Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification

Size: px
Start display at page:

Download "Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification"

Transcription

1 Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp , 2018 Improved Lossless Data Hdng for JPEG Images Based on Hstogram Modfcaton Yang Du 1, Zhaoxa Yn 1, 2, * and Xnpeng Zhang 3 Abstract: Ths paper proposes a lossless and hgh payload data hdng scheme for JPEG mages by hstogram modfcaton. The most n JPEG btstream conssts of a sequence of VLCs (varable length codes) and the appended bts. Each VLC has a correspondng RLV (run/length value) to record the AC/DC coeffcents. To acheve lossless data hdng wth hgh payload, we shft the hstogram of VLCs and modfy the DHT segment to embed data. Snce we sort the hstogram of VLCs n descendng order, the flesze expanson s lmted. The paper s key contrbuton ncludes: Lossless data hdng, less flesze expanson n dentcal pay-load and hgher embeddng effcency. Keywords: Lossless, data hdng, hstogram, VLC, JPEG. 1 Introducton Data hdng s a technque for hdng secret message nto dgtal cover, whch can serve as authentcaton watermarkng, annotaton, and secret data for covert transmsson. Wth the rapd development of computer technology, data hdng s wdely used n mltary, commercal, medcal, fnancal, etc. As a branch of data hdng, there are many new steganography algorthms proposed n recent years [Zhang, Qn, Zhang et al. (2018); Ma, Luo, L et al. (2018); Wang, L, Sh et al. (2017)]. In some applcatons, lke medcal mage system, mltary documents and multmeda archve management, any dstorton s ntolerable after data embeddng. Therefore, the reversble data hdng (RDH) methods are proposed. Recently some reversble data hdng algorthms have been proposed, such as the dfference expanson scheme [Tan (2003)] and the hstogram shftng (HS) algorthm [N, Sh, Ansar et al. (2006)]. As a sgnfcant branch n RDH, recently more and more HS-based data hdng methods are proposed [L, Yang and Zeng (2011); Wang, L, Sh et al. (2017); L, Zhang, Gu et al. (2017)]. For example, L et al. [L, Yang and Zeng (2011)] can exactly classfy the smooth and rough pxels by usng the local complexty parameter, and then adaptvely embed the data bts nto them. Snce the smooth pxels can be embedded wth more data on average, a better performance can be obtaned at the very hgh capacty. Wang et al. [Wang, N, Zhang et al. (2017)] further 1 Key Laboratory of Intellgent Computng & Sgnal Processng, Mnstry of Educaton, Anhu Unversty, Hefe, , P.R. Chna. 2 Department of Computer Scence, Purdue Unversty, West lafayette, 47906, USA. 3 School of Communcaton and Informaton Engneerng, Shangha Unversty, Shangha , P.R. Chna. * Correspondng Author: Zhaoxa Yn. Emal: ynzhaoxa@ahu.edu.cn. CMC. do: /cmc

2 496 Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp , 2018 mproved the optmal bn-selecton mechansm by usng a developed rate and dstorton model and can gve a good embeddng performance wth low complexty by narrowng down the soluton space. L et al. [L, Zhang, Gu et al. (2017)] proposed the multple hstograms modfcaton (MHM) technque and took the expanson bns of hstograms as parameters. Snce the modfcaton manner on each hstogram can be dfferent, the overall modfcatons could be optmzed by adaptng the parameters to the statstcal propertes of hstograms. However, all of these HS-based methods [N, Sh, Ansar et al. (2006); L, Yang and Zeng (2011); Wang, L, Sh et al. (2017); L, Zhang, Gu et al. (2017)] ntroduced above are desgned for spatal doman and cannot be appled to compressed mages drectly. JPEG s the most popular fle format n relaton to dgtal mages, whch compress the mage data effectvely. Therefore, we focus on lossless data hdng based on hstogram shftng for JPEG mages. However, above HS-based methods cannot be appled to JPEG mages drectly. Consder the less redundancy, modfcaton-senstve and ncreased flesze, RDH for JPEG mages s more dffcult than uncompressed mages. Xuan et al. [Xuan, Sh, N et al. (2007)] proposed a HS-based method for JPEG mages by embeddng data nto the JPEG quantzed 8 8 block DCT coeffcents. Xuan et al. s method can obtan hgh-payload and unnotceable flesze extenson but the stego mage s dstorted. Huang et al. proposed a new HS-based method [Huang, Qu, Km et al. (2016)] that zero coeffcents reman unchanged and only coeffcents wth values 1 and - 1 are expanded to carry message bts n. Recently, Qan and Zhang proposed a lossless and flesze preserved scheme [Qan and Zhang (2012)] n JPEG btstream by VLC-mappng. They acheved the goal of lossless embeddng by replacng the orgnal VLC by a new VLC and mappng the new VLC to the same RLV. Snce the orgnal VLC and the new VLC correspondng to the same RLV, the decoded mage qualty s no dstorton entrely. To embed hgh capacty secret data, nspred by Qan and Zhang s method [Qan and Zhang (2012)], Lu et al. [Lu, Chang, Ln et al. (2016)] proposed a HS-based method for JPEG mages, whch modfy the VLCs n JPEG btstream drectly. They count all the VLCs usage and generate the hstogram of the RLVs whch correspondng to the VLCs. Then modfy the orgnal VLC accordng to the secret data drectly. Although the embeddng capacty s expanded, there are two problems exst n Lu et al. s method [Lu, Chang, Ln et al. (2016)]. The frst problem s that only modfyng the VLC drectly n the entropy-coded data wll cause the decoded results occur error. Another problem s the X-axs of hstogram generated accordng to Lu et al. s method [Lu, Chang, Ln et al. (2016)] s not logcal. In other words, the adjacent X-values of hstogram are no correlaton. To solve the two problems, we propose a novel HS-based method and modfy the JPEG fle header to preserve the mage qualty wth no dstorton as Qan et al. s method [Qan and Zhang (2012)]. In addton, snce we sort the RLVs n terms of the correspondng VLCs frequency n the entropy-coded data, the stego mage flesze s closer to cover mage than Lu et al. s method [Lu, Chang, Ln et al. (2016)]. The rest of ths paper s organzed as follows. Secton 2 brefly ntroduces the structure of JPEG mages and Lu et al. s method [Lu, Chang, Ln et al. (2016)]. Secton 3 presents the proposed scheme n

3 Improved Lossless Data Hdng for JPEG Images 497 detal. Detal expermental results wth analyss and comparsons are gven n Secton 4. Secton 5 concludes the paper. 2 Related works Snce the proposed method works on JPEG btstream, the knowledge of JPEG mage structure s requred. Furthermore, nspred by Lu et al. s method [Lu, Chang, Ln et al. (2016)], we proposed a lossless and reversble data hdng method. Thus, we ntroduce the structure of JPEG mage at frst and Lu et al. s method [Lu, Chang, Ln et al. (2016)]. 2.1 The structure of JPEG btstream A JPEG mage conssts of a sequence of segments, each begnnng wth a marker. Each marker begns wth a 0xFF byte followed by a byte ndcatng what knd of marker t s. For example, the DHT (Defne Huffman Table) segment begns wth 0xFFD8 and the SOS (Start of Scan) segment begns wth 0xFFDA. The structure of JPEG mage s shown n Fg. 1. Fgure 1: The structure of the JPEG btstream Accordng to the JPEG gudelne, after some preprocessng works, the pxels n the mage are transformed nto AC/DC coeffcents. To compress the mage flesze, the AC coeffcents are encoded n Run-Length encodng format as ntermedate symbols, (Run, Length) and (Ampltude). Further, to mprove the compresson rate, (Run, Length) s encoded n the format of VLC, and (Ampltude) s encoded n VLI (Varable Length Integer) format. The DHT segment contans the Canoncal Huffman table nformaton, whch s used for obtanng the VLCs. Each VLC s corresponded to a specfc RLV that represents an AC coeffcent n entropy-coded data. The VLCs are encoded by Canoncal Huffman code, for nstance, f the run/length value s 0/4, the correspondng VLC s For AC coeffcents of lumnance component, 162 dfferent VLCs are corresponded to the run/length value from 0/1 to F/A accompaned wth 0/0 (End of Block) and F/0 (Zero Run Length). The length of VLC s between 2 to 16 bts.

4 498 Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp , 2018 Accordng to JPEG gudelne, f only change the VLC, the decoded results would be dfferent compared wth the cover mage s decoded results. Ths s due to the VLC s correspondng RLV has changed, whch affects the decoded results. To preserve the run/sze not changed after the replacement of the correspondng VLC, we modfy the DHT segment. 2.2 Lu et al. s method To obtan hgh embeddng capacty for JPEG mages, Lu et al. [Lu, Chang, Ln et al. (2016)] proposed a data embeddng method based on hstogram modfcaton n entropycoded data, whch dfferent from VLC mappng-based proposed by Qan et al. [Qan and Zhang (2012)]. The detal embeddng steps can be summarzed as follows: Input: An orgn JPEG btstream and a secret btstream. Output: A stego JPEG btstream, p and z. Step 1: Parse the JPEG mage and extract all the used-vlcs and unused-vlcs. Generate the hstogram of run/sze whch begns wth 0/0 and ends wth F/A. The Y-axs n the hstogram represents the occurrence number of each run/sze s correspondng VLC n the entropy-coded data. Step 2: Fnd a peak pont p and a zero pont z and save the values of p and z as overhead nformaton. The zero pont z s the nearest zero pont to p. Step 3: Scan all of the VLCs n the entropy-coded data sequentally. Shft all the run/length values to rght by one unt between p and z (not ncludng p and z). For nstance, the run/length 0/2, 0/3, 0/4 and 0/5 are shfted to 0/3, 0/4, 0/5 and 0/6. The correspondng VLC wll be changed accordng to the shfted run/length. For nstance, the VLC= 1011 (correspondng run/length value s 0/4 ), wll be changed to (correspondng run/length value s 0/5 ). Once the VLC that corresponds to run/length value equal to p s attaned, replace the VLC or not depend to the secret bt that wll be embedded. If the secret bt s 0, the VLC wll be mantaned and f the secret bt s 1, the VLC wll be replaced by another VLC that corresponds to the run/length value equals to p+1. Step 4: Generate a stego JPEG btstream. After the above steps, a stego JPEG btstream s generated. However, the stego JPEG btstream wll cause the results occur error durng JPEG decodng. Ths s because only VLCs n the entropy-coded data are modfed. The sze value of the modfed VLC s correspondng RLV s not equal to the length of orgnal appended bts. In addton, the RLV sortng manner s also not optmal for the hstogram of RLV. Because the VLC uses Huffman codng so sortng by VLC code length order can make the fle expanson generated after embeddng data effectvely reduce. Based on the above analyss, we propose an mproved lossless data hdng scheme for JPEG mages. 3 Proposed method Inspred by Qan et al. s scheme [Qan and Zhang (2012)], our method modfed the DHT segment of JPEG header based on Lu et al. s scheme [Lu, Chang, Ln et al. (2016)], resultng n a normal JPEG mage decodng and no dstorton of mage qualty. Thus, t s

5 Improved Lossless Data Hdng for JPEG Images 499 a lossless data hdng scheme. At the same tme, the fle expanson of the secret JPEG btstream s sgnfcantly reduced from that of Huang et al. [Huang, Qu, Km et al. (2016)] and Lu et al. [Lu, Chang, Ln et al. (2016)] and the performance s better than the above. The overall framework of the proposed method s depcted n Fg. 2, ncludng the data embeddng process and extracton process. The detals of the proposed method and the procedures of data embeddng and extracton are presented n the followng subsectons severally. Fgure 2: The overall framework of the proposed method 3.1 Lossless data embeddng based on hstogram modfcaton The hstogram establshment process of our method s dfferent from that of Lu et al. [Lu, Chang, Ln et al. (2016)]. Before generatng the hstogram, all VLCs n the entropy-coded data are frst extracted and ther frequency of occurrence s counted. Accordng to the order of the RLVs n the DHT segment, a hstogram of frequency dstrbutons of VLCs s generated. We use the Baboon mage wth a qualty factor of 80 as an example and compare t wth Lu et al. s hstogram establshment scheme [Lu, Chang, Ln et al. (2016)]. Fg. 3 s a hstogram of frequency dstrbuton of VLC. Fgure 3: The orgnal hstogram of VLCs ( Baboon mage, QF=80)

6 500 Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp , Optmzaton of RLV orderng Consderng that, the encoder default Huffman code table s used n the JPEG fle header, whch s not the optmal Huffman code table for the current mage. Therefore, there are stll encodng redundances that cannot be gnored n JPEG mages. To reduce unnecessary encodng redundances as much as possble, we adjusted the order of the RLVs accordng to the feature of the Huffman codng before the hstogram was modfed. The strategy we adopted s as follows: 1. Fnd the peak pont p, and then look for the nearest zero pont z from the peak pont p accordng to the frequency dstrbuton nformaton of the VLC n the hstogram. A large number of statstcal results show that p s generally 0/1, whch s the ranked frst RLV n the default Huffman code table. In Fg. 3, p s 0/1 and z s 0/8. 2. Adjust the order of the RLVs correspondng to the VLC between the peak pont p and the zero pont z. After both p and z are determned, theoretcally we can already perform hstogram modfcaton operatons. However, consderng that the rankng of the VLC frequency dstrbuton between the peak pont and the zero pont s not strctly n accordance wth the order of the RLVs n the default Huffman code table, the RLV sequence needs to be optmzed. In other words, we need to readjust the RLV order n the DHT segment accordng to the descendng order of the current VLC frequency dstrbuton. The theoretcal bass for ths s that Huffman codng defnes a shorter code length for frequently occurrng codes, so adjustng the codng sequence based on the current VLC frequency of occurrence s equvalent to optmzng the Huffman codng, whch means that we further reduce encodng redundances. Fg. 4 shows a sorted hstogram wth the Baboon mage wth a qualty factor of 80 as an example. Fgure 4: The sorted hstogram of VLCs ( Baboon mage, QF=80) Before optmzaton, 162 VLCs are dvded nto n categores accordng to code length. The length of the -th category s L, that s: C = { VLC, VLC,..., VLC } (1) 1 2 L

7 Improved Lossless Data Hdng for JPEG Images 501 Reorder the VLC and the correspondng RLV between the peak pont p and the zero pont z accordng to the descendng order, then the VLC between p and z can be recorded as: ( ) ' ( ) ' ( ) ' 1 2 L C ' = { VLC, VLC,..., VLC } (2) ( ) ( ) ( ) 1 2 L ' ' ' Where VLC, VLC,..., VLC s the VLC sequence of the -th category adjusted by descendng orderng. Assume that reduced encodng redundancy s R, and then R can be represented as: nz L = np j= 1 ( ) ' ( ) ( ) j R = num VLC l (3) Where np s equal to the category number of the category where the peak pont s located; nz s equal to the prevous category number of the category where the zero pont s located; l s the code length of VLC correspondng to RLV before modfcaton; ( ) ( ' ) j num VLC denotes the frequency of occurrence of segment. j j ( )' VLC j n the entropy-encoded data Modfcaton of hstogram of VLCs After reorderng the RLVs, we can embed data by hstogram modfcaton. Frst, the RLV between the peak pont and the zero pont s shfted rghtward, e.g. 0/2 s modfed to 0/3. After the rght-shft operaton s completed, the frequency of the nearest VLC to the rght of the peak pont p s 0, that s, the zero pont at ths tme becomes p+1. The followng fgure shows the rght-shfted hstogram of a Baboon mage wth a qualty factor of 80. Fgure 5: The shfted hstogram of VLCs ( Baboon mage, QF=80) Modfcaton of DHT segment In order to ensure that the modfed JPEG mage generated after data embeddng has no dstorton compared to the orgnal mage, we also modfed the RLV sequence n the DHT segment whle rght-shftng the VLC hstogram. Because the RLVs at dfferent postons n the DHT segment correspond to dfferent VLCs, we also shft the RLV n the

8 502 Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp , 2018 correspondng poston by one unt at the same tme accordng to the order n whch the VLC s shfted rght. In ths way, the RLV correspondng to each VLC before and after the hstogram modfcaton s unchanged, whch ensures that the result obtaned by the decodng process s consstent wth the orgnal mage and ensures that the mage s free of any dstorton. In addton, we modfy the RLV wth a value of p+1 to p so that when embeddng data, regardless of embeddng 0 or 1, the RLV correspondng to VLC s p, ensurng that the decodng result s unchanged Calculaton of the total flesze expanson Durng the modfcaton of the hstogram, the flesze expanson s unavodable. Because the length of the VLC may not be equal before and after the rght shft of the RLV, f the modfed VLC s longer than the orgnal VLC, JPEG fle sze wll ncrease. However, because we optmzed the RLV orderng, the VLCs are sorted n descendng order. Only the VLC wth the lowest frequency n each category wll ncrease the code length after modfcaton, so t can effectvely reduce the fle expanson. Formula (4) denotes the fle expanson caused by the modfcaton of the hstogram: nz = np ( ) ' ( L ) ( ) E = num VLC j (4) Where j represents the category number of the next category of C. As mentoned n 3.1.1, the RLV sortng optmzaton s performed before the hstogram s modfed so the encodng redundancy s reduced. Ths part of the reducton s R, then the total fle expanson (FE) can be represented as: nz nz L ( ) ' ( L ) ( ) = np = np j= 1 ( ) ' ( j ) ( ) (5) FE = num VLC j num VLC l 3.2 Data embeddng & extracton Fgure 6: Data embeddng process The process of data embeddng s shown n Fg. 6. The man process of the embeddng phase s as follows: Input: Secret btstream and orgnal JPEG btstream. Output: Modfed JPEG btstream. Step 1: Parse the JPEG entropy-coded segment and the DHT segment and count the frequency of occurrence of each VLC.

9 Improved Lossless Data Hdng for JPEG Images 503 Step 2: The frequency dstrbuton hstogram of the VLC s generated accordng to the order of the RLV values n the DHT segment. The locaton of the peak pont and zero pont are determned based on the length of the secret btstream. Step 3: Reorder the order of the RLVs n the DHT segment accordng to the optmzed Huffman encodng operaton mentoned n 3.1. Then perform hstogram modfcaton operaton and DHT segment modfcaton operaton. Step 4: Scan all the VLCs n the entropy-coded data and modfy the VLC n the entropycoded data accordng to the nformaton that needs to be embedded. When the VLC correspondng to the RLV wth the value of p s scanned, the data embeddng operaton can be performed. If 0 s embedded, the current VLC remans unchanged; f 1 s embedded, the current VLC s modfed to the orgnal VLC that correspond RLV s p+1. The entropy-coded data segment s scanned sequentally untl all the data n the secret btstream are embedded, then generate the modfed JPEG btstream. Fgure 7: Data extracton process The process of data extracton s shown n Fg. 7. The man flow of the secret data extracton and recovery phase s as follows: Input: Modfed JPEG btstream. Output: Secret btstream and orgnal JPEG btstream. Step 1: Parse the DHT segment of the JPEG fle header and calculate the correspondng VLC value accordng to the RLV rankng order. Fnd the frst two VLCs that correspond to the same RLV, namely the peak pont and the nearest zero pont. Step 2: Scan all the VLCs n the entropy-coded data segment and extract all secret data accordng to the peak pont and the length of the secret btstream. Step 3: After the secret data extracton s completed, the modfed RLV sequence s restored to the orgnal state accordng to the default Huffman code table and the correspondng VLC s modfed to generate a recovered JPEG btstream. 4 Expermental results and analyss In order to test the performance of the proposed method and compare wth other two methods, we have tested all the mages from UCID mage database. These mages are converted to grayscale and further compressed to JPEG fles wth dfferent qualty factors. Fg. 8 shows the comparson of the payload and flesze expanson rate (FER) of the three schemes under dfferent qualty factors. Denote the orgnal JPEG stream length as L, the FER can be represented as:

10 504 Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp , 2018 FE FER = 100% L (6) (a) (b) (c) Fgure 8: Comparsons of payload n UCID Image Lbrary wth dfferent qualty factors. (a) QF=70. (b) QF=80. (c) QF=90. (d) QF=100 (d) (a) (b)

11 Improved Lossless Data Hdng for JPEG Images 505 (c) Fgure 9: Comparsons of FER n UCID Image Lbrary wth dfferent qualty factors. (a) QF=70. (b) QF=80. (c) QF=90. (d) QF=100 Accordng to the results n Fg. 8, Huang et al. s method [Huang, Qu, Km et al. (2016)] has the hghest embeddng capacty n full embeddng among the three methods. For the FER, t can be seen from Fg. 9 that the FER of Huang et al. s method [Huang, Qu, Km et al. (2016)] s hgher than other methods. Table 1: Comparson of the three methods (QF=80) Methods Payload(bts) FER (%) PSNR Huang et al. [Huang, Qu, Km et al. (2016)] Lu et al. [Lu, Chang, Ln et al. (2016)] Proposed Table 2: Comparson of the three methods (QF=90) Methods Payload(bts) FER (%) PSNR Huang et al. [Huang, Qu, Km et al. (2016)] Lu et al. [Lu, Chang, Ln et al. (2016)] (d) Proposed Tab. 1 and Tab. 2 respectvely lst the average values of all the ndexes of all three methods when QF=80 and QF=90. The peak sgnal-to-nose rato (PSNR) s an objectve crteron for evaluatng the vsual qualty of the mage between the modfed JPEG mage and the orgnal JPEG mage. The hgher the PSNR value, the hgher the vsual qualty of the modfed JPEG mage. Snce our proposed method has no effect on the mage qualty,.e. lossless, the PSNR value can be regarded as. However, snce Lu et al. s method [Lu, Chang, Ln et al. (2016)] only modfes the value of VLC n the entropy-coded data segment durng hstogram modfcaton, whle the correspondng RLV has not been

12 506 Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp , 2018 modfed, whch means that the addtonal bt nformaton length after VLC does not correspond to the sze value of RLV. The decoder may generate exceptons when decodng. Therefore, PSNR s set to 0. The key pont of our proposed method s lossless, but our method also can obtan hgh payload, whch s not nferor to Huang et al. s RDH method [Huang, Qu, Km et al. (2016)]. In addton, the flesze expanson of our method s acceptable and less than Lu et al. s method. 5 Conclusons In ths paper, a lossless and hgh-payload data hdng scheme for JPEG mages s proposed. After ntroducng the HS-based method n JPEG btstream, we propose a novel method that optmze hstogram modfcaton and modfy the DHT segment to preserve the mage qualty wth no dstorton. After sortng the hstogram and replace the correspondng VLCs, we obtan less flesze expanson. Key contrbuton s lossless, less flesze expanson n dentcal payload. Acknowledgement: Ths research work s partly supported by Natonal Natural Scence Foundaton of Chna ( , , , U , ), CSC Postdoctoral Project ( ), Anhu Provncal Natural Scence Foundaton ( SQF216), Key Program for Excellent Young Talents n Colleges and Unverstes of Anhu Provnce (gxyqzd ), and Anhu unversty research and nnovaton tranng project for undergraduate students. References Huang, F.; Qu, X.; Km, H. J. (2016): Reversble data hdng n JPEG mages. IEEE Transactons on Crcuts and Systems for Vdeo Technology, vol. 26, no. 9, pp L, X.; Yang, B.; Zeng, T. (2011): Effcent reversble watermarkng based on adaptve predcton-error expanson and pxel selecton. IEEE Transactons on Image Processng A Publcaton of the IEEE Sgnal Processng Socety, vol. 20, no. 12, pp L, X.; Zhang, W.; Gu, X.; Yang, B. (2017): Effcent reversble data hdng based on multple hstograms modfcaton. IEEE Transactons on Informaton Forenscs & Securty, vol. 10, no. 9, pp Lu, X. L.; Chang, C. C.; Ln, C. C.; Yuan, S. M. (2016): A hgh-payload, reversble data hdng scheme based on hstogram modfcaton n JPEG btstream. Imagng Scence Journal, vol. 64, no. 7, pp Ma, Y.; Luo, X.; L, X.; Bao, Z.; Zhang, Y. (2018): Selecton of rch model steganalyss features based on decson rough set α-postve regon reducton. IEEE Transactons on Crcuts and Systems for Vdeo Technology. N, Z.; Sh, Y. Q.; Ansar, N.; Su, W. (2006): Reversble data hdng. IEEE Transactons on Crcuts and Systems for Vdeo Technology, vol. 16, no. 3, pp Qan, Z.; Zhang, X. (2012): Lossless data hdng n JPEG btstream. Journal of Systems & Software, vol. 85, no. 2, pp Tan, J. (2003): Reversble data embeddng usng a dfference expanson. IEEE Transactons on Crcuts & Systems for Vdeo Technology, vol. 13, no. 8, pp

13 Improved Lossless Data Hdng for JPEG Images 507 Wang, J.; L, T.; Sh, Y. Q.; Lan, S.; Ye, J. (2017): Forenscs feature analyss n quaternon wavelet doman for dstngushng photographc mages and computer graphcs. Multmeda Tools and Applcatons, vol. 76, no. 22, pp Wang, J.; N, J.; Zhang, X.; Sh, Y. Q. (2017): Rate and dstorton optmzaton for reversble data hdng usng multple hstogram shftng. IEEE Transactons on Cybernetcs, vol. 47, no. 2, pp Xuan, G.; Sh, Y. Q.; N, Z.; Cha, P.; Cu, X. et al. (2007): Reversble data hdng for JPEG mages based on hstogram pars. Image Analyss and Recognton, pp Zhang, Y.; Qn, C.; Zhang, W.; Lu, F.; Luo, X. (2018): On the fault-tolerant performance for a class of robust mage steganography. Sgnal Processng, vol. 146, pp

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000 Novel Pre-Compresson Rate-Dstorton Optmzaton Algorthm for JPEG 2000 Yu-We Chang, Hung-Ch Fang, Chung-Jr Lan, and Lang-Gee Chen DSP/IC Desgn Laboratory, Graduate Insttute of Electroncs Engneerng Natonal

More information

Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms

Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms Reversble Data Hdng Based on Two-level HDWT Coeffcent Hstograms Xu-Ren Luo 1, Chen-Hu Jerry Ln 2 and Te-Lung Y 3 1 Department of Electrcal and Electronc Engneerng, Chung Cheng Insttute of Technology, Natonal

More information

Hiding data in images by simple LSB substitution

Hiding data in images by simple LSB substitution Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT Changqng Zhu 1 Zhwe Wang 2 Y Long 1 Chengsong Yang 2 1 Key Laboratory of Vrtual Geographc Envronment, Nanjng Normal Unversty, Nanjng 210054;2 Insttute

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

A New Evolutionary Computation Based Approach for Learning Bayesian Network

A New Evolutionary Computation Based Approach for Learning Bayesian Network Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang

More information

Regularized Discriminant Analysis for Face Recognition

Regularized Discriminant Analysis for Face Recognition 1 Regularzed Dscrmnant Analyss for Face Recognton Itz Pma, Mayer Aladem Department of Electrcal and Computer Engneerng, Ben-Guron Unversty of the Negev P.O.Box 653, Beer-Sheva, 845, Israel. Abstract Ths

More information

Optimum Reversible Information Hiding Based on Adaptive Joint Processing

Optimum Reversible Information Hiding Based on Adaptive Joint Processing Internatonal Forum on Energy, Envronment and Sustanable Development (IFEESD 2016 Optmum Reversble Informaton Hdng Based on Adaptve Jont Processng Zhe Mao1,a, Ynfa Zhang1, Ln Zhou1, and Tnglong Du2 1 Department

More information

A Novel Quality Measure for Information Hiding in Images

A Novel Quality Measure for Information Hiding in Images A Novel Qualty Measure for Informaton Hdng n s KA Navas Aravnd M SasKumar M Asstant rofessor G student rofessor College Of Engneerng College of Engneerng Maran Engneerng College Trvandrum,Inda Trvandrum,Inda

More information

Introduction to Information Theory, Data Compression,

Introduction to Information Theory, Data Compression, Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Microwave Diversity Imaging Compression Using Bioinspired

Microwave Diversity Imaging Compression Using Bioinspired Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

GEMINI GEneric Multimedia INdexIng

GEMINI GEneric Multimedia INdexIng GEMINI GEnerc Multmeda INdexIng Last lecture, LSH http://www.mt.edu/~andon/lsh/ Is there another possble soluton? Do we need to perform ANN? 1 GEnerc Multmeda INdexIng dstance measure Sub-pattern Match

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

On balancing multiple video streams with distributed QoS control in mobile communications

On balancing multiple video streams with distributed QoS control in mobile communications On balancng multple vdeo streams wth dstrbuted QoS control n moble communcatons Arjen van der Schaaf, José Angel Lso Arellano, and R. (Inald) L. Lagendjk TU Delft, Mekelweg 4, 68 CD Delft, The Netherlands

More information

Reversible Data Hiding under Inconsistent Distortion Metrics

Reversible Data Hiding under Inconsistent Distortion Metrics Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted Content may change pror to fnal publcaton Ctaton nformaton: DOI 009/TIP208285074, IEEE Reversble

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Improvement of Histogram Equalization for Minimum Mean Brightness Error

Improvement of Histogram Equalization for Minimum Mean Brightness Error Proceedngs of the 7 WSEAS Int. Conference on Crcuts, Systems, Sgnal and elecommuncatons, Gold Coast, Australa, January 7-9, 7 3 Improvement of Hstogram Equalzaton for Mnmum Mean Brghtness Error AAPOG PHAHUA*,

More information

Lossless Compression Performance of a Simple Counter- Based Entropy Coder

Lossless Compression Performance of a Simple Counter- Based Entropy Coder ITB J. ICT, Vol. 5, No. 3, 20, 73-84 73 Lossless Compresson Performance of a Smple Counter- Based Entropy Coder Armen Z. R. Lang,2 ITB Research Center on Informaton and Communcaton Technology 2 Informaton

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

Orientation Model of Elite Education and Mass Education

Orientation Model of Elite Education and Mass Education Proceedngs of the 8th Internatonal Conference on Innovaton & Management 723 Orentaton Model of Elte Educaton and Mass Educaton Ye Peng Huanggang Normal Unversty, Huanggang, P.R.Chna, 438 (E-mal: yepeng@hgnc.edu.cn)

More information

The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model

The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model Journal of Computer and Communcatons, 04,, -6 Publshed Onlne July 04 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.436/cc.04.906 The Dgtal Fngerprntng Method for Statc Images Based on Weghted

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Chapter 8 SCALAR QUANTIZATION

Chapter 8 SCALAR QUANTIZATION Outlne Chapter 8 SCALAR QUANTIZATION Yeuan-Kuen Lee [ CU, CSIE ] 8.1 Overvew 8. Introducton 8.4 Unform Quantzer 8.5 Adaptve Quantzaton 8.6 Nonunform Quantzaton 8.7 Entropy-Coded Quantzaton Ch 8 Scalar

More information

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem Appled Mathematcal Scences Vol 5 0 no 65 3 33 Interactve B-Level Mult-Objectve Integer Non-lnear Programmng Problem O E Emam Department of Informaton Systems aculty of Computer Scence and nformaton Helwan

More information

Using Immune Genetic Algorithm to Optimize BP Neural Network and Its Application Peng-fei LIU1,Qun-tai SHEN1 and Jun ZHI2,*

Using Immune Genetic Algorithm to Optimize BP Neural Network and Its Application Peng-fei LIU1,Qun-tai SHEN1 and Jun ZHI2,* Advances n Computer Scence Research (ACRS), volume 54 Internatonal Conference on Computer Networks and Communcaton Technology (CNCT206) Usng Immune Genetc Algorthm to Optmze BP Neural Network and Its Applcaton

More information

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION 1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:

More information

arxiv:cs.cv/ Jun 2000

arxiv:cs.cv/ Jun 2000 Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São

More information

A Fast Computer Aided Design Method for Filters

A Fast Computer Aided Design Method for Filters 2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic Internatonal Journal of Computer Applcatons Technology and Research A New Desgn of Multpler usng Modfed Booth Algorthm and Reversble Gate Logc K.Nagarjun Department of ECE Vardhaman College of Engneerng,

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Negative Binomial Regression

Negative Binomial Regression STATGRAPHICS Rev. 9/16/2013 Negatve Bnomal Regresson Summary... 1 Data Input... 3 Statstcal Model... 3 Analyss Summary... 4 Analyss Optons... 7 Plot of Ftted Model... 8 Observed Versus Predcted... 10 Predctons...

More information

Operating conditions of a mine fan under conditions of variable resistance

Operating conditions of a mine fan under conditions of variable resistance Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Adiabatic Sorption of Ammonia-Water System and Depicting in p-t-x Diagram

Adiabatic Sorption of Ammonia-Water System and Depicting in p-t-x Diagram Adabatc Sorpton of Ammona-Water System and Depctng n p-t-x Dagram J. POSPISIL, Z. SKALA Faculty of Mechancal Engneerng Brno Unversty of Technology Techncka 2, Brno 61669 CZECH REPUBLIC Abstract: - Absorpton

More information

Unified Subspace Analysis for Face Recognition

Unified Subspace Analysis for Face Recognition Unfed Subspace Analyss for Face Recognton Xaogang Wang and Xaoou Tang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, Hong Kong {xgwang, xtang}@e.cuhk.edu.hk Abstract PCA, LDA

More information

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

Lossy Compression. Compromise accuracy of reconstruction for increased compression. Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

DPCM Compression for Real-Time Logging While Drilling Data

DPCM Compression for Real-Time Logging While Drilling Data 28 JOURAL OF SOFTWARE, VOL. 5, O. 3, MARCH 21 DPCM Compresson for Real-Tme Loggng Whle Drllng Data Yu Zhang Modern Sgnal Processng & Communcaton Group, Insttute of Informaton Scence, Bejng Jaotong Unversty,

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

EGR 544 Communication Theory

EGR 544 Communication Theory EGR 544 Communcaton Theory. Informaton Sources Z. Alyazcoglu Electrcal and Computer Engneerng Department Cal Poly Pomona Introducton Informaton Source x n Informaton sources Analog sources Dscrete sources

More information

A Self-embedding Robust Digital Watermarking Algorithm with Blind Detection

A Self-embedding Robust Digital Watermarking Algorithm with Blind Detection Sensors & Transducers Vol 77 Issue 8 August 04 pp 50-55 Sensors & Transducers 04 by IFSA Publshng S L http://wwwsensorsportalcom A Self-embeddng Robust Dgtal Watermarkng Algorthm wth Blnd Detecton Gong

More information

DAta hiding embeds messages into digital multimedia

DAta hiding embeds messages into digital multimedia 1 Reversble Data Hdng n Color Image wth Grayscale Invarance Dongdong Hou, Wemng Zhang, Kejang Chen, San-Jheng Ln and Nengha Yu Abstract Dfferent from all the prevous reversble data hdng schemes, a completely

More information

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl RECURSIVE SPLINE INTERPOLATION METHOD FOR REAL TIME ENGINE CONTROL APPLICATIONS A. Stotsky Volvo Car Corporaton Engne Desgn and Development Dept. 97542, HA1N, SE- 405 31 Gothenburg Sweden. Emal: astotsky@volvocars.com

More information

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for U Charts. Dr. Wayne A. Taylor

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for U Charts. Dr. Wayne A. Taylor Taylor Enterprses, Inc. Adjusted Control Lmts for U Charts Copyrght 207 by Taylor Enterprses, Inc., All Rghts Reserved. Adjusted Control Lmts for U Charts Dr. Wayne A. Taylor Abstract: U charts are used

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Low Complexity Soft-Input Soft-Output Hamming Decoder

Low Complexity Soft-Input Soft-Output Hamming Decoder Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong

More information

Application research on rough set -neural network in the fault diagnosis system of ball mill

Application research on rough set -neural network in the fault diagnosis system of ball mill Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(4):834-838 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 Applcaton research on rough set -neural network n the

More information

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1 A New Metrc for Qualty Assessment of Dgtal Images Based on Weghted-Mean Square Error Proceedngs of SPIE, vol. 4875, 2002 Kawen Zhang, Shuozhong Wang, and Xnpen Zhang School of Communcaton and Informaton

More information

THE SUMMATION NOTATION Ʃ

THE SUMMATION NOTATION Ʃ Sngle Subscrpt otaton THE SUMMATIO OTATIO Ʃ Most of the calculatons we perform n statstcs are repettve operatons on lsts of numbers. For example, we compute the sum of a set of numbers, or the sum of the

More information

Turbulence classification of load data by the frequency and severity of wind gusts. Oscar Moñux, DEWI GmbH Kevin Bleibler, DEWI GmbH

Turbulence classification of load data by the frequency and severity of wind gusts. Oscar Moñux, DEWI GmbH Kevin Bleibler, DEWI GmbH Turbulence classfcaton of load data by the frequency and severty of wnd gusts Introducton Oscar Moñux, DEWI GmbH Kevn Blebler, DEWI GmbH Durng the wnd turbne developng process, one of the most mportant

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

Power Allocation for Distributed BLUE Estimation with Full and Limited Feedback of CSI

Power Allocation for Distributed BLUE Estimation with Full and Limited Feedback of CSI Power Allocaton for Dstrbuted BLUE Estmaton wth Full and Lmted Feedback of CSI Mohammad Fanae, Matthew C. Valent, and Natala A. Schmd Lane Department of Computer Scence and Electrcal Engneerng West Vrgna

More information

AP Physics 1 & 2 Summer Assignment

AP Physics 1 & 2 Summer Assignment AP Physcs 1 & 2 Summer Assgnment AP Physcs 1 requres an exceptonal profcency n algebra, trgonometry, and geometry. It was desgned by a select group of college professors and hgh school scence teachers

More information

A NEW DISCRETE WAVELET TRANSFORM

A NEW DISCRETE WAVELET TRANSFORM A NEW DISCRETE WAVELET TRANSFORM ALEXANDRU ISAR, DORINA ISAR Keywords: Dscrete wavelet, Best energy concentraton, Low SNR sgnals The Dscrete Wavelet Transform (DWT) has two parameters: the mother of wavelets

More information

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling Proceedngs of the World Congress on Engneerng and Computer Scence 007 WCECS 007, October 4-6, 007, San Francsco, USA A Fast Fractal Image Compresson Algorthm Usng Predefned Values for Contrast Scalng H.

More information

Transform Coding. Transform Coding Principle

Transform Coding. Transform Coding Principle Transform Codng Prncple of block-wse transform codng Propertes of orthonormal transforms Dscrete cosne transform (DCT) Bt allocaton for transform coeffcents Entropy codng of transform coeffcents Typcal

More information

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda

More information

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k) ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of

More information

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for P Charts. Dr. Wayne A. Taylor

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for P Charts. Dr. Wayne A. Taylor Taylor Enterprses, Inc. Control Lmts for P Charts Copyrght 2017 by Taylor Enterprses, Inc., All Rghts Reserved. Control Lmts for P Charts Dr. Wayne A. Taylor Abstract: P charts are used for count data

More information

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Sgnal & Image Processng : An Internatonal Journal (SIPIJ) Vol.5, No.4, August 2014 IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Suman Shrestha 1, 2 1 Unversty of Massachusetts Medcal School,

More information

Adaptive Pre-Interpolation Filter for Motion-Compensated Prediction

Adaptive Pre-Interpolation Filter for Motion-Compensated Prediction Adaptve Pre-Interpolaton Flter for Moton-Compensated Predcton Je Dong and Kng Ng Ngan Department of Electronc Engneerng The Chnese Unverst of Hong Kong ISCAS011 Ma 15-18 011 Ro de Janero Brazl Motvaton

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression

Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression Journal of Informaton Securty, 2011, 2, 99-112 do:10.4236/js.2011.23010 Publshed Onlne July 2011 (http://www.scrp.org/journal/js) Audo Watermarkng Usng Wavelet Transform and Genetc Algorthm for Realzng

More information

Three-Phase Distillation in Packed Towers: Short-Cut Modelling and Parameter Tuning

Three-Phase Distillation in Packed Towers: Short-Cut Modelling and Parameter Tuning European Symposum on Computer Arded Aded Process Engneerng 15 L. Pugjaner and A. Espuña (Edtors) 2005 Elsever Scence B.V. All rghts reserved. Three-Phase Dstllaton n Packed Towers: Short-Cut Modellng and

More information

A Network Intrusion Detection Method Based on Improved K-means Algorithm

A Network Intrusion Detection Method Based on Improved K-means Algorithm Advanced Scence and Technology Letters, pp.429-433 http://dx.do.org/10.14257/astl.2014.53.89 A Network Intruson Detecton Method Based on Improved K-means Algorthm Meng Gao 1,1, Nhong Wang 1, 1 Informaton

More information

COMPLEX NUMBERS AND QUADRATIC EQUATIONS

COMPLEX NUMBERS AND QUADRATIC EQUATIONS COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

An Interactive Optimisation Tool for Allocation Problems

An Interactive Optimisation Tool for Allocation Problems An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents

More information

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation Fourth Internatonal Conference on Image and Graphcs Rotaton Invarant Shape Contexts based on Feature-space Fourer Transformaton Su Yang 1, Yuanyuan Wang Dept of Computer Scence and Engneerng, Fudan Unversty,

More information

MDL-Based Unsupervised Attribute Ranking

MDL-Based Unsupervised Attribute Ranking MDL-Based Unsupervsed Attrbute Rankng Zdravko Markov Computer Scence Department Central Connectcut State Unversty New Brtan, CT 06050, USA http://www.cs.ccsu.edu/~markov/ markovz@ccsu.edu MDL-Based Unsupervsed

More information

Research Article Green s Theorem for Sign Data

Research Article Green s Theorem for Sign Data Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

Variability-Driven Module Selection with Joint Design Time Optimization and Post-Silicon Tuning

Variability-Driven Module Selection with Joint Design Time Optimization and Post-Silicon Tuning Asa and South Pacfc Desgn Automaton Conference 2008 Varablty-Drven Module Selecton wth Jont Desgn Tme Optmzaton and Post-Slcon Tunng Feng Wang, Xaoxa Wu, Yuan Xe The Pennsylvana State Unversty Department

More information

One-sided finite-difference approximations suitable for use with Richardson extrapolation

One-sided finite-difference approximations suitable for use with Richardson extrapolation Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

29th Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

29th Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies TESTING THE SPECTRAL DECONVOLUTION ALGORITHM TOOL (SDAT) WITH XE SPECTRA Steven R. Begalsk, Kendra M. Foltz Begalsk, and Derek A. Haas The Unversty of Texas at Austn Sponsored by Army Space and Mssle Defense

More information

Change Detection: Current State of the Art and Future Directions

Change Detection: Current State of the Art and Future Directions Change Detecton: Current State of the Art and Future Drectons Dapeng Olver Wu Electrcal & Computer Engneerng Unversty of Florda http://www.wu.ece.ufl.edu/ Outlne Motvaton & problem statement Change detecton

More information

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

CSE4210 Architecture and Hardware for DSP

CSE4210 Architecture and Hardware for DSP 4210 Archtecture and Hardware for DSP Lecture 1 Introducton & Number systems Admnstratve Stuff 4210 Archtecture and Hardware for DSP Text: VLSI Dgtal Sgnal Processng Systems: Desgn and Implementaton. K.

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

Second Order Analysis

Second Order Analysis Second Order Analyss In the prevous classes we looked at a method that determnes the load correspondng to a state of bfurcaton equlbrum of a perfect frame by egenvalye analyss The system was assumed to

More information

High-Speed Decoding of the Binary Golay Code

High-Speed Decoding of the Binary Golay Code Hgh-Speed Decodng of the Bnary Golay Code H. P. Lee *1, C. H. Chang 1, S. I. Chu 2 1 Department of Computer Scence and Informaton Engneerng, Fortune Insttute of Technology, Kaohsung 83160, Tawan *hpl@fotech.edu.tw

More information