Signature-Embedding In Printed Documents For Security and Forensic Applications

Size: px
Start display at page:

Download "Signature-Embedding In Printed Documents For Security and Forensic Applications"

Transcription

1 Signature-Ebedding In Printed Docuents For Security and Forensic Applications Aravind K. Miilineni a, Gazi N. Ali a, Pei-Ju Chiang b George T. C. Chiu b, Jan P. Allebach a, Edward J. Delp a a School of Electrical and Coputer Engineering b School of Mechanical Engineering Purdue University, West Lafayette, Indiana USA ABSTRACT Despite the increase in eail and other fors of digital counication, the use of printed docuents continues to increase every year. Many types of printed docuents need to be secure or traceable to the printer that was used to print the. Exaples of these include identity docuents (e.g. passports) and docuents used to coit a crie. Traditional protection ethods such as special ins, security threads, or hologras, can be cost prohibitive. The goals of our wor are to securely print and trace docuents on low cost consuer printers such as injet and electrophotographic (laser) printers. We will accoplish this through the use of intrinsic and extrinsic features obtained fro odelling the printing process. Specifically we show that the banding artifact in the EP print process can be viewed as an intrinsic feature of the printer used to identify both the odel and ae of the device. Methods for easuring and extracting the banding signals fro docuents are presented. The use of banding as an extrinsic feature is also explored. Keywords: docuent security, secure printing, printer identification, banding. INTRODUCTION In today s digital world securing different fors of content is very iportant in ters of protecting copyright and verifying authenticity. Many ethods 7 have been developed to protect audio, video, digital docuents, iages, and progras (executable code). In this paper, we will be concerned with the securing of printed docuents, which we will refer to as docuents. The securing of docuents is not new. In 282 AD physical paper waterars began to appear. 8 These were created by placing thin wires in the old used to create the paper. The purpose of these ars is to identify the paper aer or the specific old used to create the paper. By the early eighteenth century these types of waterars started to appear in ban notes to deter counterfeiting and also on regular parchent to designate a tradear or a particular date or place. Today, paper wateraring is still used as can be seen in ost ban notes and soe official docuents, but it is usually accopanied by other security features. Security fibers or threads can be ebedded within the paper or woven into it during anufacture. Special ins which change color or react to certain cheicals which ight be used to rear a docuent have been proposed. 9 Additionally, new ethods using ebedded hologras, or icrotext are being introduced. These ethods are used to verify the authenticity of a docuent and usually do not carry any other inforation. For ore detail on these types of security features see 2. In digital data hiding, any inforation (a waterar), such as copyright and owner inforation, can be ebedded within a edia data eleent such as an iage or video sequence. 4 The waterar could be visible or non-visible, but in either case should be easily recoverable fro the waterared data. 5 Additionally the waterar ust be able to survive if the host data is anipulated., 3 We believe that a aring schee analogous to digital wateraring but for docuents is very iportant. Printed aterial is a direct accessory to any criinal and terrorist acts. Exaples include forgery or alteration This research was supported by a grant fro the National Science Foundation, under Award Nuber Address all correspondence to E. J. Delp at ace@ecn.purdue.edu

2 of docuents used for purposes of identity, security, or recording transactions. In addition, printed aterial ay be used in the course of conducting illicit or terrorist activities. Exaples include instruction anuals, tea rosters, eeting notes, and correspondence. In both cases, the ability to identify the device or type of device used to print the aterial in question would provide a valuable aid for law enforceent and intelligence agencies. We also believe that average users need to be able to print secure docuents, for exaple boarding passes and ban transactions. The proble is that the use of special papers, special ins, or hologras can be cost prohibitive. Most of these techniques either require special equipent to ebed the security features, or are siply too expensive for an average consuer. Additionally, there are a nuber of applications in which it is desirable to be able to identify the technology, anufacturer, odel, or even specific unit that was used to print a given docuent. We propose to develop two strategies for printer identification based on exaining a printed docuent. The first strategy is passive. It involves characterizing the printer by finding intrinsic features in the printed docuent that are characteristic of that particular printer, odel, or anufacturer s products. We shall refer to this as the intrinsic signature. The intrinsic signature requires an understanding and odelling of the printer echanis, and the developent of analysis tools for the detection of the signature in a printed page with arbitrary content. The second strategy is active. We ebed an extrinsic signature in a printed page. This signature is generated by odulating the process paraeters in the printer echanis to encode identifying inforation such as the printer serial nuber and date of printing. To detect the extrinsic signature we use the tools developed for intrinsic signature detection. We will use our nowledge of the printer echanis and the results of the printer characterization to deterine the printer process paraeters that can be odulated to encode the desired identifying inforation. The odulation of these paraeters will require odification of the printer echanis. 2.. Hiding Data in Text 2. OTHER APPROACHES Various ethods for securing docuents have been developed. One of the earliest ethods for securing printed text involves the shifting of eleents in a text docuent as described in 4 6. In this approach, ethods are described for providing copyright protection for text docuents by ebedding inforation specific to the recipient or source in order to deter illegal distribution. The ethods developed to encode this inforation into each page involve the shifting of textual eleents in the docuent by aounts iperceptible to the huan viewer to encode individual bits of data. These textual eleents can be lines, words, or individual characters. With line shifting, every other line is shifted slightly up or down, approxiately /6th inch, to encode a one or zero. To detect the shifts in a docuent, no prior inforation about the original is necessary since the inforation is ebedded by shifting every other line. The baseline locations can be estiated in the scanned docuent and by easuring the relative distances between the baselines of adjacent text lines an estiate of the ebedded data can be found. It is shown that this type of encoding is robust to scan-print attacs and photocopy generation loss, although soe variability in the detection arises due to errors in the scan process such as rotation. Another detection ethod for line shifting, ore robust to iaging errors such as scan rotation, is the use of the relative distance between centroids of adjacent lines of text. For this detection ethod the original docuent is needed in order to properly decode the inforation because the centroids are dependent on the content on each text line. Word and character coding allow ore data to be ebedded into a page of text, but are not as robust as line coding due to the fact that each shift is encoded in a saller portion of the printed page. Also ost word processors will vary the spacing between adjacent words and characters, so estiation of the shifts using the differential ethod used for lines will not wor in this case unless the original docuent is also available. These shifts could instead be used as a fragile waterar to detect alterations to a docuent. One ajor drawbac to these feature shifting ethods is that they are easily defeated. An attacer can siply scan the docuent and use readily available tools to extract and reforat the text, reoving any shifts, and reprint it without the encoded inforation.

3 2.2. Hiding Data with Halftone Patterns The previous ethod deals with encoding inforation in text, but docuents ay also have halftone iages. Halftoning is the process of converting a continuous tone iage into an iage having only a finite nuber of levels, typically 2 for printed iages. 7 When viewed fro a distance, these iages reseble the original. Nuerous ethods have been developed for wateraring halftone iages. Most of these ethods involve odifying the halftone patterns used when printing the iage. The three basic ethods are the use of ultiple dithering atrices, conjugate halftone screens, or angular variation of the halftone screen. 8 In the first ethod, the dithering atrix changes fro tile to tile and can be used to encode inforation. Detection involves easuring the statistical properties of the halftone patterns and their variation across the iage. The second ethod involves conjugate halftone screens, two screens are used to for two halftone iages and the data are ebedded through the correlations between two screens. 8 The third basic ethod involves encoding the data in the angular orientation of the screen in each halftone cell. In this case, each angular orientation can represent ultiple bits depending on the nuber of angles the halftone screen can be generated and detected at. Another recent ethod of data hiding with halftone patterns has been described in 9 in which waterars are ebedded in duplex printed pages such that when the page is held up to a light source a fae waterar will appear. This ethod relies on halftone iages that are printed opposite each other on either side of the page. This technique requires a high degree of control over the registration of each side of the docuent to ae sure the halftone patterns line up. A siilar technique is also described in 2 which can be used for one sided printing with verification using a transparent screen Data Hiding with Wateraring Techniques for Continuous Tone Iages 4, 5, 7 Wateraring iages in docuents can also be done using continuous tone iage wateraring techniques. These ethods first ebed a waterar into the continuous tone iage and then print it at a high resolution to create the docuent. To detect the waterar, the docuent is scanned and transfored bac into a continuous tone iage after which an appropriate ethod for detecting the waterar is used. The type of waterar ebedded has to be one that can survive the print-scan process when viewed as an attac channel. The wateraring ethod described in 2 23 has been shown to be very robust against any types of attacs, including the print-scan attac and those involving global affine or local non-linear transforations. Being able to survive these two types of transforations is iportant because a docuent ight be wrinled or torn. First a copressed and encrypted essage is encoded into a reference waterar creating a sall bloc. The bloc is then flipped and irrored to create a acrobloc consisting of 4 copies of the original bloc. The purpose of the flipping is to visually decorrelate the ebedding structure and also to assist in later estiation of local non-linear transforations. The acrobloc is then tiled and ebedded into the iage which is then printed. An autocorrelation detection schee as described in 24 can be used to estiate any global affine transforations that have been applied to the scanned docuent. Local non-linear transforations can then be estiated using a siilar ethod within each acrobloc. Until recently, none of the ethods which waterar continuous tone iages before printing have explicitly taen into account the printing process itself. The ethod described in 25 jointly optiizes the printed iage quality and the detectability of the waterar. This approach uses direct binary search (DBS) halftoning 26 and a spread spectru waterar. 27 The halftoned iage is odeled as a bitap. Because the detection process relies on a reconstructed continuous tone version of the docuent, and not the specific halftone patterns used in its creation, there are ultiple bitaps of the sae waterared iage which will yield good detection results. Assuing that the bitap iage is M N pixels, there are then 2 MN possible bitaps, only a subset of which will visually reseble the original iage data and siultaneously allow detection of the waterar. Each of these bitaps will differ in visual quality and the goal is to pic the one which best axiizes both visual quality and waterar detectability. This is achieved by using a odified version of DBS such that at each iteration both the waterar detectability and perceptual iage quality etrics are used to jointly optiize the halftone iage. This ethod is shown to be ore robust against any coon iage processing operations such as JPEG copression and histogra equalization when copared to prior ethods which do not tae into account the printing process.

4 3. OUR APPROACH At Purdue University we are developing forensic signatures for consuer printers based on nowledge of the printer process and the analysis of printed docuents resulting fro a given printer. Our intention is to develop these ethods for both injet (IJ) and electrophotographic (EP or laser) printers. We believe that secure printing is based on the concept that the printer output, the docuent, is an effective eans for identifying features of the printer. These features, which are printer specific, can be used for docuent security. For exaple, in the case of a suspected forgery we ideally should be able to tell what type of printer was used to create the docuent. In our wor at Purdue the focus is on extracting features fro the docuent and developing ethods to securely hide inforation in docuents based on these features. We propose to develop, 3 two strategies for printer identification: intrinsic and extrinsic signatures. We are developing iage analysis techniques to extract features fro a printed docuent that can be used as an intrinsic signature. The intrinsic signature will be detected by scanning the printed page with a high resolution scanner and treating it as a high resolution iage. We will then extract features fro the iage and use the to classify the docuent with respect to the printer. We will then use the features that describe the intrinsic signature to design the extrinsic signature. In contrast to currently used docuent wateraring ethods which ebed the waterar into the docuent before it is printed, we propose to create the waterar by odifying the print process, this is the extrinsic signature. This will be accoplished by odulating the process paraeters in the printer echanis to encode identifying inforation such as the printer serial nuber and date of printing. We believe that oving this ebedding step into the printer hardware will deter possible attepts to odify the hidden inforation before it is printed. If these steps were instead handled by a print driver or soe other software beforehand, then a alicious user could reverse engineer the ebedding software and re-engineer it to suit his own needs. 4. BANDING IN EP PRINTING Our current wor has focused on intrinsic feature detection of EP (laser) printers. In order to gain insight into the types of features that can be used to describe these printers, an understanding of the EP printing process is necessary. The first thing to note is that in the printed output fro any printer there exist defects caused by electroechanical fluctuations or iperfections in the print echanis. 3 Because these print quality defects are directly related to the printer echanis, they can also be viewed as an intrinsic signature or feature of the printer. 4.. Banding as an Intrinsic Feature Figure shows a side view of a typical EP printer. The print process has six steps. The first step is to uniforly charge the optical photoconductor (OPC) dru. Next a laser scans the dru and discharges specific locations on the dru. The discharged locations on the dru attract toner particles which are then attracted to the paper which has an opposite charge. Next the paper with the toner particles on it passes through a fuser and pressure roller which elt and peranently affix the toner to the paper. Finally a blade or brush cleans any excess toner fro the OPC dru. In EP printing, the ajor artifact in the printed output is banding which is defined as the artifacts that are due to quasiperiodic fluctuations in process direction paraeters in the printer. These are priarily due to fluctuations in the angular velocity of the OPC dru and result in non-unifor scan line spacing. This causes a corresponding fluctuation in developed toner on the printed page. 28 The appearance of the banding artifact is alternating light and dar bands perpendicular to the process direction (the direction the paper passes through the printer). The ain cause of banding is electroechanical fluctuations in the printer echanis, ostly fro gear baclash. Because these fluctuations are related to the gearing, the banding frequencies present in the printed page should directly reflect echanical properties of the printer. To easure the banding frequencies of an EP printer, idtone graylevel patches created with a line fill pattern were printed and analyzed. 3 Figure 2 shows a 25% line fill pattern. This pattern was printed on a set of EP printers and then each patttern was scanned at 24dpi. Each scanned iage, ig(i, j), was then projected

5 Cleaning Blade Charge Roller /6 inch 3/6 inch A Laser Bea F Fused Toner Particles Fuser Roller E OPC Dru D B C Developer Roller Paper Pressure Roller Process Direction Transfer Roller Figure. Diagra of the EP process: (A) charging, (B) exposure, (C) developent, (D) transfer, (E) fusing, (F) cleaning Figure 2. Midtone pattern 25% fill used for banding characterization horizontally to produce proj(i) = j ig(i, j) shown in Figure 3a. A Fourier analysis of the projection was then obtained and shown in Figure 3b which shows spies at 32 cycles/inch and 5 cycles/inch. Table shows a list of printers and their principle banding frequencies as found by this ethod. 6.3 x 5 Horizontal Projection of 25% Fill Pattern fro HP lj6mp 8 x 5 FFT of Projection of 25% Fill Patch for HP lj6mp proj(i) Aplitude (graylevels) i Frequency (cycles/inch) (a) Projection of 25% fill patern fro HP lj6mp (b) FFT of the projection showing peas at 32 and 5 cycles/inch Figure 3. Projection and FFT analysis of 25% fill pattern printed on HP lj6mp Detection and easureent of the banding signal in docuents with large idtone regions, such as those with graphic art, can easily be done using ethods siilar to that used to produce Table. Our interest is to be able to detect these signals in text. This will require a different processing technique due to the low SNR of the banding signal with respect to the text and because of the liited nuber of cycles of the banding signal which can be captured in the length of one text character Banding Modelling and Analysis In this section we will describe our odel of banding and our initial analysis approach. Our ultiate goal is to reliably detect the banding frequencies fro a standard printed page. We believe it is iportant in soe of our forensic applications to be able to do this without using specific test docuents Banding Modelling Our odel is shown in Figure 4. Two paths are shown in this figure, one for processing actual docuents, and another for processing ideal docuents. These are referred to as the actual path and the ideal path respectively.

6 Printer Model Principal Banding Frequencies (cycles/inch) HP LaserJet 5MP 37, 74 HP LaserJet 6MP 32, 5 HP LaserJet 27, 69 HP LaserJet 2 69 HP LaserJet 45 5, Sasung ML-45 6, 32,, 6 Table. Banding Frequencies for Several Printers. y actual (i,j) n^actual (i,j) Print Scan Morphological Filter Run Extractor Run Analysis PS File b ideal (i) PS > TIFF Add Ideal Banding Morphological Filter Run Extractor Run Analysis n ideal (i,j) y ideal (i,j) n^ideal (i,j) Figure 4. Banding Analysis Model A rando docuent generator is used to generate full page text docuents that we will use to characterize the printer. We used a odified version of a Marov chain rando text generator 29 (the Money ) which we trained on text available fro the Gutenberg project. 3 We used The Adventures of Sherloc Holes by Sir Arthur Conan Doyle. The progra first estiates the conditional probabilities of all the characters in the training data fro order to order 4. It then generates a user specified length of text following these transition probabilities and produces output into a L A TEX foratted file to allow easy foratting and conversion into PostScript (PS). We refer to this syste as the Forensic Money Text Generator (FMTG). Following the actual path, we start with a PS representation of a docuent generated using the FMTG described above. The PS file is first sent to a printer which will create the printed docuent. This docuent is then scanned at 24dpi and stored as a TIFF iage which is then processed to estiate the banding frequencies. The ideal path is used to construct a siple odel of the banding process and gain soe insight into how the banding anifests itself in the printed docuent. The PS representation of the docuent is first converted using ghostview into a TIFF iage at 24dpi, the sae resolution as is used in the scan step on the actual path. This iage can be thought of as the ideal text, n ideal (i, j), since it is binary with the bacground having graylevel, or white, and the text having graylevel 255, or blac. It is assued that =white and 255=blac. Next an ideal banding signal is added to the ideal text to generate the iage y ideal (i, j) which will be the ideal representation of the output of the scan process in the actual path. All processing and analysis is perfored on 2x2 pixel blocs. Figure 5 shows a bloc of ideal text. Let { n ideal 253, n (i, j) = ideal (i, j) belongs to a text character (), else where text characters have a graylevel of 253 and the bacground has graylevel. The reason for choosing not to represent the graylevel of the text as 255 will becoe apparent when we add the ideal banding signal. The origin is defined as the top-left corner of the bloc with the i axis going downward and the j axis going toward the right.

7 j ideal Current Slice n (i,596) 3 Slice n ideal (i,596) of Ideal Text n ideal (i,j) Inside of letter o 25 Graylevel 253 i Graylevel (=white 255=blac) 2 5 Top of letter o Botto of letter o 5 Top of letter l Botto of letter l n ideal (i,j), 2x2 pixel Bloc of Ideal Iage i Figure 5. 2x2 pixel bloc of ideal text Figure 6. Slice fro a bloc of ideal text Each bloc is then broen into slices n ideal (i) for fixed j, an exaple of which is shown in Figure 6 corresponding to the 596th slice ared in Figure 5. Within each slice we define runs, r ideal (), which are sections of the slice that are part of a text character and long enough to capture at least one cycle of the sallest banding frequency to be estiated. The subscript denotes the run nuber, starting with = for the first run in slice, and ending with the last run in slice 2. The index denotes the position in the run starting fro =. Next we add an ideal banding signal to n ideal (i, j) to create y ideal (i, j), the ideal representation of a bloc of text in the actual path. We will assue that the printer in the ideal path is an HP lj5mp, and that only the 37 cycles/inch banding signal is present. Figure 7 shows an ideal banding signal with an aplitude of 2 graylevels and frequency 37 cycles per inch as defined by b ideal (i) = a sin(2πf i ), (2) dpi where a is the aplitude in graylevels, f is the frequency in cycles/inch, and dpi is the resolution of the signal in dots per inch. This signal only varies in the i direction because, as stated earlier, the banding signal is a print defect in the process direction only. The addition of the banding signal to the ideal bloc of text is a special process. The signal only anifests itself in printed areas eaning that in the case of the ideal text bloc it will only appear on top of a text character and not in the white bacground areas. To for the banded iage, y ideal (i, j), the following operation is perfored, { y ideal n (i, j) = ideal (i, j) + b(i), if n ideal (i, j) = 253 n ideal (3) (i, j), else where the banding signal is added only in printed areas. Figure 8 shows the sae slice seen in Figure 6 but now with the added banding signal. Figure 9a shows the banded run fro this slice. The average value of the run is approxiately 253, and the banding signal itself is seen as a graylevel variation between 25 and Banding Analysis Since it is the banding signal that is of interest, a easure of the SNR between the banding signal and the noise, which in this case is the text, ight give soe insight into what estiation techniques should be used. To siplify the situation, we will only exaine a single slice. Additionally we will assue that the text character profile is a square pulse with width 5 pixels and that the spacing between lines, or character profiles in the slice, is 3 pixels. This is representative of 2point text. Since the banding signal only appears in printed areas, we can safely exaine a single 5 pixel run containing the profile of one text charater. The SNR is the ratio of

8 3 Ideal Banding Signal b(i)=a*sin(2*π*i*f/dpi), f=37(cycles/inch), dpi=24(dots/inch) 3 ideal ideal ideal Slice y (i,596) = n (i,596) b (i) Graylevel 255 Inside of letter o 2 25 Graylevel 25 Aplitude (in Graylevels) Graylevel (=white 255=blac) 2 5 Top of letter o One Run r ideal () length 222 Botto of letter o 2 5 Top of letter l Botto of letter l i i Figure 7. Ideal banding signal with aplitude 2 and frequency 37 cycles/inch Figure 8. Slice fro a bloc of ideal text with banding signal the energy in the banding signal divided by the energy in the text profile. SNR = E banding E textprofile = 5 i= b2 (i) 5 = i= 2532 Clearly trying to extract the signal directly fro the slices will be probleatic, hence we process the runs instead of the slices. Extracting the runs fro the ideal text is trivial since the text and bacground graylevel values are well defined. The siplest ethod in this case is to use a thresholding technique to loo for runs of pixels whose values are greater than. For actual text this will not wor since the edges of the text are not well defined and the bacground is not unifor graylevel. To reedy this proble, we first process the bloc of text with a 5x5 close-open orphological filter. This operation will produce a as which ars the locations of the text characters with graylevel 255, and the bacground with graylevel. This as is then used to extract the runs and their locations are then apped bac onto the original bloc for analysis. Starting with the extracted run fro an ideal slice, such as that shown in Figure 9a, first the ean of the run is reoved foring () = r ideal () E[r ideal ()]. (5) r ideal The ean shift reoves the DC coponent of the signal, as shown in Figure 9b. Next the signal is windowed using a raised cosine window foring r ideal w () = r ideal () cos(π (4) N π 2 ) (6) where N is the length of the run r ideal. Again the ean is subtracted fro the signal to reove its DC coponent to for r ideal w () = r ideal w () E[r ideal w ()]. (7) This process of preparing each run for frequency analysis is shown in Figure 9 along with the FFT of r ideal w (). In this ideal case a pea is clearly seen centered at cycles/inch, very near to the actual ebedded banding frequency of 37 cycles/inch. This sae ethodology is used to analyze actual text in our initial experients. Figure shows a bloc of actual text as well as a closeup of the letter l fro the first line of text in the bloc. Notice in these iages that the actual text is very noisy and the characters and bacground are not unifor in graylevel. Shown in Figure are three runs fro this text bloc. The sharp pea in the first run, and the sharp dip in the second run correspond to an excess and deficiency of developed toner on the docuent. The first run has a pea near the expected banding frequency of 37 cycles/inch although the axiu aplitude was easured at 2.56

9 Plot of Run r ideal () fro y ideal (i,596), ean= Plot of Run r ideal, () 3 Plot of Windowed Run r ideal, w () and Raised Cosine Window length 222, ean= Aplitude (in Graylevels) 2 5 Aplitude (in Graylevels) Aplitude (in Graylevels) (a) (b) (c) 3 ideal w Plot of Windowed Run r.4 ideal w One sided Fourier Transfor of r (), axiu at cycles/inch 2.2 Aplitude (in Graylevels) Aplitude Frequency (cycles/inch) (d) (e) Figure 9. Processing of runs: a) Original Run r ideal (), b) r ideal () = r ideal cos(π π ), d) N 2 rideal w () = r ideal w () E[r ideal w ], e) FFT of r ideal w () () E[r ideal ], c) r ideal w () = r ideal () (a) (b) Figure. a) Bloc of text fro HP lj5mp b) Letter l fro first line cycles/inch. The second run has a pea located at 28.3 cycles/inch. The third run has a pea at approxiately 42 cycles/inch. Fro our analysis of the runs in actual text, we believe that it is possible to estiate the banding frequency using our odel. We are currently exaining wea signal detection ethods for extracting the banding frequency.

10 Graylevel r 5 (), location i=58 j=898, length 2, ean=.848e Graylevel r 5 (), location i=88 j=473, length 2, ean= e Graylevel r 2 (), location i=85 j=478, length 22, ean=.84366e (a) (b) (c) Aplitude R 'w' 5 (f), location i=58 j=898, length 2 ax cpi Frequency (cycles/inch) Aplitude R 'w' 5 (f), location i=88 j=473, length 2 ax cpi Frequency (cycles/inch) Aplitude R 'w' 2 (f), location i=85 j=478, length 22 ax cpi Frequency (cycles/inch) (d) (e) (f) Figure. a-c) Runs fro actual text Figure a, d-f) Corresponding FFT of the processed runs a-c 4.3. Banding as an Extrinsic Signature We have also exained the possibility of using banding as an extrinsic feature. Prior wor has been reported on reducing the banding artifacts in the print process by controlling either the OPC dru velocity itself or 28, 3 odulating the laser pulse width as a function of the OPC dru velocity. In the first ethod, a closed loop controller varies the velocity of the otor controlling the OPC dru based on the real tie velocity that is easured using an encoder. The second ethod uses the fact that the velocity of the OPC dru dictates the scan line spacing assuing that the laser scanning speed is constant. When the OPC dru velocity is low, the scan lines are closer together and so the pulse width is decreased to reduce the aount of developed toner on the printed docuent. When the OPC dru velocity is high, the scan lines will be further apart and so the pulse width is increased to increase the aount of developed toner on the printed docuent. Both ethods have been shown to wor very well. Using either of the banding reduction ethods, it would be possible to odulate any existing banding frequencies in the print process to encode inforation. Additionally we can inject arbitrary artificial banding frequencies into a docuent. We have been successful in ebedding artificial banding frequencies into a docuent by using the first ethod. Because of the electroechanical liitations iposed by the otor controlling the OPC, we have not been able to inject frequencies higher than 5 cycles/inch. We are currently woring with the second ethod which should allow the injection of frequencies above cycles/inch. 5. CONCLUSION Using print quality defects as an intrinsic signature of a printer is possible as shown for banding artifacts in EP printers. We believe that by successfully extracting the banding features fro a docuent it is possible to classify the docuent based on the specific ae and odel of device which created it. We need to better odel this process by eploying ore sophisticated statistical analysis tools.

11 REFERENCES. E. J. Delp, Is your docuent safe: An overview of docuent and print security, Proceedings of the IS&T International Conference on Non-Ipact Printing, San Diego, California, Septeber A. M. Esicioglu and E. J. Delp, An overview of ultiedia content protection in consuer electronics devices, Signal Processing : Iage Counication, vol. 6, pp , A. M. Esicioglu, J. Town, and E. J. Delp, Security of digital entertainent content fro creation to consuption, Signal Processing : Iage Counication, vol. 8, no. 4, pp , April C. I. Podilchu and E. J. Delp, Digital wateraring: Algoriths and applications, IEEE Signal Processing Magazine, vol. 8, no. 4, pp , July M. Barni, C. I. Podilchu, F. Bartolini, and E. J. Delp, Waterar ebedding: hiding a signal within a cover iage, IEEE Counications Magazine, vol. 39, no. 8, pp. 2 8, August B. Macq, J. Dittann, and E. J. Delp, Bencharing of iage wateraring algoriths for digital rights anageent, Proceedings of the IEEE, 24, to appear in. 7. R. W. Wolfgang, C. I. Podilchu, and E. J. Delp, Perceptual waterars for digital iages and video, Proceedings of the IEEE, vol. 87, no. 7, July 999, pp I. J. Cox, M. L. Miller, and J. A. Bloo, Digital Wateraring. San Francisco, CA: Morgan Kaufann Publishers, R. L. van Renesse, Paper based docuent security - a review, IEE European Conference on Security and Detection, no. 437, pp. 75 8, April J. Picard, Digital authentication with copy detection patterns, Proceedings of the SPIE International Conference on Optical Security and Counterfeit Deterrence Techniques V, vol. 53, January 24.. R. Steenbli and M. Hurt, Unison (t) icrooptic security fil, Proceedings of the SPIE International Conference on Optical Security and Counterfeit Deterrence Techniques V, vol. 53, January R. L. Renesse, Optical Docuent Security. Boston: Artech House, G. N. Ali, P.-J. Chiang, A. K. Miilineni, J. P. Allebach, G. T. Chiu, and E. J. Delp, Intrinsic and extrinsic signatures for inforation hiding and secure printing with electrophotographic devices, Proceedings of the IS&T International Conference on Non-Ipact Printing, vol. 9, New Orleans, LA, Septeber 23, pp J. T. Brassil, S. Low, and N. F. Maxechu, Copyright protection for the electronic distribution of text docuents, Proceedings of the IEEE, vol. 87, no. 7, July 999, pp J. T. Brassil, S. Low, N. F. Maxechu, and L. O Goran, Electronic aring and identification techniques to discourage docuent copying, IEEE Journal on Selected Areas in Counication, vol. 3, no. 8, pp , October S. H. Low and N. F. Maxechu, Capacity of text aring channel, IEEE Signal Processing Letters, vol. 7, no. 2, pp , Deceber T. N. Pappas, J. P. Allebach, and D. L. Neuhoff, Model-based digital halftoning, IEEE Signal Processing Magazine, vol. 2, no. 4, pp. 4 27, July M. S. Fu and O. C. Au, Data hiding wateraring for halftone iages, IEEE Transactions on Iage Processing, vol., no. 4, pp , April G. Shara and S. Wang, Show-through wateraring of duplex printed docuents, Proceedings of the SPIE International Conference on Security, Steganography, and Wateraring of Multiedia Contents VI, vol. 536, January Z. Fan, Inforation ebedding using two-layer conjugate screening, Proceedings of the SPIE International Conference on Optical Security and Counterfeit Deterrence Techniques V, vol. 53, January S. V. Voloshynovsiy, F. Deguillaue, and T. Pun, Multibit digital wateraring robust against local nonlinear geoetrical distortions, Proceedings of the IEEE International Conference on Iage Processing, pp , October , Content adaptive wateraring based on a stochastic ultiresolution iage odeling, Proceedings of the European Signal Processing Conference, Septeber 2.

12 23. S. V. Voloshynovsiy, F. Deguillaue, S. Pereira, and T. Pun, Optial adaptive diversity wateraring with channel state estiation, Proceedings of the SPIE International Conference on Security and Wateraring of Multiedia Contents III, vol. 434, San Jose, California, August 2, pp F. Deguillaue, S. V. Voloshynovsiy, and T. Pun, Method for the estiation and recovering fro general affine transfors in digital wateraring applications, Proceedings of the SPIE International Conference on Security and Wateraring of Multiedia Contents IV, vol. 4675, April 22, pp D. Kacer and J. P. Allebach, Joint halftoning and wateraring, IEEE Transactions on Signal Processing, vol. 5, no. 4, pp , April D. J. Lieberan and J. P. Allebach, A dual interpretation for direct binary search and its iplications for tone reproduction and texture quality, IEEE Transactions on Iage Processing, vol. 9, no., pp , Noveber I. J. Cox, J. Kilian, F. T. Leighton, and T. Shaoon, Secure spread spectru wateraring for ultiedia, IEEE Transactions on Iage Processing, vol. 6, no. 2, pp , Deceber G.-Y. Lin, J. M. Grice, J. P. Allebach, G. T.-C. Chiu, W. Bradburn, and J. Weaver, Banding artifact reduction in electrophotographic printers by using pulse width odulation, Journal of Iaging Science and Technology, vol. 46, no. 4, pp , July/August T. McConnell. (999) Money: a arov chain rando text generating progra. [Online]. Available: tc/ 3. [Online]. Available: 3. C.-L. Chen and G. T.-C. Chiu, Banding reduction in electrophotographic process, Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, vol., July 2, pp

Survey of Scanner and Printer Forensics at Purdue University

Survey of Scanner and Printer Forensics at Purdue University Survey of Scanner and Printer Forensics at Purdue University Nitin Khanna, Aravind K. Mikkilineni, George T.-C. Chiu, Jan P. Allebach, and Edward J. Delp Purdue University, West Lafayette IN 47907, USA

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

Physics 211: Lab Oscillations. Simple Harmonic Motion.

Physics 211: Lab Oscillations. Simple Harmonic Motion. Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.

More information

SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp

SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS Nitin Khanna and Edward J. Delp Video and Image Processing Laboratory School of Electrical and Computer Engineering Purdue University West Lafayette,

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

The Virtual Spring Mass System

The Virtual Spring Mass System The Virtual Spring Mass Syste J. S. Freudenberg EECS 6 Ebedded Control Systes Huan Coputer Interaction A force feedbac syste, such as the haptic heel used in the EECS 6 lab, is capable of exhibiting a

More information

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box

More information

LCOS Projector WUX500

LCOS Projector WUX500 LCOS Projector WUX500. Main Features - Features newly developed iage engine, with renewed iage processing algorith The WUX500 is a follow-up odel to the WUX450 series. It is a copact installation odel

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

Presentation Safety Legislation and Standards

Presentation Safety Legislation and Standards levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM Eercise 4 IVESTIGATIO OF THE OE-DEGREE-OF-FREEDOM SYSTEM 1. Ai of the eercise Identification of paraeters of the euation describing a one-degree-of- freedo (1 DOF) atheatical odel of the real vibrating

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

Lecture L26-3D Rigid Body Dynamics: The Inertia Tensor

Lecture L26-3D Rigid Body Dynamics: The Inertia Tensor J. Peraire, S. Widnall 16.07 Dynaics Fall 008 Lecture L6-3D Rigid Body Dynaics: The Inertia Tensor Version.1 In this lecture, we will derive an expression for the angular oentu of a 3D rigid body. We shall

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

The Fundamentals of Modal Testing

The Fundamentals of Modal Testing The Fundaentals of Modal Testing Application Note 243-3 Η(ω) = Σ n r=1 φ φ i j / 2 2 2 2 ( ω n - ω ) + (2ξωωn) Preface Modal analysis is defined as the study of the dynaic characteristics of a echanical

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Calculation Method for evaluating Solar Assisted Heat Pump Systems in SAP 2009. 15 July 2013

Calculation Method for evaluating Solar Assisted Heat Pump Systems in SAP 2009. 15 July 2013 Calculation Method for evaluating Solar Assisted Heat Pup Systes in SAP 2009 15 July 2013 Page 1 of 17 1 Introduction This docuent describes how Solar Assisted Heat Pup Systes are recognised in the National

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

6. Time (or Space) Series Analysis

6. Time (or Space) Series Analysis ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

Local Area Network Management

Local Area Network Management Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Identification and Analysis of hard disk drive in digital forensic

Identification and Analysis of hard disk drive in digital forensic Identification and Analysis of hard disk drive in digital forensic Kailash Kuar Dr. Sanjeev Sofat Dr. Naveen Aggarwal Phd(CSE) Student Prof. and Head CSE Deptt. Asst. Prof. CSE Deptt. PEC University of

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

Leak detection in open water channels

Leak detection in open water channels Proceedings of the 17th World Congress The International Federation of Autoatic Control Seoul, Korea, July 6-11, 28 Leak detection in open water channels Erik Weyer Georges Bastin Departent of Electrical

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008 SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting

More information

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)

More information

The Velocities of Gas Molecules

The Velocities of Gas Molecules he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes

More information

High Performance Chinese/English Mixed OCR with Character Level Language Identification

High Performance Chinese/English Mixed OCR with Character Level Language Identification 2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

An Application Research on the Workflow-based Large-scale Hospital Information System Integration

An Application Research on the Workflow-based Large-scale Hospital Information System Integration 106 JOURNAL OF COMPUTERS, VOL. 6, NO. 1, JANUARY 2011 An Application Research on the Workflow-based Large-scale Hospital Inforation Syste Integration Yang Guojun School of Coputer, Neijiang Noral University,

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy

Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy Proceedings of the World Congress on Engineering 0 Vol III WCE 0, July 6-8, 0, London, U.K. Pure Bending Deterination of Stress-Strain Curves for an Aluinu Alloy D. Torres-Franco, G. Urriolagoitia-Sosa,

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

AutoHelp. An 'Intelligent' Case-Based Help Desk Providing. Web-Based Support for EOSDIS Customers. A Concept and Proof-of-Concept Implementation

AutoHelp. An 'Intelligent' Case-Based Help Desk Providing. Web-Based Support for EOSDIS Customers. A Concept and Proof-of-Concept Implementation //j yd xd/_ ' Year One Report ":,/_i',:?,2... i" _.,.j- _,._".;-/._. ","/ AutoHelp An 'Intelligent' Case-Based Help Desk Providing Web-Based Support for EOSDIS Custoers A Concept and Proof-of-Concept Ipleentation

More information

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

Markovian inventory policy with application to the paper industry

Markovian inventory policy with application to the paper industry Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2

More information

Energy Proportionality for Disk Storage Using Replication

Energy Proportionality for Disk Storage Using Replication Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy

More information

CPU Animation. Introduction. CPU skinning. CPUSkin Scalar:

CPU Animation. Introduction. CPU skinning. CPUSkin Scalar: CPU Aniation Introduction The iportance of real-tie character aniation has greatly increased in odern gaes. Aniating eshes ia 'skinning' can be perfored on both a general purpose CPU and a ore specialized

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Meadowlark Optics LCPM-3000 Liquid Crystal Polarimeter Application Note: Determination of Retardance by Polarimetry Tommy Drouillard

Meadowlark Optics LCPM-3000 Liquid Crystal Polarimeter Application Note: Determination of Retardance by Polarimetry Tommy Drouillard Meadowlark Optics LCPM- Liquid Crystal Polarieter Application Note: Deterination of Retardance by Polarietry Toy Drouillard 5 Meadowlark Optics, Inc.. Introduction: The iediate purpose of a polarieter

More information

LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning programme for frontline healthcare managers

LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning programme for frontline healthcare managers Course Code: L024 LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning prograe for frontline healthcare anagers 6 days Green Belt equivalent Are you ready to challenge the status quo and transfor

More information

A Scalable Application Placement Controller for Enterprise Data Centers

A Scalable Application Placement Controller for Enterprise Data Centers W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.

More information

COMBINING CRASH RECORDER AND PAIRED COMPARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMPACTS WITH SPECIAL REFERENCE TO NECK INJURIES

COMBINING CRASH RECORDER AND PAIRED COMPARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMPACTS WITH SPECIAL REFERENCE TO NECK INJURIES COMBINING CRASH RECORDER AND AIRED COMARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMACTS WITH SECIAL REFERENCE TO NECK INJURIES Anders Kullgren, Maria Krafft Folksa Research, 66 Stockhol,

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

Using Bloom Filters to Refine Web Search Results

Using Bloom Filters to Refine Web Search Results Using Bloo Filters to Refine Web Search Results Navendu Jain Departent of Coputer Sciences University of Texas at Austin Austin, TX, 78712 nav@cs.utexas.edu Mike Dahlin Departent of Coputer Sciences University

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find:

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find: HW 2 Proble 4.2 a. To Find: Nuber of vacancies per cubic eter at a given teperature. b. Given: T 850 degrees C 1123 K Q v 1.08 ev/ato Density of Fe ( ρ ) 7.65 g/cc Fe toic weight of iron ( c. ssuptions:

More information

An online sulfur monitoring system can improve process balance sheets

An online sulfur monitoring system can improve process balance sheets Originally appeared in: February 2007, pgs 109-116. Used with perission. An online sulfur onitoring syste can iprove process balance sheets A Canadian gas processor used this technology to eet environental

More information

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web Entity Search Engine: Towards Agile Best-Effort Inforation Integration over the Web Tao Cheng, Kevin Chen-Chuan Chang University of Illinois at Urbana-Chapaign {tcheng3, kcchang}@cs.uiuc.edu. INTRODUCTION

More information

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

Data Set Generation for Rectangular Placement Problems

Data Set Generation for Rectangular Placement Problems Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George

More information

Design, Manufacturing & Analysis of Differential Crown Gear and Pinion for MFWD Axle

Design, Manufacturing & Analysis of Differential Crown Gear and Pinion for MFWD Axle IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) ISSN(e) : 2278-1684, ISSN(p) : 220 4X, PP : 59-66 www.iosrjournals.org Design, Manufacturing & Analysis of Differential Crown Gear and Pinion

More information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,

More information

Optimal Times to Decrease Extraction Rates During Two-Stage Remediation Affected by Rate-Limited Transport Jose A. Saez, Loyola Marymount University

Optimal Times to Decrease Extraction Rates During Two-Stage Remediation Affected by Rate-Limited Transport Jose A. Saez, Loyola Marymount University Optial Ties to Decrease Extraction ates During Two-Stage eediation Affected by ate-liited Transport Jose A. Saez, Loyola Maryount University Abstract Saez and Haron presented a two-stage pup and treat

More information

Endogenous Market Structure and the Cooperative Firm

Endogenous Market Structure and the Cooperative Firm Endogenous Market Structure and the Cooperative Fir Brent Hueth and GianCarlo Moschini Working Paper 14-WP 547 May 2014 Center for Agricultural and Rural Developent Iowa State University Aes, Iowa 50011-1070

More information

Factored Models for Probabilistic Modal Logic

Factored Models for Probabilistic Modal Logic Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois

More information

Partitioned Elias-Fano Indexes

Partitioned Elias-Fano Indexes Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa giuseppe.ottaviano@isti.cnr.it Rossano Venturini Dept. of Coputer Science, University of Pisa rossano@di.unipi.it ABSTRACT The Elias-ano

More information

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food

More information

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.

More information

Quality evaluation of the model-based forecasts of implied volatility index

Quality evaluation of the model-based forecasts of implied volatility index Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor

More information

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received

More information

SAMPLING METHODS LEARNING OBJECTIVES

SAMPLING METHODS LEARNING OBJECTIVES 6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of

More information

Insurance Spirals and the Lloyd s Market

Insurance Spirals and the Lloyd s Market Insurance Spirals and the Lloyd s Market Andrew Bain University of Glasgow Abstract This paper presents a odel of reinsurance arket spirals, and applies it to the situation that existed in the Lloyd s

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

A magnetic Rotor to convert vacuum-energy into mechanical energy

A magnetic Rotor to convert vacuum-energy into mechanical energy A agnetic Rotor to convert vacuu-energy into echanical energy Claus W. Turtur, University of Applied Sciences Braunschweig-Wolfenbüttel Abstract Wolfenbüttel, Mai 21 2008 In previous work it was deonstrated,

More information

Nonlinear Error Modeling of Reduced GPS/INS Vehicular Tracking Systems Using Fast Orthogonal Search

Nonlinear Error Modeling of Reduced GPS/INS Vehicular Tracking Systems Using Fast Orthogonal Search VEHICULAR 2014 : The Third International Conference on Advances in Vehicular Systes, Technologies and Applications Nonlinear Error Modeling of Reduced GPS/INS Vehicular Tracing Systes Using Fast Orthogonal

More information