(, ) ( ) where functon E ( ) denotes the watermark embeddng algorthm. hen the attacker obtans the publshed and f wthout knowng, a counterfet watermark and a counterfet mage can be created to satsfy the followng equaton: = E, ) ( 3 ) ( then the attacker can use as hs "orgnal" to clam the ownershp of (suppose and are perceptually smlar). If Eq. (3) holds, the watermarkng scheme s called nvertble. Otherwse, t s called non-nvertble [7,8]. e regard Eq. () and (3) as the basc equatons to defne non-nvertble 5

6 watermarkng schemes (though there may be some alternatve defntons). Detaled descrptons can be found n [8,13]. 3. SVD-Based atermarkng Sngular value decomposton (SVD) s a numercal technque used to dagonalze matrces n numercal analyss. It s an algorthm developed for a varety of applcatons. The man propertes of SVD from the vewpont of mage processng applcatons are: (1) the sngular values (SVs) of an mage have very good stablty,.e., when a small perturbaton s added to an mage, ts SVs do not change sgnfcantly; () SVs represent ntrnsc algebrac mage propertes. In ths secton, we descrbe a watermark castng and detecton scheme based on the SVD.. SVD rom the vewpont of lnear algebra we can observe that a dscrete mage s an array of non-negatve scalar entres whch may be regarded as a matrx. Let such an mage be desgnated as. thout loss of generalty, we assume n the subsequent dscussons that s a square mage, denoted as, where represents ether the real number doman R or the complex number doman C. The SVD s defned as = USV ( 4 ) where U and V are untary matrces, and S s a dagonal matrx. e notce that the unque property of the SVD transform s that the potental degrees of freedom or samples n the orgnal mage now get mapped nto: S Degrees of freedom 6

7 U ( 1) / Degrees of freedom V ( 1) / Degrees of freedom totalng degrees of freedom. SVD has many good mathematcal characterstcs. or the sake of space, we wll not dscuss them n ths paper. urther detals on SVD may be found n [16,17]. B. atermark Castng and Detecton In watermark castng, the sngular value decomposton of an mage s computed to obtan two orthogonal matrces U and V and one dagonal matrx S. lthough we assume to be a square matrx (mage) for convenence, other non-square mages can be processed n exactly the same way. e mantan that ths s one of the advantages of the SVD method over some other popular watermarkng schemes whch cannot drectly handle non-square matrces [9,18,19]. e add a watermark (also represented as a matrx) nto matrx S and perform sngular value decomposton on the new matrx S + a to get U, S and V ( S + a = U S V ), where the postve constant a s the scale factor whch controls the strength of the watermark to be nserted. e then obtan the watermarked mage by multplyng matrces U, S, and T V. That s, f matrces and represent the orgnal mage and the watermark respectvely, we obtan the watermarked mage accordng to the followng three steps: => USV S + a => U S V ( 5 ) <= US V 7

8 In watermark detecton, gven matrces U, S, V and the possbly dstorted mage, one can extract a possbly corrupted watermark by essentally reversng the above steps. That s => U S V D <= U S V ( 6 ) 1 <= ( D S) a ote that the total number of degrees of freedom of matrces U, S and V s, whch s the same as that of a matrx. hle many exstng watermarkng algorthms requre the orgnal mage (whose degrees of freedom s also ) to extract the watermark, our method uses three matrces to extract the watermark and needs no addtonal nformaton. The smlarty between (the orgnal watermark) and (the extracted watermark) s measured by means of correlaton. or convenence we regard and as one-dmensonal vectors, and compute ther correlaton coeffcent c (, ) n the standard manner. or a -D watermark (such as the mage of a company logo), we can smply map the watermark nto a 1-D vector or compute the two-dmensonal correlaton coeffcent drectly. 4. LYSIS D DISCUSSIO. on-nvertble atermarkng Scheme If an attacker attempts to create a "counterfet orgnal" mage, Eq. () and (3) must be satsfed smultaneously by the watermarked mage and the created counterfet watermark. In the followng, we wll analyze the method presented n the precedng secton n order to show that t s a one-way and non-nvertble watermarkng algorthm. 8

9 Lemma 1: Suppose the SVD of mage R s performed as Eq. (4), then the mappng of matrx to S s many-to-one and non-lnear. Proof: Eq. (4) yelds 1 = [ ( )] ( 7 ) s ( ) λ where λ ( ) are the egenvalues of matrx, = 1,,...,. It s easy to prove that S = s, s,..., s } s unque for a gven. But the nverse s untrue. In fact there may exst many { 1 matrces whose sngular value matrces equal to S. or a gven S, we can llustrate ths by constructng another matrx ~ R as follows: ~ ~ ~ <= USV ( 8 ) If untary matrces ~ U U or/and ~ V V, then ~ s dfferent from. Eq. (7) also shows that s ( ) can be completely defned wth matrx egenvalues λ ( ). Because the computaton of λ ( ) n doman R s not n closed-form and the egenvalues cannot be obtaned n a fnte number of steps, we can conclude that the mappng of matrx to S s non-lnear. e are now n a poston to deduce one mportant result. Theorem 1: If watermarkng s carred out as Eq. (5), then we have the followng two equvalences: = E(, ) S + a = U S V = ( + = ( 9 ) E, ) S a U, SV, where S = dag( s, 1,..., s, ) and S = dag( s, 1,..., s, ) are the sngular value matrces of and respectvely, s the created counterfet watermark, a s the scale factor as 9

10 descrbed n Eq. (5), U, and V, are untary matrces. Proof: The proof s smple and the above two equvalences are smlar. So we only need to prove one of them. rom the defnton of SVD and the proposed watermarkng algorthm, we have: = E(, ) = US V US V = UU, ( S + a ) V, S = U, ( S + a ) V, U S V = S + a,, S + a = U, SV, V Smlarly, t s obvous that the followng equvalence holds: = E(, ) S + a = U S V Based on the defnton of non-nvertblty and the concluson obtaned above, we can deduce that f the new method s non-nvertble, t should not satsfy the followng two condtons smultaneously: S + a = U S V ( 1 ) T S a = U, SV, + ( 11 ) where matrces S, S, and S are all dagonal and represent the orgnal mage, the "counterfet orgnal" mage and the watermarked mage respectvely. = { w j } and = w {, j} are watermarks. ere for smplcty and wthout loss of generalty, we neglect the scale factor a. In the followng, we wll show that for 1

11 our proposed method, a sutable "counterfet orgnal" mage and watermark can not be created f certan constrants on the watermarks are mposed. Proposton 1: (a) Gven S, Eq. (1) s an ll-posed problem, that s, t s mpossble to fnd the orgnal S and ; (b) Gven S and S, t s mpossble to obtan ; (c) Gven S and, t s computatonally unfeasble to obtan S. Proof: (a) It holds obvously because there s no unque soluton for S and f only S s gven. (b) Eq. (1) can be expanded nto a set of equatons. If we compute { w j } = wth unknowns, under the constrants provded by S and S, there s an nsuffcent number of constrants. Therefore the soluton for the orgnal watermark cannot be found. (c) Gven S and, we have enough constrants and the soluton of S n Eq. (1) s unque. Because U = U(, S) and V = V (, S) are all functons of S, Eq. (1) s a hgh-dmensonal and hghly non-lnear equaton. So t s computatonally almost unfeasble to obtan the soluton. Proposton : or Eq. (11), we have smlar observatons: (a) Gven S and, t s computatonally dffcult to create S that satsfes Eq. (11); (b) Gven S, S and by mposng some constrants on (but wthout knowng ), t s dffcult to fnd the soluton of. Proof: 11

12 (a) rom the concluson of Proposton 1(c), gven S and, there s a unque soluton for S, but t s dffcult to fnd t. (b) or gven S and S, f there s no constrant on watermark be satsfed easly, just as done n the followng:, then Eq. (11) can = U, SV, S S = U, SV, + ( 1 ) Ths makes t possble for an attacker to create counterfet watermarks. owever, f we mpose some constrants on, the real cannot be obtaned. In general, t s reasonable to requre the watermark to satsfy some condtons nstead of beng randomly selected. or example, we can requre that the watermarks are semantcally meanngful. or enough constrants on the watermarks, there s a unque soluton for, but fndng the soluton s computatonally almost mpossble. Proposton 1 shows that Eq. (1) s an ll-posed problem whch means that a unque soluton does not exst. rom the above dscusson, we can see that the new method s a safe watermarkng scheme, especally when compared wth many exstng watermarkng algorthms. In these watermarkng schemes, gven any two of, and, the thrd can easly be obtaned, whereas ths s not true for our method as Proposton 1 shows. urthermore, our method nvolves no cryptography (though cryptography can be ncorporated to further enhance safety). Proposton shows that an attacker can not create the counterfet mage and watermark whle satsfyng Eq. (11) under certan gven constrants on the watermark. or 1

13 example, we can requre that the watermark take values form {1,} or be semantcally meanngful. B. Error Estmaton hen we add a watermark nto an mage, two questons should be asked: what s the dfference between the orgnal mage and the watermarked mage, and how much energy or watermark nformaton can be nserted? These questons are not solated and all n fact related to error estmaton, a subject that has mostly been overlooked n the exstng lterature. Defnton 1: Suppose matrx = M { a j }, we defne ts spectral norm as follows: = λ = s ( 13 ) max max where λ max and s max denote the maxmum egenvalue of T and the maxmum sngular value of respectvely. Lemma : If U M M and V are orthogonal matrces, and M, then UV = ( 14 ) Lemma 3: Suppose, δ s the dsturbance on matrx, we denote = + δ. The -th sngular value n descendng order of and are s () and s ( ). Then s ( ) s ( ) δ ( 15 ) where = 1,,...,. The above conclusons can be found easly n many textbooks on matrx theory. Lemma 3 s also called the sngular value dsturbance theorem. Then t s easy for us to have the followng result: Theorem : If I,, and s ( ) are defned as above, then 13

14 s ( ) s ( ) a, = 1,..., n ( 16 ) Proof: rom Eq. (5), (6), (14) and (15), we get s ( = s ( S ) s ( ) = s ( S + a ) s ( S) a ) s ( S) rom Eq. (16) we see that can be used as a measure to determne the error between I and Â. Therefore we can adjust the watermark's spectral norm to an acceptable level to trade-off between robustness and perceptblty. One smplest way s to adjust the value of scale factor a. Theorem provdes theoretcal gudance for us to select watermarks, control watermark locaton and determne the watermarkng energy nserted. Such nformaton s typcally unavalable n exstng watermarkng algorthms but s of great mportance n practcal applcatons. C. atermark Selecton rom Eq. (16), we can see that gven scale factor a, the error between the orgnal mage and the watermarked mage s controlled by the spectral norm of the watermark. In the vewpont of mperceptblty of watermark, we want to be as small as possble. Smaller value of suggests better smlarty between the orgnal mage and the watermarked mage. So how to select watermarks s an mportant ssue to be consdered. Many watermarkng algorthms select pseudo Gaussan random sequences as watermarks, and use them to prove the exstence of watermarks by means of correlaton detecton or by explotng the statstcal characterstcs [9]. owever they hardly consder semantcally meanngful vsual watermarks. In fact, such watermarks are more common n many practcal applcatons. 14

15 Suppose two watermark matrces = { a j } and B = { b j }, where j 1,...,, =. s a matrx wth ts elements beng real random numbers, whle B s a gray scale mage. If a j s Gaussan, e.g. a j ~ (,1) and b j [,1] s normalzed to the range of [,1], then n general we have B >> ( 17 ) or most mages, the energy s manly concentrated n a small number of large sngular values. rom Eq. (16), t s obvous that f we choose random matrx as the watermark, better results can be obtaned. or non-random meanngful watermarks, we can preprocess the watermark to reduce the value of the watermark's -norm. One effectve way s to randomze the watermark. 5. EXPERIMETL RESULTS In ths secton, we manly demonstrate the robustness of our watermarkng method. The resstance of the proposed watermarkng algorthm to varous dstortons was studed n a seres of experments on grayscale mages. e compare our method wth the Spread Spectrum Communcaton method proposed by Cox [9] n order to put the performance nvestgaton of our algorthm n proper context. The results show that our method s much more robust. The algorthm s tested wth a varety of mages, but for the sake of space, here we only gve the results of usng the -by- gray mage Lena and robustness test n sx aspects: addng nose, low pass flterng, JPEG compresson, scalng, mage croppng and rotaton. Smlar to the Cox method, the watermark used s a 5-by-1 vector consstng of pseudo 15

16 Gaussan random numbers. In watermark castng by the SVD method, we represent the watermark vector as a 5-by-5 matrx, whle n the Cox method, the watermark s drectly added nto the frst 5 hghest magntude DCT coeffcents of the mage. The value of the scalng factor a of the Cox method, whch controls the watermark energy to be nserted, s set to.1 (a typcal value used by Cox [9]). e use a set of 5 5-by-1 random vectors as watermarks for testng, and only the 1-th s the correct one. The smlarty of the orgnal mage and the watermarked one s evaluated by ther two-dmensonal correlaton coeffcent e c. The value of cox e c produced by the Cox method s (a) (b) (c) gure 1. Dgtal watermarkng for mage Lena by the SVD method. (a) Orgnal mage. (b) atermarked mage. (c) The absolute error mage (a) (b) gure. ose robustness of the SVD method. (a) The nosy mage. (b) atermark correlaton coeffcent. gure 1 shows the result of dgtal watermarkng on Lena by the SVD method. The orgnal mage Lena s n gure 1(a). The watermarked mage s shown n gure 1(b), and gure 1(c) s the absolute error mage scaled up by a factor of 64. The value of a s set to. to ensure that the two mages watermarked by the SVD method and the Cox method has comparable vsual appearances. The correlaton coeffcent value SVD e c s ote that the 16

17 absolute error mage shows the texture characterstcs of the orgnal mage. gure shows the result of addng Gaussan nose. e frst obtan the watermarked mage accordng to Eq. (5) and then add Gaussan nose to t. The mean of addtve Gaussan whte nose s zero, and ts varance s.5. By performng the watermark detecton, we obtan the corrupted watermark. Then the correlaton coeffcent (, ) c between (orgnal watermark) and s computed. The watermarked mage produced by the SVD method after addng nose s shown n gure (a). The response of watermark correlaton detecton s shown n gure (b). The ordnate axs represents the value of the correlaton coeffcents, and the abscssa axs represents a set of 5 5-by-1 watermarks. It s obvous that only the 1-th watermark (the correct one) acheves a meanngful correlaton value (about.7) (a) (b) gure 3. ose robustness of the Cox method. (a) The nosy mage. (b) atermark correlaton coeffcent. gure 3 shows smlar results of the Cox method for comparson. gan we frst add watermark to the orgnal mage, then corrupt t by addng the same nose descrbed above. The correlaton coeffcents c (, ) are also computed. The corrupted mage produced by the Cox method s shown n gure 3(a) and the response of watermark detecton s shown n gure 3(b). e note that although the correct watermark (the 1-th) shows the hghest response compared wth other watermarks, but the hghest value n ths case s only a mere.11. gure 4 shows the result of low pass flterng to the mage by the SVD method. The flter s a Gaussan low pass flter. Its sze s 16-by-16, and the varance σ s 4. e use the flter to 17

18 perform two-dmensonal IR flterng on the watermarked mage. fter flterng, the mage s heavy smoothed. The smoothed mage s shown n gure 4(a). The responses of watermark detecton from the blurred mage are shown n gure 4(b). e can see that after heavly smoothng, the SVD method can stll relably detect the correct watermark. The value of the correlaton coeffcent of the correct watermark s about.3 whch s much hgher than that of the Cox method where the result s almost meanngless (see gure 5). (a) (b) gure 4. Robustness test aganst low pass flterng for the SVD method. (a) The blurred mage. (b) atermark correlaton coeffcent (a) (b) gure 5. Robustness test aganst low pass flterng for the Cox method. (a) The blurred mage. (b) atermark correlaton coeffcent. e also perform lossy compresson for the watermarked mages. gure 6 shows the robustness test aganst JPEG compresson for the SVD method. e apply heavy compresson to the watermarked mage. The qualty of JPEG compresson s 5 wth a compresson rato of 18. gure 6(a) shows the compressed and then decompressed mage. gure 6(b) dsplays the responses of correlaton detecton. e can see that after heavy compresson, the watermark s almost unchanged. The value of c (, ) s.981, whch suggests that our method s extremely robust aganst mage compresson. 18

19 (a) (b) gure 6. Robustness test aganst JPEG compresson usng the SVD method. (a) The compressed-decompressed mage. (b) atermark correlaton coeffcent (a) (b) gure 7. Robustness test aganst JPEG compresson usng the Cox method. (a) The compressed-decompressed mage. (b) atermark correlaton coeffcent (a) (b) gure 8. Robustness test aganst mage rotaton for the SVD method. (a) The rotated mage. (b) atermark correlaton coeffcent. gure 7 shows the Cox method aganst JPEG under the same compresson condtons. gure 7(a) shows the resulted mage after JPEG compresson. gure 7(b) dsplays the responses of correlaton detecton. gan the result s almost of no use. gure 8 shows the robustness test of mage rotaton for the SVD method. e use blnear nterpolaton to perform the rotaton of watermarked mage. The rotaton angle s 3. fter rotaton, we crop the four corners of the rotated mage n order to keep the same sze as the orgnal mage. gure 8(a) shows the rotated mage. gure 8(b) dsplays the correlaton coeffcents of watermark detecton. ote that rotaton by angles of multples of 9 and mage 19

20 transpose have no effect on the method. gure 9 shows the Cox method aganst mage rotaton. The watermarked mage s also rotated for 3. gure 9(a) s the rotated mage. gure 9(b) dsplays the responses of correlaton detecton. e can see that the watermark s destroyed completely after mage rotaton. In fact, the Cox method has lttle resstance to mage rotaton (a) (b) gure 9. Robustness test aganst mage rotaton for the Cox method. (a) The rotated mage. (b) atermark correlaton coeffcent (a) (b) gure 1. Robustness test aganst mage croppng for the SVD method. (a) The clpped mage. (b) atermark correlaton coeffcent (a) (b) gure 11. Robustness test aganst mage croppng for the Cox method. (a) The clpped mage. (b) atermark correlaton coeffcent. gure 1 shows the robustness test of mage croppng. e remove the left half of the watermarked mage produced by the SVD method and then detect exstence of the watermark from the remanng data. gure 1(a) s the clpped mage. gure 1(b) dsplays detecton results. e can see that the correct watermark can stll be relably detected. The correlaton

21 coeffcent value s One nterestng thng s that we also perform the test of removng the mage's rght half. The correlaton coeffcent value becomes.1548, whch means that the mage's rght half contans more nformaton than the left half as far as mage watermarkng s concerned. gure 11 s the same robustness test for the Cox method. gure 11(a) s the clpped mage. gure 11(b) shows the responses of correlaton detecton. The correlaton coeffcent value s.877. ote that the Cox method requres the orgnal mage to extract the watermark. So f we replace the watermarked mage's left part wth the correspondng part of the orgnal mage, much better result can be obtaned. The correlaton coeffcent value becomes.7178, whle f the same processng s appled to our method, the correlaton coeffcent value becomes gure 1. Robustness test aganst rescalng and resamplng of the Cox method and the SVD method, rescalng and resamplng factor are. (a) Test result of the SVD method. (b) Test result of the Cox method. gure 1 shows the results of robustness test aganst rescalng and resamplng. By comparng the correlaton coeffcent values of the SVD method (.9) and the Cox method (.5), we can see that our method s more robust aganst rescalng and resamplng attacks. nally we demonstrate the results of usng vsual watermarks. In our method, the added watermark s represented by a matrx, so t s convenent for us to embed a vsual watermark drectly nto the mage wthout extra processng. ere we add a 5-by-5 gray scale mage nto mage Lena. The watermark s shown n gure 14 (a). The value of scalng factor a s also., 1

22 and the error value SVD e c s gure 13 shows the expermental results. (a) (b) (c) gure 13. Embeddng vsual watermarks by the SVD method. (a) Orgnal mage. (b) atermarked mage. (c) The absolute error of the two mages scaled up by 64. (a) (b) (c) (d) (e) (f) gure 14. Robustness test of vsual watermark. The correspondng Lena mages of (b)~(f) are shown on the top row. Robustness tests have also been done for the watermarked mage wth a vsual watermark. gure 14 shows the test results. (a) s the orgnal watermark. (b) s the extracted watermark after the watermarked mage s contamnated by whte nose. The nose's mean s and ts varance s.5. The error value (.e. the value of two-dmensonal correlaton coeffcent of the orgnal watermark and the corrupted watermark) s.75. (c) shows the result of low pass flterng. The flter s 16-by-16 Gaussan flter, wth ts varance beng 4. The error value s.153. (d) s the JPEG compresson result. The JPEG compresson qualty s 5. The correlaton coeffcent s.945. e can see that heavy compresson has nearly no effect on our method. (e) s the corrupted watermark extracted after we rotate the watermarked mage for 3, wth blnear nterpolaton and croppng. The correlaton coeffcent s.95. (f) shows the croppng robustness test. The mage's left half part s removed. But the logo can stll be dentfed. The correlaton coeffcent s.33.

23 These expermental results show that even f the watermarked mage has undergone severe physcal dstortons, the SVD method can stll detect the correct watermark and determne the exstence of the watermark. The results also clearly demonstrate that the novel method s consderably more robust than the popular Cox method. 6. COCLUSIOS In ths paper, a new watermarkng method for dgtal mages has been presented. The watermark s added to the SVD doman of the orgnal mage. The mathematcal background of ths method s very clear, and the error between the orgnal mage and the watermarked mage can be estmated. s a result, mportant questons such as how to determne the locaton of the watermark and how much energy to be nserted can be answered easly. Unlke some other untary transformatons whch adopt fxed orthogonal bases (such as dscrete ourer transform, dscrete cosne transform etc.), SVD uses non-fxed orthogonal bases. It s a one-way, non-symmetrcal decomposton. These propertes lead to the good performance of the novel algorthm n both securty and robustness. urthermore, the algorthm does not requre encrypton to resolve rghtful ownershp and can provde more powerful securty for rghtful ownershp f combned wth encrypton. Extensve experments and comparsons wth the Cox method have been made. Results show that the new method s very robust aganst mage dstorton and s consderably more robust than the Cox method. 7. CKOLGEMET Some parts of the work dscussed n ths paper have been fled for patent (Patent umber: ). The authors would lke to thank the anonymous referees for ther thorough revew 3

24 of the paper and many constructve comments. 8. REERECES [1] B.R.Macq and I.Ptas, Specal ssue on watermarkng, Sgnal Processng, Vol.66, o.3, pp.81-8, [] M.D.Swanson, M.Kobayash and..tewfk, Multmeda data-embeddng and watermarkng technologes, Proceedngs of the IEEE, Vol.86, o.6, pp , [3] S..Low,..Maxemchuk and.m.lapone, Document dentfcaton for copyrght protecton usng centrod detecton, IEEE Trans. on Communcatons, Vol.46, o.3, pp , [4] J.M.cken, ow watermarkng adds value to dgtal content, Communcatons of the CM, Vol.41, o.7, pp.74-77, [5] J. Zhao, E. Koch and C. Luo, Dgtal watermarkng n busness today and tomorrow, Communcatons of CM, Vol.41, o.7, pp.67-7, [6]. Zeng, Dgtal watermarkng and data hdng: technologes and applcatons, Proc. of ICISS 98, Vol.3, pp.3-9, [7] S. Craver,. Memon, B. L. Yeo and M. M. Yeung, Resolvng rghtful ownershps wth nvsble watermarkng technques: Lmtatons, attacks, and mplcatons, IEEE Journal on Selected reas n Communcatons, Vol.16, o.4, pp , [8] L. T. Qao and K. ahrstedt, atermarkng schemes and protocols for protectng rghtful ownershp and customer's rghts, Journal of Vsual Communcaton and Image Representaton, Vol.9, o.3, pp.194-1, [9] I. J. Cox, J. Klan,. T. Leghton and T. Shamoon, Secure Spread Spectrum atermarkng for Multmeda, IEEE Trans. on Image Processng, Vol.6, o.1, pp , [1]. kolads and I. Ptas, Copyrght protecton of mages usng robust dgtal sgnatures, Proc. of ICSSP 96, Vol. 4, pp , May [11]. kolads and I. Ptas, Robust mage watermarkng n the spatal doman, Sgnal Processng, Vol.66, o.3, pp , [1] M. Barn,. Bartoln, V. Cappelln and. Pva, DCT-doman system for robust mage watermarkng, Sgnal Processng, Vol.66, o.3, pp , [13] S. Craver,. Memon, B. Yeo and M. Yeung, Can nvsble watermarks resolve rghtful ownershp, Techncal Report RC 59, IBM Research Dvson, July [14] R. B. olfgang and E. J. Delp, " watermark technque for dgtal magery: further studes", Proc. of Internatonal Conference on Imagng Scence, Systems, and Technology, Las Vegas, evada, [15]. Zeng and B. Lu, " statstcal watermark detecton technque wthout usng orgnal mages for resolvng rghtful ownershps of dgtal mages", IEEE Trans. Image Processng, 8(11), pp , [16]. C. ndrews and C. L. Patterson, Sngular Value Decomposton (SVD) mage codng, IEEE Trans. on Communcatons, pp , prl

25 [17] G.. Golub and C. Rensch, Sngular value decomposton and least squares solutons, umer. Math., Vol. 14, pp. 43-4, 197. [18] C. T. su and J. L. u, Multresoluton watermarkng for dgtal mages, IEEE Trans. on Crcuts and Systems II-nalog and Dgtal Sgnal Processng, Vol.45, o.8, pp , [19] J. J. K. O'Ruanadh and T. Pun, Rotaton, scale and translaton nvarant spread spectrum dgtal mage watermarkng, Sgnal Processng, Vol.66, o.3, pp ,

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

Singular Value Decomposition: Theory and Applications

Singular Value Decomposition: Theory and Applications Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real

More information

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars

More information

Salmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2

Salmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2 Salmon: Lectures on partal dfferental equatons 5. Classfcaton of second-order equatons There are general methods for classfyng hgher-order partal dfferental equatons. One s very general (applyng even to

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT Changqng Zhu 1 Zhwe Wang 2 Y Long 1 Chengsong Yang 2 1 Key Laboratory of Vrtual Geographc Envronment, Nanjng Normal Unversty, Nanjng 210054;2 Insttute

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

arxiv:cs.cv/ Jun 2000

arxiv:cs.cv/ Jun 2000 Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

LECTURE 9 CANONICAL CORRELATION ANALYSIS

LECTURE 9 CANONICAL CORRELATION ANALYSIS LECURE 9 CANONICAL CORRELAION ANALYSIS Introducton he concept of canoncal correlaton arses when we want to quantfy the assocatons between two sets of varables. For example, suppose that the frst set of

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Global Sensitivity. Tuesday 20 th February, 2018

Global Sensitivity. Tuesday 20 th February, 2018 Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values

More information

Time-Varying Systems and Computations Lecture 6

Time-Varying Systems and Computations Lecture 6 Tme-Varyng Systems and Computatons Lecture 6 Klaus Depold 14. Januar 2014 The Kalman Flter The Kalman estmaton flter attempts to estmate the actual state of an unknown dscrete dynamcal system, gven nosy

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

2 More examples with details

2 More examples with details Physcs 129b Lecture 3 Caltech, 01/15/19 2 More examples wth detals 2.3 The permutaton group n = 4 S 4 contans 4! = 24 elements. One s the dentty e. Sx of them are exchange of two objects (, j) ( to j and

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

Representation theory and quantum mechanics tutorial Representation theory and quantum conservation laws

Representation theory and quantum mechanics tutorial Representation theory and quantum conservation laws Representaton theory and quantum mechancs tutoral Representaton theory and quantum conservaton laws Justn Campbell August 1, 2017 1 Generaltes on representaton theory 1.1 Let G GL m (R) be a real algebrac

More information

MEM 255 Introduction to Control Systems Review: Basics of Linear Algebra

MEM 255 Introduction to Control Systems Review: Basics of Linear Algebra MEM 255 Introducton to Control Systems Revew: Bascs of Lnear Algebra Harry G. Kwatny Department of Mechancal Engneerng & Mechancs Drexel Unversty Outlne Vectors Matrces MATLAB Advanced Topcs Vectors A

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

Chapter 6. Supplemental Text Material

Chapter 6. Supplemental Text Material Chapter 6. Supplemental Text Materal S6-. actor Effect Estmates are Least Squares Estmates We have gven heurstc or ntutve explanatons of how the estmates of the factor effects are obtaned n the textboo.

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

Some Comments on Accelerating Convergence of Iterative Sequences Using Direct Inversion of the Iterative Subspace (DIIS)

Some Comments on Accelerating Convergence of Iterative Sequences Using Direct Inversion of the Iterative Subspace (DIIS) Some Comments on Acceleratng Convergence of Iteratve Sequences Usng Drect Inverson of the Iteratve Subspace (DIIS) C. Davd Sherrll School of Chemstry and Bochemstry Georga Insttute of Technology May 1998

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

1 GSW Iterative Techniques for y = Ax

1 GSW Iterative Techniques for y = Ax 1 for y = A I m gong to cheat here. here are a lot of teratve technques that can be used to solve the general case of a set of smultaneous equatons (wrtten n the matr form as y = A), but ths chapter sn

More information

Appendix B. The Finite Difference Scheme

Appendix B. The Finite Difference Scheme 140 APPENDIXES Appendx B. The Fnte Dfference Scheme In ths appendx we present numercal technques whch are used to approxmate solutons of system 3.1 3.3. A comprehensve treatment of theoretcal and mplementaton

More information

x = , so that calculated

x = , so that calculated Stat 4, secton Sngle Factor ANOVA notes by Tm Plachowsk n chapter 8 we conducted hypothess tests n whch we compared a sngle sample s mean or proporton to some hypotheszed value Chapter 9 expanded ths to

More information

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant Tutoral 2 COMP434 ometrcs uthentcaton Jun Xu, Teachng sstant csjunxu@comp.polyu.edu.hk February 9, 207 Table of Contents Problems Problem : nswer the questons Problem 2: Power law functon Problem 3: Convoluton

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution Department of Statstcs Unversty of Toronto STA35HS / HS Desgn and Analyss of Experments Term Test - Wnter - Soluton February, Last Name: Frst Name: Student Number: Instructons: Tme: hours. Ads: a non-programmable

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1 A New Metrc for Qualty Assessment of Dgtal Images Based on Weghted-Mean Square Error Proceedngs of SPIE, vol. 4875, 2002 Kawen Zhang, Shuozhong Wang, and Xnpen Zhang School of Communcaton and Informaton

More information

A Self-embedding Robust Digital Watermarking Algorithm with Blind Detection

A Self-embedding Robust Digital Watermarking Algorithm with Blind Detection Sensors & Transducers Vol 77 Issue 8 August 04 pp 50-55 Sensors & Transducers 04 by IFSA Publshng S L http://wwwsensorsportalcom A Self-embeddng Robust Dgtal Watermarkng Algorthm wth Blnd Detecton Gong

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

COMPLEX NUMBERS AND QUADRATIC EQUATIONS

COMPLEX NUMBERS AND QUADRATIC EQUATIONS COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not

More information

1 Matrix representations of canonical matrices

1 Matrix representations of canonical matrices 1 Matrx representatons of canoncal matrces 2-d rotaton around the orgn: ( ) cos θ sn θ R 0 = sn θ cos θ 3-d rotaton around the x-axs: R x = 1 0 0 0 cos θ sn θ 0 sn θ cos θ 3-d rotaton around the y-axs:

More information

Feb 14: Spatial analysis of data fields

Feb 14: Spatial analysis of data fields Feb 4: Spatal analyss of data felds Mappng rregularly sampled data onto a regular grd Many analyss technques for geophyscal data requre the data be located at regular ntervals n space and/or tme. hs s

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

A NEW DISCRETE WAVELET TRANSFORM

A NEW DISCRETE WAVELET TRANSFORM A NEW DISCRETE WAVELET TRANSFORM ALEXANDRU ISAR, DORINA ISAR Keywords: Dscrete wavelet, Best energy concentraton, Low SNR sgnals The Dscrete Wavelet Transform (DWT) has two parameters: the mother of wavelets

More information

Linear Approximation with Regularization and Moving Least Squares

Linear Approximation with Regularization and Moving Least Squares Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...

More information

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

Comparison of Wiener Filter solution by SVD with decompositions QR and QLP

Comparison of Wiener Filter solution by SVD with decompositions QR and QLP Proceedngs of the 6th WSEAS Int Conf on Artfcal Intellgence, Knowledge Engneerng and Data Bases, Corfu Island, Greece, February 6-9, 007 7 Comparson of Wener Flter soluton by SVD wth decompostons QR and

More information

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Advanced Quantum Mechanics

Advanced Quantum Mechanics Advanced Quantum Mechancs Rajdeep Sensarma! sensarma@theory.tfr.res.n ecture #9 QM of Relatvstc Partcles Recap of ast Class Scalar Felds and orentz nvarant actons Complex Scalar Feld and Charge conjugaton

More information

Tracking with Kalman Filter

Tracking with Kalman Filter Trackng wth Kalman Flter Scott T. Acton Vrgna Image and Vdeo Analyss (VIVA), Charles L. Brown Department of Electrcal and Computer Engneerng Department of Bomedcal Engneerng Unversty of Vrgna, Charlottesvlle,

More information

Statistical Inference. 2.3 Summary Statistics Measures of Center and Spread. parameters ( population characteristics )

Statistical Inference. 2.3 Summary Statistics Measures of Center and Spread. parameters ( population characteristics ) Ismor Fscher, 8//008 Stat 54 / -8.3 Summary Statstcs Measures of Center and Spread Dstrbuton of dscrete contnuous POPULATION Random Varable, numercal True center =??? True spread =???? parameters ( populaton

More information

Hiding data in images by simple LSB substitution

Hiding data in images by simple LSB substitution Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty

More information

Workshop: Approximating energies and wave functions Quantum aspects of physical chemistry

Workshop: Approximating energies and wave functions Quantum aspects of physical chemistry Workshop: Approxmatng energes and wave functons Quantum aspects of physcal chemstry http://quantum.bu.edu/pltl/6/6.pdf Last updated Thursday, November 7, 25 7:9:5-5: Copyrght 25 Dan Dll (dan@bu.edu) Department

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Asymptotics of the Solution of a Boundary Value. Problem for One-Characteristic Differential. Equation Degenerating into a Parabolic Equation

Asymptotics of the Solution of a Boundary Value. Problem for One-Characteristic Differential. Equation Degenerating into a Parabolic Equation Nonl. Analyss and Dfferental Equatons, ol., 4, no., 5 - HIKARI Ltd, www.m-har.com http://dx.do.org/.988/nade.4.456 Asymptotcs of the Soluton of a Boundary alue Problem for One-Characterstc Dfferental Equaton

More information

Introductory Cardinality Theory Alan Kaylor Cline

Introductory Cardinality Theory Alan Kaylor Cline Introductory Cardnalty Theory lan Kaylor Clne lthough by name the theory of set cardnalty may seem to be an offshoot of combnatorcs, the central nterest s actually nfnte sets. Combnatorcs deals wth fnte

More information

MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS

MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS These are nformal notes whch cover some of the materal whch s not n the course book. The man purpose s to gve a number of nontrval examples

More information

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k) ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of

More information

The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model

The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model Journal of Computer and Communcatons, 04,, -6 Publshed Onlne July 04 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.436/cc.04.906 The Dgtal Fngerprntng Method for Statc Images Based on Weghted

More information

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation Fourth Internatonal Conference on Image and Graphcs Rotaton Invarant Shape Contexts based on Feature-space Fourer Transformaton Su Yang 1, Yuanyuan Wang Dept of Computer Scence and Engneerng, Fudan Unversty,

More information

A Novel Quality Measure for Information Hiding in Images

A Novel Quality Measure for Information Hiding in Images A Novel Qualty Measure for Informaton Hdng n s KA Navas Aravnd M SasKumar M Asstant rofessor G student rofessor College Of Engneerng College of Engneerng Maran Engneerng College Trvandrum,Inda Trvandrum,Inda

More information

C/CS/Phy191 Problem Set 3 Solutions Out: Oct 1, 2008., where ( 00. ), so the overall state of the system is ) ( ( ( ( 00 ± 11 ), Φ ± = 1

C/CS/Phy191 Problem Set 3 Solutions Out: Oct 1, 2008., where ( 00. ), so the overall state of the system is ) ( ( ( ( 00 ± 11 ), Φ ± = 1 C/CS/Phy9 Problem Set 3 Solutons Out: Oct, 8 Suppose you have two qubts n some arbtrary entangled state ψ You apply the teleportaton protocol to each of the qubts separately What s the resultng state obtaned

More information

A Particle Filter Algorithm based on Mixing of Prior probability density and UKF as Generate Importance Function

A Particle Filter Algorithm based on Mixing of Prior probability density and UKF as Generate Importance Function Advanced Scence and Technology Letters, pp.83-87 http://dx.do.org/10.14257/astl.2014.53.20 A Partcle Flter Algorthm based on Mxng of Pror probablty densty and UKF as Generate Importance Functon Lu Lu 1,1,

More information

Lecture 12: Classification

Lecture 12: Classification Lecture : Classfcaton g Dscrmnant functons g The optmal Bayes classfer g Quadratc classfers g Eucldean and Mahalanobs metrcs g K Nearest Neghbor Classfers Intellgent Sensor Systems Rcardo Guterrez-Osuna

More information

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur Analyss of Varance and Desgn of Experment-I MODULE VIII LECTURE - 34 ANALYSIS OF VARIANCE IN RANDOM-EFFECTS MODEL AND MIXED-EFFECTS EFFECTS MODEL Dr Shalabh Department of Mathematcs and Statstcs Indan

More information

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1 Estmatng the Fundamental Matrx by Transformng Image Ponts n Projectve Space 1 Zhengyou Zhang and Charles Loop Mcrosoft Research, One Mcrosoft Way, Redmond, WA 98052, USA E-mal: fzhang,cloopg@mcrosoft.com

More information

= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system.

= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system. Chapter Matlab Exercses Chapter Matlab Exercses. Consder the lnear system of Example n Secton.. x x x y z y y z (a) Use the MATLAB command rref to solve the system. (b) Let A be the coeffcent matrx and

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

Perron Vectors of an Irreducible Nonnegative Interval Matrix

Perron Vectors of an Irreducible Nonnegative Interval Matrix Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of

More information

The Prncpal Component Transform The Prncpal Component Transform s also called Karhunen-Loeve Transform (KLT, Hotellng Transform, oregenvector Transfor

The Prncpal Component Transform The Prncpal Component Transform s also called Karhunen-Loeve Transform (KLT, Hotellng Transform, oregenvector Transfor Prncpal Component Transform Multvarate Random Sgnals A real tme sgnal x(t can be consdered as a random process and ts samples x m (m =0; ;N, 1 a random vector: The mean vector of X s X =[x0; ;x N,1] T

More information

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product 12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA Here s an outlne of what I dd: (1) categorcal defnton (2) constructon (3) lst of basc propertes (4) dstrbutve property (5) rght exactness (6) localzaton

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Transform Coding. Transform Coding Principle

Transform Coding. Transform Coding Principle Transform Codng Prncple of block-wse transform codng Propertes of orthonormal transforms Dscrete cosne transform (DCT) Bt allocaton for transform coeffcents Entropy codng of transform coeffcents Typcal

More information

CHAPTER 4. Vector Spaces

CHAPTER 4. Vector Spaces man 2007/2/16 page 234 CHAPTER 4 Vector Spaces To crtcze mathematcs for ts abstracton s to mss the pont entrel. Abstracton s what makes mathematcs work. Ian Stewart The man am of ths tet s to stud lnear

More information

Approximate Smallest Enclosing Balls

Approximate Smallest Enclosing Balls Chapter 5 Approxmate Smallest Enclosng Balls 5. Boundng Volumes A boundng volume for a set S R d s a superset of S wth a smple shape, for example a box, a ball, or an ellpsod. Fgure 5.: Boundng boxes Q(P

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION. Erdem Bala, Dept. of Electrical and Computer Engineering,

COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION. Erdem Bala, Dept. of Electrical and Computer Engineering, COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION Erdem Bala, Dept. of Electrcal and Computer Engneerng, Unversty of Delaware, 40 Evans Hall, Newar, DE, 976 A. Ens Cetn,

More information

GEMINI GEneric Multimedia INdexIng

GEMINI GEneric Multimedia INdexIng GEMINI GEnerc Multmeda INdexIng Last lecture, LSH http://www.mt.edu/~andon/lsh/ Is there another possble soluton? Do we need to perform ANN? 1 GEnerc Multmeda INdexIng dstance measure Sub-pattern Match

More information

Digital Signal Processing

Digital Signal Processing Dgtal Sgnal Processng Dscrete-tme System Analyss Manar Mohasen Offce: F8 Emal: manar.subh@ut.ac.r School of IT Engneerng Revew of Precedent Class Contnuous Sgnal The value of the sgnal s avalable over

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

This column is a continuation of our previous column

This column is a continuation of our previous column Comparson of Goodness of Ft Statstcs for Lnear Regresson, Part II The authors contnue ther dscusson of the correlaton coeffcent n developng a calbraton for quanttatve analyss. Jerome Workman Jr. and Howard

More information