Detecting Doubly Compressed JPEG Images by Factor Histogram

Size: px
Start display at page:

Download "Detecting Doubly Compressed JPEG Images by Factor Histogram"

Transcription

1 APSIPA ASC 2 Xi an Detecting Doubly Compressed JPEG Images by Factor Histogram Jianquan Yang a, Guopu Zhu a, and Jiwu Huang b a Shenzhen Institutes o Advanced Technology, Chinese Academy o Sciences, Shenzhen, GD 5855 b School o Inormation Science and Technology, Sun Yat-sen University, Guangzhou, GD jq.yang@siat.ac.cn, guopu_zhu@yahoo.com, isshjw@mail.sysu.edu.cn Abstract The detection o double compression plays an important role in JPEG image orensics and steganalysis. This paper introduces a new statistic called actor histogram, which describes the distribution o the actors being related to the quantized discrete cosine transorm coeicients o JPEG image. Then, two concrete schemes based on actor histogram are presented or detecting doubly compressed images and identiying primary quality actor, respectively. Our experimental results demonstrate that both o the proposed schemes perorm well, which validates the applicability o actor histogram in the detection o double compression and the estimation o primary quantization parameter. I. INTRODUCTION JPEG is one o the most widely used standards or compressing image data. Most image acquisition devices and processing sotwares output JPEG iles, and the digital images on the web are oten transmitted in this ormat. So JPEG images are playing an increasingly important role in our daily lives. However, with the development o image processing techniques, it is now easier than ever to tamper with digital images and the tampered images are usually stored in JPEG ormat or distribution. Furthermore, many steganography algorithms (such as F5 [], Outguess [2], Yass [3], etc.) store stego images also in JPEG ormat. In some scenarios, ake or stego images may cause serious harms i it is ailed to detect them. Thereore, the authentication o JPEG images and the detection o the secret messages in JPEG images have become important issues. And many orensics and steganalysis techniques have been developed to address these issues in recent years. The detection o double compression (DC) and the estimation o the primary quantization matrix (PQM) o doubly compressed images are hot topics in the ield o JPEG image orensics and steganalysis. Double compression reers to the procedure that a natural image is compressed irstly, then the compressed image is decompressed into spatial domain and recompressed with a dierent quantization matrix. DC detection is usually the irst step to detect orged or stego JPEG images, while PQM estimation may help to urther reveal more details, such as the location o tampered areas or the length estimation o the secret message embedded in stego images. DC detection and PQM estimation have been addressed by This work was supported by the 973 Program (No. 2CB3224) and the National Natural Science Foundation o China (No ). * Corresponding author. many researchers, who have also proposed a plenty o algorithms. And these algorithms could be roughly classiied into two categories: the spatial-domain-based algorithms [4] [6] and the requency-domain-based algorithms [7] [4]. Among the spatial-domain-based algorithms, Luo et al. [4] proposed a characteristic matrix or blocking artiacts to detect cropped and recompressed images. Based on the work o [4], Barni et al. [5] recently proposed two algorithms to identiy cut and paste tampering in orged JPEG images. Chen and Hsu [6] proposed a blocking periodicity model to analyze blocking artiacts. The idea o the spatial-domain-based algorithms is based on detecting the abnormal blocking artiacts o intra blocks. However, i there is no shit between the JPEG grids o the two sequential compressions (i.e., recompress with aligned 8 8 grids), these algorithms will ail to detect DC. The requency-domain-based algorithms apply the statistics o quantized discrete cosine transorm (DCT) coeicients to detect DC and/or estimate PQM, requiring that the two sequential compressions are with aligned 8 8 grids. Lukas and Fridrich [7] studied the histogram shape o the quantized DCT coeicients in doubly compressed image and proposed three schemes or estimating primary quantization step (PQS). The irst two o their schemes are non-training-based, and the last one is a training-based scheme that adopts neural network. Pevny and Fridrich [8] trained a SVM with 44-D eatures or DC detection, and designed several SVM-based multi-classiiers or PQS estimation. Popescu and Farid [9] observed that the histogram o quantized DCT coeicients in doubly compressed image appears periodic artiacts, so they proposed a measure to evaluate the periodicity in histogram and applied it or DC detection. Fu et al. [] presented a novel statistical model called generalized Benord s law to study JPEG compression. They reported that the distribution o the irst digits o the quantized DCT coeicients in doubly compressed image no longer ollows the generalized Benord s law, which could be used as a clue to detect DC. Li et al. [] improved and extended the work in [] by proposing mode based irst digit eatures or DC detection and the estimation o primary quality actor (PQF). Chen and Hsu [2] combined the eatures in requency domain with that in spatial domain or DC detection, which makes their proposed scheme work well in both JPEG grids aligned and non-aligned situations. Besides, several techniques have been developed to locate the tampered regions in orged JPEG images via DCT coeicient analysis [3], [4]. Since requency-domain-based algorithms

2 have potentials to detect DC as well as estimate PQS/PQF, they seem to attract more attentions in recent years. This paper introduces a new statistic called actor histogram by analyzing the procedure o double quantization. Factor histogram describes the distribution o the actors being related to quantized DCT coeicients. By theoretically analyzing its characteristics, we ind that actor histogram can be applied to DC detection and PQM estimation, and then design two schemes to urther investigate the advantages and drawbacks o actor histogram. Our experimental results show that the proposed schemes can achieve satisactory perormance even when the tested image is quite small or is compressed by multiple times, which indicates that actor histogram can be used as a easible and eective technique or JPEG DC detection and PQM estimation. The rest o the paper is organized as ollows. Section II derives the concept o actor histogram by analyzing the procedure o the double quantization in JPEG DC, and Section III describes the details o the proposed DC detection and PQM estimation schemes. Experimental results are presented in Section IV. Finally, we conclude our work in Section V. II. FACTOR HISTOGRAM JPEG DC makes the DCT coeicients undergo double quantization. In this section, we derive the concept o actor histogram by theoretically analyzing the procedure o double quantization. Fig. shows the procedure o JPEG DC. In order to highlight double quantization in JPEG DC, some operations, such as entropy encoding and decoding, and etc., are omitted. As shown in Fig., the original coeicient c is quantized by the step size q to generate c, then the quantized coeicient c undergoes a series o operations, which include dequantization, inverse DCT, rounding and/or truncating, DCT, and then becomes into c q + e, where the term e denotes the error due to the rounding and/or truncating operations. Finally, the whole term c q + e is quantized again by the step size q 2 to orm the coeicient c 2. Note that the input and output data in Fig. are in orm o matrix in practice, but or clearly describing and analyzing the procedure o double quantization, we adopt the above-mentioned scalar notations. According to the DC procedure shown in Fig., the quantized coeicient c 2 can be expressed as [ ] c q + e c 2 = () where [ ] denotes the round operator, and the quantization step size q and q 2 are positive integers. In order to derive a clear relationship among c, q, c 2 and q 2, we ignore the error term e. According to the rule o round operator, it can be obtained that [3], c 2.5 c q /q 2 < c (2) From (2), we can urther get the value range o c q : q 2 (c 2.5)q 2 c q < (c 2 +.5)q 2 (3) c c c q c 2 Quantization (q ) Quantization (q 2 ) c q +e Dequantization (q ) DCT Pixel Value IDCT Rounding and/or truncating Fig.. Procedure o JPEG double compression. Some operations are omitted in order to highlight double quantization. The above range o c q includes q 2 consecutive integers, which can be collected to orm a set D(c 2,q 2 ). The set D(c 2,q 2 ) is determined by c 2 and q 2, and can be described by D(c 2,q 2 ) = { (c 2.5)q 2 + x x =,,,q 2 } (4) where denotes the ceiling operator. Then, according to (3) and (4), we have c q D(c 2,q 2 ) (5) Observing that q is one o the positive actors o the term c q, we actorize each integer in D(c 2,q 2 ), and collect all o the positive actors to orm the actor set F(c 2,q 2 ), which is given by F(c 2,q 2 ) = {x mod(y,x) =,y D(c 2,q 2 ),x > } (6) where mod(, ) denotes the modulo operator. Then we can obtain that q F(c 2,q 2 ) (7) Note that the set F(c 2,q 2 ) can be regarded as a constraint or the value range o the step size q. I c 2 =, according to (4), we have D(,q 2 ), then, according to (6), we urther have F(,q 2 ) = Z +, which means that i c 2 =, F(,q 2 ) does not provide any constraint on q. Thereore, the case that c 2 = is omitted in our ollowing analysis. As mentioned above, D(c 2,q 2 ) consists o q 2 consecutive integers, thereore, it is obvious that {,2,,q 2 } F(c 2,q 2 ) (8) Especially, when q > q 2, according to (7) and (8), we urther have {,2,,q 2,q } F(c 2,q 2 ) (9) Here we give a concrete example to show the actor set property described by (9). Given that c =, q = 8, and q 2 = 3, according to (), we obtain c 2 = [c q /q 2 ] = 3. Further, according to (4) and (6), we have D(c 2,q 2 ) = {8,9,} and F(c 2,q 2 ) = {,2,3,4,5,8,9,}, respectively. So it is obvious that {,2,,q 2,q } = {,2,3,8} F(c 2,q 2 ). We have analyzed double quantization or a single quantized coeicient above, and some conclusions (i.e., (8) and (9)) are drawn. In the ollowing, we consider the case o a quantized coeicient sequence. Let c 2 = [ c 2,c2 2,,cn 2] denote a nonzero coeicient sequence o length n, in which each component has been doubly quantized with step size q and q 2. For each component c i 2 (i =,2,,n) o c 2, we calculate F(c i 2,q 2) according to (6), thus we can get n actor sets totally. All

3 elements o these actor sets are collected to orm a actor sequence. Then we calculate the histogram o the actor sequence, and denote the resulting histogram by h. Since h describes the distribution o the elements in the actor sequence, we call it actor histogram. We also denote the histogram o the quantized coeicient sequence c 2 by h c, and call it quantized coeicient histogram. It is interesting that h can be computed based on h c, and h can be expressed by h (u) = b x=a h c (x)s(u,x,q 2 ), u r () where a and b denote the minimum and maximum in c 2, respectively, and r is a parameter that controls the interested range, and s(u,x,q 2 ) is given by {, u F(x,q2 ) s(u,x,q 2 ) = (), u / F(x,q 2 ) Then, according to the deinition o h described by () and (), we have h (u) n (2) where n = b x=a h c (x) is the length o the nonzero coeicient sequence c 2. Up to now, we have derived the concept o actor histogram. According to () and (), it can be ound that the calculation o actor histogram just depends on the quantized coeicient sequence c 2 and its current quantization step size q 2. Thereore, as long as the quantized coeicient sequence and its current quantization step size are available, the actor histogram o the sequence can be calculated in practice, no matter the sequence has been singly quantized, doubly quantized or repeatedly quantized. For the images being saved in JPEG ormat, its quantized coeicients and the quantization step size can be read rom the image ile directly; while or the images that have been JPEG compressed and then been resaved in other ormat, such as BMP ormat, its quantization step size can be estimated by some existing algorithms [5], [6], and its quantized coeicients can also be calculated ater knowing the quantization step size. In the ollowing we analyze some characteristics o the actor histogram h. According to (8), (), and (), we have h (u) = n,u {,2,,q 2 } (3) Especially, when q > q 2, according to (9), () and (), we have h (u) = n,u {,2,,q 2,q } (4) Eq. (3) means that actor histogram will reach its maxima at positions,2,,q 2, which has nothing to do with how many times the coeicient sequence have been quantized, and thus is an inherent characteristic o actor histogram. Furhtermore, or the doubly quantized sequence with q > q 2, the actor histogram will achieve its maximum at q in addition. It is worth noting that (4) describes a quite important characteristic or DC detection and PQM estimation. Here is an example to intuitively illustrate the conclusions mentioned above. Let c denote a coeicient sequence generated by a Gaussian process with mean and standard deviation 25. Then, we quantize the sequence c in three dierent manners, which are single quantization with step size q a = 3, double quantization with step size pair (q b,q b) = (5,3), and double quantization with (q c,q c ) = (3,5), then denote the three quantized coeicient sequences by c a, c b and c c, respectively. Factor histograms o the three quantization versions o c are shown in Fig. 2. The three actor histograms achieve their maxima at positions,2, q a, positions,2,,q b and positions,2,,q c, respectively, which validates (3). Since q b > q b, Fig. 2(b) shows that the actor histogram o c b also reaches its maximum at q b, which validates (4). Although c c has also gone through double quantization, there is no additional maximum in its actor histogram due to that q c < q c. III. PROPOSED SCHEMES In practice, many camera manuacturers and image sotware developers have designed their own JPEG quantization matrixes [7], which may have some dierences rom each other. But, the JPEG quantization matrixes provided by the same company are usually very similar, thus can be regarded as the same quantization matrix system (QMS). In some scenarios, the knowledge o primary QMS (i.e., the QMS used in the primary JPEG compression) can be used as auxiliary inormation to detect DC and estimate PQM. According to whether the knowledge o primary QMS is available or not, the problems o DC detection and PQM estimation could be classiied into two categories. The irst category is to detect DC and estimate PQM with the knowledge o primary QMS. Whereas the second one is to detect DC and estimate PQM without any primary QMS knowledge. I the inormation o the quantized coeicients in dierent requencies can be integrated together by utilizing the knowledge o primary QMS appropriately, then better perormance should be achieved. In this paper, we ocus on solving the irst category o the problems (i.e. detecting DC and estimating PQM with the knowledge o primary QMS) by using actor histogram. For simplicity, standard QMS, which is recommended by JPEG compression standard, is adopted in our analysis and experiments. And we also assume that the primary and current JPEG compression use the same QMS. The quality actor ranging rom ~ is used to represent the compression quality. User can adjust quality actor to make a tradeo between idelity and compression rate. In the ollowing, we will describe our proposed schemes in detail. A. Detecting JPEG Double Compression [ Let F denote the quality actor in standard QMS, and Q = q i j ] denote the quantization matrix corresponding to F. 8 8 For a given JPEG image, we irst extract the quantized DCT coeicients and quantization matrix rom the image ile, and calculate the actor histogram or each requency according to () and (). We denote the actor histogram o the requency (i, j) by h i j. Then, we deine the ollowing statistic or DC detection M(F) = (i, j) L h i j (qi j ) (i, j) L h i j,f =,2,, (5) ()

4 2.5 x x x (a) (b) (c) Fig. 2. Factor histogram o dierent quantized sequences (a) singly quantized with step size 3 (b) doubly quantized with step size pair (5,3) (c) doubly quantized with step size pair (3,5) where L denotes the set o the interested requencies. Through (5), we uniy the inormation o the actor histograms o dierent requencies together to calculate the statistic M(F). We name the statistic M(F) as the actor matching degree (FMD) o F or F =,2,,, and name the curve ormed by the value o M(F) at each position F as FMD curve, due to M(F) has the ollowing characteristics: ) Since h i j (qi j ) h i j () or i, j 8, according to (5), we have M(F). 2) Let F c denote the quality actor o current compression, and Q c denote its corresponding quantization matrix. According to (3), it is obtained that h i j (u) = ni j, u {,2,,q i c j }, i, j 8, where n i j denotes the number o nonzero coeicients at requency (i, j). And we also notice that or standard QMS, when F c F, q i c j q i j. Thus, or F c F, we have M(F) = (i, j) L h i j (qi j ) (i, j) L h i j () = (i, j) L ni j (i, j) L n i j = (6) which means that FMD curve reaches its maxima at positions F c,f c +,,. 3) I the detected image is doubly compressed with quality actor pair (F p,f c ), and F p < F c. In this case, we have q i j p q i j h i j (qi j c or i, j 8. Then, according to (4), p ) = n i j. Thus we have M(F p ) = (i, j) L h i j (qi j p ) (i, j) L h i j () = (i, j) L ni j (i, j) L n i j = (7) which means that the FMD curve o a doubly compressed image with F p < F c also reaches its maximum at F p. In summary, i a given image is doubly compressed with quality actor pair (F p,f c ), and F p < F c, the FMD curve o the given image reaches its maxima at positions F p,f c,f c +,,. We have observed rom a lot o experiments that the FMD curves o doubly compressed images show two dierent characteristics, which are determined by the relationship between F p and F c. I F p < F c, the FMD curve will have a local peak at F p, and is quite distinct rom the FMD curve o singly compressed image. However, i F p > F c, the FMD curve is similar to that o singly compressed image. For instance, given an uncompressed image, let it undergo a single compression with quality actor F c = 8, a double compression with quality actor pair (F p,f c ) = (7,8), and a double compression with quality actor pair (F p,f c ) = (8,7), respectively, then we get three compressed images. The FMD curves corresponding to the three compressed images are shown in Fig. 3. All o the three FMD curves reach the maxima at their positions F c,f c +,,. Particularly, the FMD curve corresponding to the double compression with F p < F c (as shown in Fig. 3(b)) has a local peak at position F p. According to (7), the FMD curve should reach its maximum at this position. But, in practice, M(F p ) suers a slight decrease inevitably due to the rounding and truncating errors. However, the FMD curve corresponding to the double compression with F p > F c (as shown in Fig. 3(c)) not only has no obvious local peak, but also is very similar to that corresponding to the single compression (as shown in Fig. 3(a)), which indicates that FMD curve is not suitable or distinguishing double compression with F p > F c rom single compression. In the ollowing, we will calculate the height o the abovementioned local peak to measure the smoothness o FMD curve. We irst deine a statistic as ollows S(F) = M(F) min{m(i) i = F +,F + 2,,} (8) Then, the height o local peak can be calculated by S p = max{s(f)} (9) F Because that the FMD curve o singly compressed images decrease rom right to let (as shown in Fig. 3(a)), thus S p is usually zero or singly compressed image; while S p takes positive value (as shown in Fig. 3(b)) or doubly compressed image, especially or the case that F p < F c. Then, we choose a threshold t to make a binary decision or DC detection. That is, i S p > t, the detected image will be regarded as a doubly compressed image; otherwise, it will be regarded as a singly compressed one. Based on the above descriptions, the proposed DC detection scheme can be summarized by the ollowing steps:

5 S(7) (a) (b) (c) Fig. 3. FMD curves o three compressed versions (a) single compression with quality actor 8 (b) double compression with quality actor pair (7,8) (c) double compression with quality actor pair (8,7) ) For a given JPEG image to be detected, extract its quantized DCT coeicients and current quantization matrix to calculate the actor histogram h i j or each requency (i, j) L; 2) According to (5), calculate the actor matching degree M(F) or F =,2,,, then according to (8) and (9), calculate S p ; 3) I S p > t, the detected image is classiied as a doubly compressed image; otherwise, it is classiied as a singly compressed one. B. Estimating Primary Quality Factor We have explained in section III-A that the FMD curve corresponding to the doubly compression with F p < F c usually has a local peak at position F p. By detecting the position o the local peak, we can estimate F p by Fˆ p = argmax F F c,s(f)> M(F) (2) Note that ˆF p can be used as the estimation o F p only when F p < F c. In practice, we may need to conirm whether the condition F p < F c is satisied or not when we use the proposed scheme to estimate PQF. This can be perormed by checking whether M( ˆF p ) is close to or not. For simpliying our analysis and description, we have assumed that the primary and current JPEG compression adopt the same QMS. However, the proposed schemes with minor modiications can also perorm well even i the two consequent compressions adopt dierent QMS. IV. EXPERIMENTAL RESULTS In order to test the perormances o the proposed schemes, we setup several image sets or our experiments. First, 2 color images are randomly selected rom COREL and NRCS image sets. Then these color images are converted to grayscale, and center-cropped into smaller images o sizes 52 52, ,, 8 8. Thus, there are totally 7 natural image sets with dierent sizes. In our experiments, we adopt Matlab image processing toolbox to implement JPEG compression, and use JPEG toolbox [8] to extract the quantized DCT coeicients and the quantization matrix or calculating actor histogram. And the parameters o the proposed schemes are set as a = 28, b = 28, r = 5, and L takes the irst 3 requencies in Zigzag order. The irst scheme proposed by Lukas and Fridrich in [7] is used or comparison. Lukas and Fridrich s (shortened as L&F s) scheme estimates primary quantization steps by producing a bench image with the cropping and recompressing operations and then perorming compatibility test. As the authors o [7] said, it can be easily extended to detect DC and estimate PQM with the knowledge o primary QMS. A. Experimental Results on DC Detection We irst compare the perormance between the proposed and L&F s schemes on DC detection. For obtaining appropriate thresholds or the proposed scheme, each o the 7 natural image sets is divided into two image subsets o the same number (i.e., each subset has images). The irst image subset is used to determine the threshold t, while the second one is used to test the perormances o the two compared schemes. For each image in the irst image subset, we randomly selected two quality actors F p and F c rom {5,5,,95} with the constraint F p F c 5, then compress the image by a double compression with quality actor pair (F p,f c ) and a single compression with quality actor F c, respectively. Ater the eature S p o the proposed DC detection scheme is extracted rom each image o the irst image subset, we then determine the thresholds by minimizing the classiication error. Finally, we get 7 thresholds corresponding to the 7 dierent image sizes. In the test stage, each image in the second image subset is singly compressed with quality actor F c and doubly compressed with quality actor pair (F p,f c ), respectively. (F p,f c ) is randomly selected rom {5,5,,95}with the restriction Fp F c 5. We classiy the eature Sp o these singly and doubly compressed images by the determined thresholds and then calculate the accuracy o classiication. For showing the perormance o the two compared schemes in more detail, we present the experimental results, respectively, or the two cases that F p < F c and F p > F c. It is clearly shown rom Table I that the proposed scheme perorms quite well in the case that F p < F c. When the size o the test image is relatively small, the proposed scheme can obtain higher detection accuracy than L&F s scheme.

6 TABLE I DETECTION ACCURACY (%) OF DOUBLE COMPRESSION (THE BETTER RESULTS ARE HIGHLIGHTED BY RED AND BOLD FONT) Size o image L&F s F p < F c scheme F p > F c Proposed F p < F c scheme F p > F c TABLE II ESTIMATING ACCURACY (%) OF THE PRIMARY QUALITY FACTOR OF DOUBLE COMPRESSION (THE BETTER RESULTS ARE HIGHLIGHTED BY RED AND BOLD FONT) Size o image L&F s A(±) scheme A(±) Proposed A(±) scheme A(±) TABLE III ESTIMATION ACCURACY (%) OF THE SECONDARY QUALITY FACTOR OF TRIPLE COMPRESSION (THE BETTER RESULTS ARE HIGHLIGHTED BY RED AND BOLD FONT) Size o image L&F s A(±) scheme A(±) Proposed A(±) scheme A(±) Especially, when the size o the test image decreases to 8 8, L&F s scheme ails to work because that the cropping and recompressing operations cannot be applied to a single 8 8 image block, but the detection accuracy o the proposed scheme is up to 76%. As mentioned in section III-A, the proposed scheme is likely unable to detect DC or the case that F p > F c. But we can ound rom Table I that the proposed scheme can also detect the doubly compressed image with F p > F c to some extent. In summary, the proposed DC detection scheme is eective in distinguishing double compression with F p < F c rom single compression, even when the size o the detected image is very small. B. Experimental Results on PQF Estimation In this sub-section, we evaluate the perormance o the proposed scheme on PQF estimation. For each image in our image sets, we doubly compress it by (F p,f c ), where F p and F c are randomly selected rom {5,5,,95} with the constriction o F c F p 5. In order to make a air comparison, we modiy L&F s scheme to make it use the prior knowledge o F p < F c. Here, A(±) and A(±) are introduced to measure the accuracy in estimating PQF. A(±) denotes the percentage o the cases that the estimated PQF is equal to the true PQF, while A(±) denotes the percentage o the cases that the absolute dierence between the estimated PQF and the true PQF is not greater than. As shown in Table II, when the size o the detected image is relatively large, the two compared schemes have almost the same perormance on estimating PQF. With the size o the detected image decreases, the proposed PQF estimation scheme obtains higher estimation accuracy than L&F s. Especially, or the images o size 6 6, the A(±) o L&F s scheme is only 36.3%, while the A(±) o the proposed scheme is 79%, and or the images o size 8 8, L&F s scheme ails to work, but the proposed scheme can still work and its A(±) reaches 56.4%. These experimental results show that the local peak o FMD curve is a quite robust eature or the PQF estimation in the case that F p < F c. To urther show the good perormance o the proposed PQF estimation scheme, we set up 7 image sets consisting o triply compressed images, and then attempt to estimate the secondary quality actors o the triply compressed images. It should be pointed out that, or a triple compression, i we regard the irst compression as a disturbing operation, then the last two compressions can be regarded as a double compression disturbed by the irst compression, and thus the quality actor using in the second compression can be also regarded as the PQF o the disturbed double compression. In this experiment, we irst randomly select a pair o quality actor (F p,f c ) rom {5,5,,95} with the constraint F c F p 5 and a parameter d rom {,2,,2}, then let F p = F p d, inally we compress each image in our testing image sets triply with quality actor group (F p,f p,f c ). Note that the quality actor group (F p,f p,f c ) in this experiment satisies the condition that F p < F p < F c. By comparing the experimental results in Table III with

7 that in Table II, it can be ound that the irst compression disturbs the estimation o the secondary quality actor in some degree. The estimation accuracy o L&F s scheme decreases signiicantly, however, that o the proposed scheme does not decrease too much. For the images o size 52 52, the A(±) o L&F s scheme reaches 9.5% in the case o double compression, while is only 65.5% in the case o triple compression, which indicates that L&F s scheme is very sensitive to disturbances, such as a pre-compression beore double compression. The proposed scheme perorms much better than L&F s scheme in the case o triple compression. Even or the images o size 64 64, the A(±) o the proposed scheme also reaches up to 8%, which shows that the eature extracted rom actor histogram is robust to serious disturbances. V. CONCLUSIONS In this paper, we have derived the concept o actor histogram by theoretically analyzing the procedure o the double quantization in JPEG double compression. By investigating the characteristics o actor histogram, we ound that the actor histogram o a doubly quantized sequence with primary quantization step size larger than current quantization step size likely has obvious artiact, which can be used as a clue to detect double quantization and to estimate primary quantization parameter. We have proposed two schemes to validate the applicability o actor histogram. The experimental results show that the proposed schemes have satisactory perormances even when the detected images are o small size and are compressed several times, which means that actor histogram has great potential in detecting double compression and estimating primary quality actor. REFERENCES [] A. Westeld, F5 - a steganographic algorithm: high capacity despite better steganalysis, Inormation Hiding, 4th International Workshop, ser. Lecture Notes Comput. Sci., 2, vol. 237, pp [2] N. Provos, Deending against statistical steganalysis, in Proc. th USENIX Security Symp., 2, pp [3] K. Solanki, A. Sarkar, and B. S. Manjunath, YASS: yet another steganographic scheme that resists blind steganalysis, in Proc. 9th Int. Workshop on Inormation Hiding, Saint Malo, France, 27, vol. 4567, pp [4] W. Luo, Z. Qu, J. Huang, and G. Qiu, A novel method or detecting cropped and recompressed image block, Proc. ICASSP, vol.2, April 27, pp [5] M. Barni, A. Costanzo, and L. Sabatini, Identiication o cut & paste tampering by means o double-jpeg detection and image segmentation, in Proc. o ISCAS 2, 2, pp [6] Y. L. Chen and C. T. Hsu, Image tampering detection by blocking periodicity analysis in JPEG compressed images, Proc. MMSP, 28. [7] J. Lukas and J. Fridrich, Estimation o primary quantization matrix in double compressed JPEG images, in Proc. Digital Forensic Research Workshop, Cleveland, Ohio, August 23. [8] T. Pevny and J. Fridrich, Detection o double-compression in JPEG images or application in steganography, IEEE Trans. In. Forensics Security, June 28, vol. 3, no. 2, pp [9] A. C. Popescu, Statistical tools or digital image orensics, Ph.D. dissertation, Dartmouth College, Hanover, NH, Dec. 24. [] D. Fu, Y.Q. Shi, and W. Su, A generalized benord s law or JPEG coeicients and its applications in image orensics, in Proc. SPIE, Security, Steganography and Watermarking o Multimedia Contents IX, San Jose, USA, January 27. [] B. Li, Y. Q. Shi, and J. Huang, Detecting doubly compressed JPEG images by mode based irst digit eatures, Proc. MMSP, 28. [2] Y. L. Chen and C. T. Hsu, Detecting recompression o JPEG images via periodicity analysis o compression artiacts or tampering detection, IEEE Trans. In. Forensics Security, June 2, vol. 6, no. 2, pp [3] J. He, Z. Lin, L. Wang, and X. Tang, Detecting doctored JPEG images via DCT coeicients analysis, Proc. European Conerence on Computer Vision, Graz, Austria, 26. [4] T. Bianchi, A. D. Rosa, and A. Piva, Improved DCT coeicient analysis or orgery localization in JPEG images, in Proc. o ICASSP 2, May 2, pp [5] W. Luo, J. Huang, and G. Qiu, JPEG error analysis and its applications to digital image orensics, IEEE Trans. In. orensics and security, vol. 5, no. 3, Sep. 2, pp [6] Z. Fan and R. de Queiroz, Identiication o bitmap compression history: JPEG detection and quantizer estimation, IEEE Trans. Image Processing, vol. 2, no. 2, Feb. 23, pp [7] Predeined quantization matrix used in JPEG compression. [Online], Available: html [8] P. Sallee, Matlab JPEG toolbox.4, [online], Available: sallee.com/jpegtbx/index.html.

Information Hiding and Covert Communication

Information Hiding and Covert Communication Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design

More information

INFORMATION THEORETICAL LIMIT OF COMPRESSION FORENSICS

INFORMATION THEORETICAL LIMIT OF COMPRESSION FORENSICS 24 IEEE International Conference on Acoustic, Speech and Signal Processing ICASSP) INFORATION THEORETICAL LIIT OF COPRESSION FORENSICS Xiaoyu Chu, Yan Chen 2, atthew C. Stamm #3 and K. J. Ray Liu 4 Dept.

More information

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Anindya Sarkar and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Anindya Sarkar, Kaushal Solanki and and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

Probabilistic Model of Error in Fixed-Point Arithmetic Gaussian Pyramid

Probabilistic Model of Error in Fixed-Point Arithmetic Gaussian Pyramid Probabilistic Model o Error in Fixed-Point Arithmetic Gaussian Pyramid Antoine Méler John A. Ruiz-Hernandez James L. Crowley INRIA Grenoble - Rhône-Alpes 655 avenue de l Europe 38 334 Saint Ismier Cedex

More information

Least-Squares Spectral Analysis Theory Summary

Least-Squares Spectral Analysis Theory Summary Least-Squares Spectral Analysis Theory Summary Reerence: Mtamakaya, J. D. (2012). Assessment o Atmospheric Pressure Loading on the International GNSS REPRO1 Solutions Periodic Signatures. Ph.D. dissertation,

More information

Analysis of Integer Transformation and Quantization Blocks using H.264 Standard and the Conventional DCT Techniques

Analysis of Integer Transformation and Quantization Blocks using H.264 Standard and the Conventional DCT Techniques Priyanka P James et al, International Journal o Computer Science and Mobile Computing, Vol.3 Issue.3, March- 2014, pg. 873-878 Available Online at www.ijcsmc.com International Journal o Computer Science

More information

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Lifang Yu, Yao Zhao 1, Rongrong Ni, Ting Li Institute of Information Science, Beijing Jiaotong University, BJ 100044, China Abstract

More information

On the Girth of (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs

On the Girth of (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs On the Girth o (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs Sudarsan V S Ranganathan, Dariush Divsalar and Richard D Wesel Department o Electrical Engineering, University o Caliornia, Los

More information

Curve Sketching. The process of curve sketching can be performed in the following steps:

Curve Sketching. The process of curve sketching can be performed in the following steps: Curve Sketching So ar you have learned how to ind st and nd derivatives o unctions and use these derivatives to determine where a unction is:. Increasing/decreasing. Relative extrema 3. Concavity 4. Points

More information

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University

More information

GF(4) Based Synthesis of Quaternary Reversible/Quantum Logic Circuits

GF(4) Based Synthesis of Quaternary Reversible/Quantum Logic Circuits GF(4) ased Synthesis o Quaternary Reversible/Quantum Logic Circuits MOZAMMEL H. A. KHAN AND MAREK A. PERKOWSKI Department o Computer Science and Engineering, East West University 4 Mohakhali, Dhaka, ANGLADESH,

More information

OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION

OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION Xu Bei, Yeo Jun Yoon and Ali Abur Teas A&M University College Station, Teas, U.S.A. abur@ee.tamu.edu Abstract This paper presents

More information

Roberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 1. Extreme points

Roberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 1. Extreme points Roberto s Notes on Dierential Calculus Chapter 8: Graphical analysis Section 1 Extreme points What you need to know already: How to solve basic algebraic and trigonometric equations. All basic techniques

More information

Stego key searching for LSB steganography on JPEG decompressed image

Stego key searching for LSB steganography on JPEG decompressed image . RESEARCH PAPER. SCIENCE CHINA Information Sciences March 2016, Vol. 59 032105:1 032105:15 doi: 10.1007/s11432-015-5367-x Stego key searching for LSB steganography on JPEG decompressed image Jiufen LIU

More information

Robust Residual Selection for Fault Detection

Robust Residual Selection for Fault Detection Robust Residual Selection or Fault Detection Hamed Khorasgani*, Daniel E Jung**, Gautam Biswas*, Erik Frisk**, and Mattias Krysander** Abstract A number o residual generation methods have been developed

More information

Equidistant Polarizing Transforms

Equidistant Polarizing Transforms DRAFT 1 Equidistant Polarizing Transorms Sinan Kahraman Abstract arxiv:1708.0133v1 [cs.it] 3 Aug 017 This paper presents a non-binary polar coding scheme that can reach the equidistant distant spectrum

More information

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia

More information

Perturbed Quantization Steganography

Perturbed Quantization Steganography Perturbed Quantization Steganography Jessica Fridrich SUNY Binghamton Department of ECE Binghamton, NY 13902-6000 001 607 777 2577 fridrich@binghamton.edu Miroslav Goljan SUNY Binghamton Department of

More information

Research Article Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

Research Article Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2010, Article ID 876946, 6 pages doi:10.1155/2010/876946 Research Article Improved Adaptive LSB Steganography Based

More information

An Improved Expression for a Classical Type of Explicit Approximation of the Colebrook White Equation with Only One Internal Iteration

An Improved Expression for a Classical Type of Explicit Approximation of the Colebrook White Equation with Only One Internal Iteration International Journal o Hydraulic Engineering 06, 5(): 9-3 DOI: 0.593/j.ijhe.06050.03 An Improved Expression or a Classical Type o Explicit Approximation o the Colebrook White Equation with Only One Internal

More information

Numerical Methods - Lecture 2. Numerical Methods. Lecture 2. Analysis of errors in numerical methods

Numerical Methods - Lecture 2. Numerical Methods. Lecture 2. Analysis of errors in numerical methods Numerical Methods - Lecture 1 Numerical Methods Lecture. Analysis o errors in numerical methods Numerical Methods - Lecture Why represent numbers in loating point ormat? Eample 1. How a number 56.78 can

More information

Chapter 6 Reliability-based design and code developments

Chapter 6 Reliability-based design and code developments Chapter 6 Reliability-based design and code developments 6. General Reliability technology has become a powerul tool or the design engineer and is widely employed in practice. Structural reliability analysis

More information

Fisher Consistency of Multicategory Support Vector Machines

Fisher Consistency of Multicategory Support Vector Machines Fisher Consistency o Multicategory Support Vector Machines Yueng Liu Department o Statistics and Operations Research Carolina Center or Genome Sciences University o North Carolina Chapel Hill, NC 7599-360

More information

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Anindya Sarkar, Student Member, IEEE, Upamanyu Madhow, Fellow, IEEE, and B. S. Manjunath,

More information

ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS

ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS I. Thirunavukkarasu 1, V. I. George 1, G. Saravana Kumar 1 and A. Ramakalyan 2 1 Department o Instrumentation

More information

CHAPTER 8 ANALYSIS OF AVERAGE SQUARED DIFFERENCE SURFACES

CHAPTER 8 ANALYSIS OF AVERAGE SQUARED DIFFERENCE SURFACES CAPTER 8 ANALYSS O AVERAGE SQUARED DERENCE SURACES n Chapters 5, 6, and 7, the Spectral it algorithm was used to estimate both scatterer size and total attenuation rom the backscattered waveorms by minimizing

More information

Bond strength model for interfaces between nearsurface mounted (NSM) CFRP strips and concrete

Bond strength model for interfaces between nearsurface mounted (NSM) CFRP strips and concrete University o Wollongong Research Online Faculty o Engineering and Inormation Sciences - Papers: Part A Faculty o Engineering and Inormation Sciences 2014 Bond strength model or interaces between nearsurace

More information

IMPROVED NOISE CANCELLATION IN DISCRETE COSINE TRANSFORM DOMAIN USING ADAPTIVE BLOCK LMS FILTER

IMPROVED NOISE CANCELLATION IN DISCRETE COSINE TRANSFORM DOMAIN USING ADAPTIVE BLOCK LMS FILTER SANJAY KUMAR GUPTA* et al. ISSN: 50 3676 [IJESAT] INTERNATIONAL JOURNAL OF ENGINEERING SCIENCE & ADVANCED TECHNOLOGY Volume-, Issue-3, 498 50 IMPROVED NOISE CANCELLATION IN DISCRETE COSINE TRANSFORM DOMAIN

More information

Open Access Dynamic Parameters Identification for the Feeding System of Commercial Numerical Control Machine

Open Access Dynamic Parameters Identification for the Feeding System of Commercial Numerical Control Machine Send Orders or Reprints to reprints@benthamscience.net The Open Automation and Control Systems Journal, 13, 5, 161-166 161 Open Access Dynamic Parameters Identiication or the Feeding System o Commercial

More information

Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair

Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair 1 Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair Kaveh Mahdaviani, Soheil Mohajer, and Ashish Khisti ECE Dept, University o Toronto, Toronto, ON M5S3G4, Canada ECE Dept, University o Minnesota,

More information

3. Several Random Variables

3. Several Random Variables . Several Random Variables. Two Random Variables. Conditional Probabilit--Revisited. Statistical Independence.4 Correlation between Random Variables. Densit unction o the Sum o Two Random Variables. Probabilit

More information

CS 361 Meeting 28 11/14/18

CS 361 Meeting 28 11/14/18 CS 361 Meeting 28 11/14/18 Announcements 1. Homework 9 due Friday Computation Histories 1. Some very interesting proos o undecidability rely on the technique o constructing a language that describes the

More information

arxiv: v1 [cs.it] 12 Mar 2014

arxiv: v1 [cs.it] 12 Mar 2014 COMPRESSIVE SIGNAL PROCESSING WITH CIRCULANT SENSING MATRICES Diego Valsesia Enrico Magli Politecnico di Torino (Italy) Dipartimento di Elettronica e Telecomunicazioni arxiv:403.2835v [cs.it] 2 Mar 204

More information

The Deutsch-Jozsa Problem: De-quantization and entanglement

The Deutsch-Jozsa Problem: De-quantization and entanglement The Deutsch-Jozsa Problem: De-quantization and entanglement Alastair A. Abbott Department o Computer Science University o Auckland, New Zealand May 31, 009 Abstract The Deustch-Jozsa problem is one o the

More information

on a per-coecient basis in large images is computationally expensive. Further, the algorithm in [CR95] needs to be rerun, every time a new rate of com

on a per-coecient basis in large images is computationally expensive. Further, the algorithm in [CR95] needs to be rerun, every time a new rate of com Extending RD-OPT with Global Thresholding for JPEG Optimization Viresh Ratnakar University of Wisconsin-Madison Computer Sciences Department Madison, WI 53706 Phone: (608) 262-6627 Email: ratnakar@cs.wisc.edu

More information

( x) f = where P and Q are polynomials.

( x) f = where P and Q are polynomials. 9.8 Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm ( ) ( ) ( ) P where P and Q are polynomials. Q An eample o a simple rational

More information

Bayesian Technique for Reducing Uncertainty in Fatigue Failure Model

Bayesian Technique for Reducing Uncertainty in Fatigue Failure Model 9IDM- Bayesian Technique or Reducing Uncertainty in Fatigue Failure Model Sriram Pattabhiraman and Nam H. Kim University o Florida, Gainesville, FL, 36 Copyright 8 SAE International ABSTRACT In this paper,

More information

On High-Rate Cryptographic Compression Functions

On High-Rate Cryptographic Compression Functions On High-Rate Cryptographic Compression Functions Richard Ostertág and Martin Stanek Department o Computer Science Faculty o Mathematics, Physics and Inormatics Comenius University Mlynská dolina, 842 48

More information

COMP 408/508. Computer Vision Fall 2017 PCA for Recognition

COMP 408/508. Computer Vision Fall 2017 PCA for Recognition COMP 408/508 Computer Vision Fall 07 PCA or Recognition Recall: Color Gradient by PCA v λ ( G G, ) x x x R R v, v : eigenvectors o D D with v ^v (, ) x x λ, λ : eigenvalues o D D with λ >λ v λ ( B B, )

More information

Generalized Transfer Component Analysis for Mismatched Jpeg Steganalysis

Generalized Transfer Component Analysis for Mismatched Jpeg Steganalysis Generalized Transfer Component Analysis for Mismatched Jpeg Steganalysis Xiaofeng Li 1, Xiangwei Kong 1, Bo Wang 1, Yanqing Guo 1,Xingang You 2 1 School of Information and Communication Engineering Dalian

More information

Physics 5153 Classical Mechanics. Solution by Quadrature-1

Physics 5153 Classical Mechanics. Solution by Quadrature-1 October 14, 003 11:47:49 1 Introduction Physics 5153 Classical Mechanics Solution by Quadrature In the previous lectures, we have reduced the number o eective degrees o reedom that are needed to solve

More information

Definition: Let f(x) be a function of one variable with continuous derivatives of all orders at a the point x 0, then the series.

Definition: Let f(x) be a function of one variable with continuous derivatives of all orders at a the point x 0, then the series. 2.4 Local properties o unctions o several variables In this section we will learn how to address three kinds o problems which are o great importance in the ield o applied mathematics: how to obtain the

More information

Learning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding

Learning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding Learning outcomes Palettes and GIF CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Learn how images are represented using a palette Get an overview of hiding techniques in

More information

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts Jan Kodovský and Jessica Fridrich Department of ECE, Binghamton University, NY, USA {fridrich,jan.kodovsky}@binghamton.edu

More information

FREQUENCY DOMAIN SINGULAR VALUE DECOMPOSITION FOR EFFICIENT SPATIAL AUDIO CODING. Sina Zamani, Tejaswi Nanjundaswamy, Kenneth Rose

FREQUENCY DOMAIN SINGULAR VALUE DECOMPOSITION FOR EFFICIENT SPATIAL AUDIO CODING. Sina Zamani, Tejaswi Nanjundaswamy, Kenneth Rose FREQUENCY DOMAIN SINGULAR VALUE DECOMPOSITION FOR EFFICIENT SPATIAL AUDIO CODING Sina Zamani, Tejaswi Nanjundaswamy, Kenneth Rose Department o Electrical and Computer Engineering, University o Caliornia

More information

Imperfect Stegosystems

Imperfect Stegosystems DISSERTATION DEFENSE Imperfect Stegosystems Asymptotic Laws and Near-Optimal Practical Constructions Tomá² Filler Dept. of Electrical and Computer Engineering SUNY Binghamton, New York April 1, 2011 2

More information

arxiv: v2 [cs.sd] 15 May 2017

arxiv: v2 [cs.sd] 15 May 2017 FREQUENCY DOMAIN SINGULAR VALUE DECOMPOSITION FOR EFFICIENT SPATIAL AUDIO CODING Sina Zamani, Tejaswi Nanjundaswamy, Kenneth Rose Department o Electrical and Computer Engineering, University o Caliornia

More information

Survey of JPEG compression history analysis

Survey of JPEG compression history analysis Survey of JPEG compression history analysis Andrew B. Lewis Computer Laboratory Topics in security forensic signal analysis References Neelamani et al.: JPEG compression history estimation for color images,

More information

Steganalysis with a Computational Immune System

Steganalysis with a Computational Immune System DIGITAL FORENSIC RESEARCH CONFERENCE Steganalysis with a Computational Immune System By Jacob Jackson, Gregg Gunsch, Roger Claypoole, Gary Lamont Presented At The Digital Forensic Research Conference DFRWS

More information

Reliability Assessment with Correlated Variables using Support Vector Machines

Reliability Assessment with Correlated Variables using Support Vector Machines Reliability Assessment with Correlated Variables using Support Vector Machines Peng Jiang, Anirban Basudhar, and Samy Missoum Aerospace and Mechanical Engineering Department, University o Arizona, Tucson,

More information

Mathematical Notation Math Calculus & Analytic Geometry III

Mathematical Notation Math Calculus & Analytic Geometry III Mathematical Notation Math 221 - alculus & Analytic Geometry III Use Word or WordPerect to recreate the ollowing documents. Each article is worth 10 points and should be emailed to the instructor at james@richland.edu.

More information

Supplementary Information Reconstructing propagation networks with temporal similarity

Supplementary Information Reconstructing propagation networks with temporal similarity Supplementary Inormation Reconstructing propagation networks with temporal similarity Hao Liao and An Zeng I. SI NOTES A. Special range. The special range is actually due to two reasons: the similarity

More information

Improvement of Sparse Computation Application in Power System Short Circuit Study

Improvement of Sparse Computation Application in Power System Short Circuit Study Volume 44, Number 1, 2003 3 Improvement o Sparse Computation Application in Power System Short Circuit Study A. MEGA *, M. BELKACEMI * and J.M. KAUFFMANN ** * Research Laboratory LEB, L2ES Department o

More information

APPENDIX 1 ERROR ESTIMATION

APPENDIX 1 ERROR ESTIMATION 1 APPENDIX 1 ERROR ESTIMATION Measurements are always subject to some uncertainties no matter how modern and expensive equipment is used or how careully the measurements are perormed These uncertainties

More information

TESTING TIMED FINITE STATE MACHINES WITH GUARANTEED FAULT COVERAGE

TESTING TIMED FINITE STATE MACHINES WITH GUARANTEED FAULT COVERAGE TESTING TIMED FINITE STATE MACHINES WITH GUARANTEED FAULT COVERAGE Khaled El-Fakih 1, Nina Yevtushenko 2 *, Hacene Fouchal 3 1 American University o Sharjah, PO Box 26666, UAE kelakih@aus.edu 2 Tomsk State

More information

Digital Image Processing. Lecture 6 (Enhancement) Bu-Ali Sina University Computer Engineering Dep. Fall 2009

Digital Image Processing. Lecture 6 (Enhancement) Bu-Ali Sina University Computer Engineering Dep. Fall 2009 Digital Image Processing Lecture 6 (Enhancement) Bu-Ali Sina University Computer Engineering Dep. Fall 009 Outline Image Enhancement in Spatial Domain Spatial Filtering Smoothing Filters Median Filter

More information

«Develop a better understanding on Partial fractions»

«Develop a better understanding on Partial fractions» «Develop a better understanding on Partial ractions» ackground inormation: The topic on Partial ractions or decomposing actions is irst introduced in O level dditional Mathematics with its applications

More information

A Brief Survey on Semi-supervised Learning with Graph Regularization

A Brief Survey on Semi-supervised Learning with Graph Regularization 000 00 002 003 004 005 006 007 008 009 00 0 02 03 04 05 06 07 08 09 020 02 022 023 024 025 026 027 028 029 030 03 032 033 034 035 036 037 038 039 040 04 042 043 044 045 046 047 048 049 050 05 052 053 A

More information

Capacity-Approaching Codes for Reversible Data Hiding

Capacity-Approaching Codes for Reversible Data Hiding Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang 1,2,BiaoChen 1, and Nenghai Yu 1, 1 Department of Electrical Engineering & Information Science, University of Science and Technology

More information

Steganalysis in JPEG

Steganalysis in JPEG Steganalysis in JPEG CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2007 Dr Hans Georg Schaathun Steganalysis in JPEG Spring 2007 1 / 24 Learning Outcomes learn additional

More information

arxiv:quant-ph/ v2 12 Jan 2006

arxiv:quant-ph/ v2 12 Jan 2006 Quantum Inormation and Computation, Vol., No. (25) c Rinton Press A low-map model or analyzing pseudothresholds in ault-tolerant quantum computing arxiv:quant-ph/58176v2 12 Jan 26 Krysta M. Svore Columbia

More information

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton,

More information

DUE to the ease of tampering a multimedia file, forensics

DUE to the ease of tampering a multimedia file, forensics 774 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 4, APRIL 2016 Information Theoretical Limit of Media Forensics: The Forensicability Xiaoyu Chu, Member, IEEE, Yan Chen, Senior

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

Diversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels

Diversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels Diversity-Fidelity Tradeo in Transmission o Analog Sources over MIMO Fading Channels Mahmoud Taherzadeh, Kamyar Moshksar and Amir K. Khandani Coding & Signal Transmission Laboratory www.cst.uwaterloo.ca

More information

2. ETA EVALUATIONS USING WEBER FUNCTIONS. Introduction

2. ETA EVALUATIONS USING WEBER FUNCTIONS. Introduction . ETA EVALUATIONS USING WEBER FUNCTIONS Introduction So ar we have seen some o the methods or providing eta evaluations that appear in the literature and we have seen some o the interesting properties

More information

Complexity and Algorithms for Two-Stage Flexible Flowshop Scheduling with Availability Constraints

Complexity and Algorithms for Two-Stage Flexible Flowshop Scheduling with Availability Constraints Complexity and Algorithms or Two-Stage Flexible Flowshop Scheduling with Availability Constraints Jinxing Xie, Xijun Wang Department o Mathematical Sciences, Tsinghua University, Beijing 100084, China

More information

Caching Policy Optimization for Video on Demand

Caching Policy Optimization for Video on Demand Caching Policy Optimization or Video on Demand Hao Wang, Shengqian Han, and Chenyang Yang School o Electronics and Inormation Engineering, Beihang University, China, 100191 Email: {wang.hao, sqhan, cyyang}@buaa.edu.cn

More information

MPSteg-color: a new steganographic technique for color images

MPSteg-color: a new steganographic technique for color images MPSteg-color: a new steganographic technique for color images Giacomo Cancelli, Mauro Barni Università degli Studi di Siena Dipartimento di Ingegneria dell Informazione, Italy {cancelli,barni}@dii.unisi.it

More information

Feasibility of a Multi-Pass Thomson Scattering System with Confocal Spherical Mirrors

Feasibility of a Multi-Pass Thomson Scattering System with Confocal Spherical Mirrors Plasma and Fusion Research: Letters Volume 5, 044 200) Feasibility o a Multi-Pass Thomson Scattering System with Conocal Spherical Mirrors Junichi HIRATSUKA, Akira EJIRI, Yuichi TAKASE and Takashi YAMAGUCHI

More information

Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients

Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients Thanh Hai Thai, Rémi Cogranne, Florent Retraint ICD - ROSAS - LMS - Troyes University of Technology - UMR 68, CNRS Troyes - France

More information

Midterm Summary Fall 08. Yao Wang Polytechnic University, Brooklyn, NY 11201

Midterm Summary Fall 08. Yao Wang Polytechnic University, Brooklyn, NY 11201 Midterm Summary Fall 8 Yao Wang Polytechnic University, Brooklyn, NY 2 Components in Digital Image Processing Output are images Input Image Color Color image image processing Image Image restoration Image

More information

Application of Wavelet Transform Modulus Maxima in Raman Distributed Temperature Sensors

Application of Wavelet Transform Modulus Maxima in Raman Distributed Temperature Sensors PHOTONIC SENSORS / Vol. 4, No. 2, 2014: 142 146 Application o Wavelet Transorm Modulus Maxima in Raman Distributed Temperature Sensors Zongliang WANG, Jun CHANG *, Sasa ZHANG, Sha LUO, Cuanwu JIA, Boning

More information

CHAPTER 1: INTRODUCTION. 1.1 Inverse Theory: What It Is and What It Does

CHAPTER 1: INTRODUCTION. 1.1 Inverse Theory: What It Is and What It Does Geosciences 567: CHAPTER (RR/GZ) CHAPTER : INTRODUCTION Inverse Theory: What It Is and What It Does Inverse theory, at least as I choose to deine it, is the ine art o estimating model parameters rom data

More information

Syllabus Objective: 2.9 The student will sketch the graph of a polynomial, radical, or rational function.

Syllabus Objective: 2.9 The student will sketch the graph of a polynomial, radical, or rational function. Precalculus Notes: Unit Polynomial Functions Syllabus Objective:.9 The student will sketch the graph o a polynomial, radical, or rational unction. Polynomial Function: a unction that can be written in

More information

This is a repository copy of The effect of quality scalable image compression on robust watermarking.

This is a repository copy of The effect of quality scalable image compression on robust watermarking. This is a repository copy of The effect of quality scalable image compression on robust watermarking. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/7613/ Conference or Workshop

More information

A UNIFIED FRAMEWORK FOR MULTICHANNEL FAST QRD-LS ADAPTIVE FILTERS BASED ON BACKWARD PREDICTION ERRORS

A UNIFIED FRAMEWORK FOR MULTICHANNEL FAST QRD-LS ADAPTIVE FILTERS BASED ON BACKWARD PREDICTION ERRORS A UNIFIED FRAMEWORK FOR MULTICHANNEL FAST QRD-LS ADAPTIVE FILTERS BASED ON BACKWARD PREDICTION ERRORS César A Medina S,José A Apolinário Jr y, and Marcio G Siqueira IME Department o Electrical Engineering

More information

Image Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT

Image Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT Image Data Compression Steganography and steganalysis 1 Stenography vs watermarking Watermarking: impercep'bly altering a Work to embed a message about that Work Steganography: undetectably altering a

More information

9.1 The Square Root Function

9.1 The Square Root Function Section 9.1 The Square Root Function 869 9.1 The Square Root Function In this section we turn our attention to the square root unction, the unction deined b the equation () =. (1) We begin the section

More information

Basic mathematics of economic models. 3. Maximization

Basic mathematics of economic models. 3. Maximization John Riley 1 January 16 Basic mathematics o economic models 3 Maimization 31 Single variable maimization 1 3 Multi variable maimization 6 33 Concave unctions 9 34 Maimization with non-negativity constraints

More information

The achievable limits of operational modal analysis. * Siu-Kui Au 1)

The achievable limits of operational modal analysis. * Siu-Kui Au 1) The achievable limits o operational modal analysis * Siu-Kui Au 1) 1) Center or Engineering Dynamics and Institute or Risk and Uncertainty, University o Liverpool, Liverpool L69 3GH, United Kingdom 1)

More information

Two-step self-tuning phase-shifting interferometry

Two-step self-tuning phase-shifting interferometry Two-step sel-tuning phase-shiting intererometry J. Vargas, 1,* J. Antonio Quiroga, T. Belenguer, 1 M. Servín, 3 J. C. Estrada 3 1 Laboratorio de Instrumentación Espacial, Instituto Nacional de Técnica

More information

CinChE Problem-Solving Strategy Chapter 4 Development of a Mathematical Algorithm. partitioning. procedure

CinChE Problem-Solving Strategy Chapter 4 Development of a Mathematical Algorithm. partitioning. procedure Development o a Mathematical Algorithm Transormation Process Mathematical Model partitioning procedure Mathematical Algorithm The mathematical algorithm is a plan (or blueprint) that identiies the independent

More information

New Steganographic scheme based of Reed- Solomon codes

New Steganographic scheme based of Reed- Solomon codes New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;

More information

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,

More information

AH 2700A. Attenuator Pair Ratio for C vs Frequency. Option-E 50 Hz-20 khz Ultra-precision Capacitance/Loss Bridge

AH 2700A. Attenuator Pair Ratio for C vs Frequency. Option-E 50 Hz-20 khz Ultra-precision Capacitance/Loss Bridge 0 E ttenuator Pair Ratio or vs requency NEEN-ERLN 700 Option-E 0-0 k Ultra-precision apacitance/loss ridge ttenuator Ratio Pair Uncertainty o in ppm or ll Usable Pairs o Taps 0 0 0. 0. 0. 07/08/0 E E E

More information

Detecting LSB Matching by Applying Calibration Technique for Difference Image

Detecting LSB Matching by Applying Calibration Technique for Difference Image Detecting LSB atching by Applying Calibration Technique for Difference Image iaolong Li Institute of Computer Science & Technology Peking University 87, Beijing, P. R. China lixiaolong@icst.pku.edu.cn

More information

Finger Search in the Implicit Model

Finger Search in the Implicit Model Finger Search in the Implicit Model Gerth Stølting Brodal, Jesper Sindahl Nielsen, Jakob Truelsen MADALGO, Department o Computer Science, Aarhus University, Denmark. {gerth,jasn,jakobt}@madalgo.au.dk Abstract.

More information

INPUT GROUND MOTION SELECTION FOR XIAOWAN HIGH ARCH DAM

INPUT GROUND MOTION SELECTION FOR XIAOWAN HIGH ARCH DAM 3 th World Conerence on Earthquake Engineering Vancouver, B.C., Canada August -6, 24 Paper No. 2633 INPUT GROUND MOTION LECTION FOR XIAOWAN HIGH ARCH DAM CHEN HOUQUN, LI MIN 2, ZHANG BAIYAN 3 SUMMARY In

More information

Research Article Function Synthesis Algorithm of RTD-Based Universal Threshold Logic Gate

Research Article Function Synthesis Algorithm of RTD-Based Universal Threshold Logic Gate Applied Mathematics Volume 5, Article ID 8757, 7 pages http://dx.doi.org/.55/5/8757 Research Article Function Synthesis Algorithm o RTD-Based Universal Threshold Logic Gate Maoqun Yao, Kai Yang, Congyuan

More information

On Adjacent Vertex-distinguishing Total Chromatic Number of Generalized Mycielski Graphs. Enqiang Zhu*, Chanjuan Liu and Jin Xu

On Adjacent Vertex-distinguishing Total Chromatic Number of Generalized Mycielski Graphs. Enqiang Zhu*, Chanjuan Liu and Jin Xu TAIWANESE JOURNAL OF MATHEMATICS Vol. xx, No. x, pp. 4, xx 20xx DOI: 0.650/tjm/6499 This paper is available online at http://journal.tms.org.tw On Adjacent Vertex-distinguishing Total Chromatic Number

More information

Digital Image Watermarking Algorithm Based on Wavelet Packet

Digital Image Watermarking Algorithm Based on Wavelet Packet www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department

More information

Scattered Data Approximation of Noisy Data via Iterated Moving Least Squares

Scattered Data Approximation of Noisy Data via Iterated Moving Least Squares Scattered Data Approximation o Noisy Data via Iterated Moving Least Squares Gregory E. Fasshauer and Jack G. Zhang Abstract. In this paper we ocus on two methods or multivariate approximation problems

More information

Behavior and Design of Angle Column

Behavior and Design of Angle Column Behavior and Design o Angle Column Ricardo Junqueira Justiniano Instituo Superior Técnico, Universidade de Lisboa Abstract This thesis presents a study on the behavior and design o short to medium single

More information

WIND energy is a renewable energy source. It has

WIND energy is a renewable energy source. It has or Standalone Wind Energy Conversion Systems Hoa M. Nguyen, Member, IAENG and D. S. Naidu. Abstract This paper presents a direct uzzy adaptive control or standalone Wind Energy Conversion Systems (WECS)

More information

ROC Curves for Steganalysts

ROC Curves for Steganalysts ROC Curves for Steganalysts Andreas Westfeld Technische Universität Dresden Institut für Systemarchitektur 01062 Dresden mailto:westfeld@inf.tu-dresden.de 1 Introduction There are different approaches

More information

Combining Classifiers and Learning Mixture-of-Experts

Combining Classifiers and Learning Mixture-of-Experts 38 Combining Classiiers and Learning Mixture-o-Experts Lei Xu Chinese University o Hong Kong Hong Kong & Peing University China Shun-ichi Amari Brain Science Institute Japan INTRODUCTION Expert combination

More information

The Impact of Carries on the Complexity of Collision Attacks on SHA-1

The Impact of Carries on the Complexity of Collision Attacks on SHA-1 The Impact o Carries on the Complexity o Collision Attacks on SHA-1 Florian Mendel, Norbert Pramstaller, Christian Rechberger and Vincent Rijmen Norbert.Pramstaller@iaik.tugraz.at Institute or Applied

More information

Estimation of Human Emotions Using Thermal Facial Information

Estimation of Human Emotions Using Thermal Facial Information Estimation o Human Emotions Using Thermal acial Inormation Hung Nguyen 1, Kazunori Kotani 1, an Chen 1, Bac Le 2 1 Japan Advanced Institute o Science and Technology, 1-1 Asahidai, Nomi, Ishikawa, Japan

More information