Chaos Based Spread Spectrum Watermarking algorithm

Size: px
Start display at page:

Download "Chaos Based Spread Spectrum Watermarking algorithm"

Transcription

1 Chaos Based Spread Spectrum Watermarking algorithm Kais Feltekh Laboratoire SysCom, Ecole Nationale d Ingenieurs de Tunis kais.feltekh@gmail.com Zouhair Ben Jemaa Laboratoire SysCom, Ecole Nationale d Ingenieurs de Tunis zouhair.benjemaa@enit.rnu.tn Abstract This paper presents a blind spread spectrum watermarking algorithm in discret cosine transform (DCT) domain based on chaotic sequence features for still image. We used logistic map with two secret keys; one to generate a spread spectrum sequence and other to determinate the secret insertion positions of the mark; the insertion of the mark was done in the middle frequency of DCT of the image to be watermarked. This allowed to have a compromise between invisibility and robustness against scaling, rotation and cropping attacks. Index Terms Watermark, spread spectrum, Chaos, Attacks. I. INTRODUCTION Digital watermarking operation aims to embed many kinds of digital information into multimedia data (such as image, sound and video.); this allows multimedia identification and information copyright protection. As a technology of information hiding, digital watermarking targets to allow three main properties: invisibility, robustness and capacity. In recent years, to achieve these targets several watermarking algorithms have been proposed [3], [4], [5]. The results enabled by these algorithms have shown that the invisibility and robustness are often contradictory and improvement of one causes the degradation of the other. A compromise between the two became the target of proposed algorithms. As a result, many watermarking algorithms based on DCT was proposed in the few last years [2], [7], [8], [10]. Especially, Cox and al [9] and F. Hartung and al [1] proposed many works on digital watermarking based on spread spectrum schema which aims to spread the mark in almost all the spectrum band of the image. R.Munir and al [2] proposed a new spread spectrum watermarking algorithm based on the properties of chaotic sequences generated by non linear maps. The algorithm proposed in this work is based on the algorithm of R. Munir in which we made two modifications, the first is to put the watermark in the middle band of the spectrum in the aim to improve the invisibility of the watermark; the second is to do the DCT on blocks of 8 8 pixels instead of the entire image. We used a chaotic map to produce two pseudo-random sequences one to spread the spectrum of the watermark and the other to determinate the positions of the watermark in the set of DCT components. This paper is organized as follows. In section II, we will give a little idea on chaos and the motivation of using it in various applications. In section III, we will describe the algorithm proposed by Rinaldi Munir. In section IV, we will present the proposed method. After that, we will present the experimental results; and we will finish by a conclusion. II. CHAOS AND RANDOMNESS Chaos has many features that make it attractive for searchers in various fields, indeed all these features can be summarized by saying that chaos is a deterministic phenomena having almost all the features of a noise. Another feature of chaos is sensitivity to initial conditions; i.e two infinitesimal close initial conditions of a chaotic system give two solutions completely uncorrelated. Motivated by these features, chaotic systems have been used as a pseudo-random generator, this means a finite number of noise-like, deterministic and reproducible sequences can be generated [5]. One of the simplest chaotic systems is defined by the logistic map, described by x k+1 = λ.x k (1 x k ) (1) where 0 λ 4. For λ = 4, the map is in the chaotic state and for almost all initial condition x 0, the sequence generated by (1) is a pseudo-random sequence, in fig.1 we plotted the histogram of one of the sequences of length N = The generated real number sequence is quantized, a binary sequence s(n) {0, 1} is produced with approximately equal number of 1 s and 0 s. In our scheme, we use logistic map twice, one to spread the spectrum of the mark to be embedded and other to determine the positions among the DCT coefficients where the mark will be embedded. III. SPREAD SPECTRUM WATERMARKING WITH CHAOTIC MAP In this section we will describe the algorithm proposed in [2] and in which we introduced two modifications to improve its performance. The basic idea of this algorithm is to add a pseudo-random signal to the image as a watermark that is below the threshold of perception and that cannot be identified and thus removed without knowledge of the parameters of the watermarking algorithm [2]. The embedding and extracting algorithms are described bellow.

2 (generally K 1 K 2 ). Then the real value elements of this sequence is converted into integers by multiplying each element by NM then rounding it to the nearest integer, N M is the dimension of the image to be embedded. 5) The spread spectrum watermark is embedded into V, except DC component, on secret positions specified at step 4. The spread bit b i is modulated by the binary pseudo-noise sequence S 1 and the results are amplified with a watermarking strength factor α, to form the spread spectrum watermark w i = α.b i.p i (3) The watermark w i is added to image V = v i yielding a watermarked image Fig. 1. Histogram of a sequence generated by the logistic map. A. Embedding Scheme The embedding schema is described in fig.iii-a. ˆv i = v i + w i (4) 6) Finally, the inverse DCT is applied to reconstruct the watermarked image. B. Watermark Extracting Algorithm The extracting schema is described in fig.3. Fig. 2. Watermark embedding. 1) The DCT of the original image is computed; the coefficients of this transform is saved into a vector V. 2) The watermark A is spread by a factor cr to obtain a sequence B using equation (2) ; L is the length of B. B = {b i /b i = a j, j.cr i < (j + 1).cr} (2) 3) The first chaotic sequence S 1 is generate by using the logistic map and an initial condition x 0 = K 1 ; the length of this sequence is equal to L. 4) Next, secret positions for embedding watermark are defined; a second chaotic sequence S 2 is generated by using the logistic map and another initial condition K 2 Fig. 3. Extraction of Watermark. 1) The DCT transform of the test image is computed and saved in a vector ˆv i. 2) The same sequence P 1 used in embedding process is generated by using logistic map and the secret key K 1. 3) The same sequence P 2 corresponding to secret positions are generated by using logistic map and the secret key K 2. 4) Recover bits of the watermark A by using equation (5). P (i) = { 1 if (j+1).cr 1 i=j.cr p i.ˆv i > 0 1 if (j+1).cr 1 i=j.cr p i.ˆv i < 0 (5)

3 IV. PROPOSED SCHEME The watermarking algorithm proposed in this work is the result of two modifications introduced on the algorithm described in the previous section; The image is divided into blocs of dimension 8 8 and the DCT is computed for each bloc. the watermark is introduced in the middle band of the spectrum of the blocs. In the Following we describe the embedding and extracting algorithms resulting from these modifications A. Watermark Embedding Algorithm The embedding algorithm is shown in fig.iii-a; it is the same described above with the following differences To insert between the coefficients AC 6 and AC 27, we must have: 6 Y (i) (8) Since P 2 takes values in the interval [0, 1] the inequality (8) is verified if { b 63 = 6 (9) (a + b) 63 = 27 From Equation (8) and (9) we find the following system: { b = 6/63 (10) a = 21/63 So Y (i) = P 2(i) + 6 (11) 63 Since Y must contain the vector of integers giving the order of location of the mark, then we multiply each element by 63 and then round it to the nearest integer. We must ensure that there are L different positions of embedding. 5) Now we apply the function I.zigzag (Inverse Zigzag) to return to the 8x8 matrix form. Fig. 4. Proposed insertion algorithm. 1) The DCT is computed using 8x8 DCT block transformation. 2) The zigzag transformation is applied to arrange the spectral components in low, medium and high frequency. This will allow to put the watermark in the medium frequency. 3) We set a threshold K to convert elements of sequence (in real value) into binary element (+1/-1), according to the following formula: Fig. 5. Inverse zigzag transform of a vector to 64 coefficients. After the realization of I.Zigzag for each bloc, we must rearrange the blocs to get a single MxN matrix (Fig.6). { 1 P1 (i) > K P (i) = 1 P 1 (i) < K in the following we use the threshold (k=0.5). 4) To insert the watermark in the medium frequency band, we must find a linear transformation of Y values in the desired range. This equation is: (6) Y (i) = a.p 2 (i) + b (7) Fig. 6. Rearrangement of the 8x8 blocs.

4 We use both equations (3) and (4) to insert the watermark in the spread secret position B specified in the matrix MxN. B. Watermark Extracting Algorithm The extracting algorithm is illustrated in fig.7; it is done following the steps bellow. Where M and M are the matrices corresponding to the original A and the extracted A watermark images. { 1 if A(i, j) = 0 M(i, j) = 1 if A(i, j) = 1 and M (i, j) = { 1 if A (i, j) = 0 1 if A (i, j) = 1 The normalized correlation coefficient (NC) takes values between 0 (random relationship) to 1(perfect relationship). VI. EXPERIMENT RESULTS We used Lena 512 x 512 GIF images with 256 gray levels for our experiments. The watermark is 16 x 32 BMP image. We program the watermarking algorithm above by using MATLAB 7, and then the watermarked image is tested with some typical attacks. We considered intentional geometric attacks e.g.rotation, scaling and cropping. We have chosen K 1 = 0.2 and K 2 = 0.35 to obtain two logistic sequences. We use α = 16 for watermarking strength factor and spreading factor cr = 16. A. Robustness against geometric attacks The experimental results are shown as follows: Fig. 7. Proposed extracting algorithm. 1) We transform the original image in the frequency domain by using 8x8 DCT block transformation, then we apply the zigzag function on all 8x8 DCT blocks. 2) Generate the same chaotic sequence P 1 using the logistic map with the same initial condition K 1. 3) Generate the same secret positions; that we used when inserting watermark; the logistic with the same initial condition K 2. 4) Recover the watermark by using the equation (5). Fig. 8. (a) (b) (a)the original image of Lena. (b) The original binary watermark. V. EVALUATION CRITERIA OF A WATERMARKING SYSTEM The peak signal-to-noise ratio (PSNR) is used to evaluate the similarity between the attacked and the original images. The PSNR is defined by P SNR = 10.log 10 ( MN max X 2 (i,j) i,j [X(i,j) X (i,j)] 2 The normalized correlation coefficient (NC) is another criterion used to evaluate the existence and the quality of the extracted watermark. When we use a watermark image A of dimension N 1 xn 2, it is defined by ) (a) (b) NC = N1 i=1 N1 N2 [M(i,j) M (i,j)] i=1 j=1 N2 N1 N2 j=1 [M(i,j)]2 [M (i,j)] 2 i=1 j=1 Fig. 9. (a) Watermarked Lena with PSNR=42.05dB. (b) The extracted watermark with NC=1.

5 Fig.8 show the original image and the original watermark; Fig.9 show the watermarked image and the extracted watermark. The PSNR between the original and the watermarked images is 42.05, and we can hardly perceive the change of the original image. Also the extracted watermark is identical to the inserted watermark. TABLE IV COMPARISON WITH RINALDI MUNIR ALGORITHM. TABLE I CROPPING. Table I presents a different locations and percentage of cropping applied to the watermarked Lenna image. We can see that the watermarking algorithm is very robust to cropping attack. The spread spectrum watermark allows us to have more chance to extract the pixels after this type of attacks. TABLE II SCALING THE IMAGE. Table II presents a scaling attack, an image of size 512 x 512 is first scaled to 256 x 256 then the scaled image is opened and resized back to 512 x 512. Table III presents a rotation attack obtained by rotating the watermarked image with low angle then cropping the image to obtain the same size of the original image, the rotation is positive when it is done in the sense of the clock wise. TABLE III ROTATING THE IMAGE. B. Comparison with Rinaldi Munir Algorithm We compare the proposed method with R.munir and al[2] using the Lena image. The watermark consists of 256 bits 1 and 256 bits 0. The results are shown in Table IV; the PSNR of the proposed method is better than those of [2], however it is far better for cropping, scaling and rotation with degree of 0.25, but it is not so good for the rotation attacks with degree greater than VII. CONCLUSION In this paper, a spread spectrum watermarking in middle frequency scheme was proposed. This scheme, firstly, use the logistic map to determine the secret position, in the 8 x 8 DCT block coefficients, this secret positions belong to the middle frequency in the aim to improve the invisibility of the watermark without degrading similarity. The extraction of watermark depends on private keys of logistic map used in the embedding algorithm. Simulations confirmed that this scheme has high fidelity and is robust against geometric attacks and geometric transformations. furthermore, the one who don t know the key can t know the position of the watermark embedded in, and the watermark is not easy to be extracted or modified, so this scheme is secure. REFERENCES [1] F. Hartung, and B. Girod, Fast Public-Key Watermarking of Compressed Video, Proceedings of the International Conference on Image Processing,1997. [2] R. Munir and al, Secure Spread Spectrum Watermarking Algorithm Based on Chaotic Map for Still Images, Proceedings of the International Conference on Electrical Engineering and Informatics, Institut Teknologi Bandung, Indonesia June 17-19, [3] S. H. Wang and Y. P. Lin, Wavelet tree quantization for copyright protection watermarking, IEEE Trans. Image Processing, vol. 13, pp , Feb [4] B.K.Lien and W.H. Lin, A watermarking method based on maximum distance wavelet tree quantization, In Conf, [5] E.Li, H.Liang et X.Niu, An integer wavelet based multiple logowatermarking scheme, IEEE, In Proc, [6] W.H.Lin, Y.R.Wang et S.J.Horng, A Blind Watermarking Scheme Based on Wavelet Tree Quantization, IEEE, In Proc, [7] Yanling Wang et XiuhuaJi, A New Algorithm For Watermarking Based On DCT and Chaotic Scrambling, IEEE, In Proc, [8] Zhao Yantao et al, A robust chaos-based DCT-domain watermarking algorithm, IEEE,In Proc, [9] J. Cox and al, Secure Spread Spectrum Watermarking for Multimedia, IEEE Transactions On Image Processing,VOL. 6, NO. 12, December [10] A.Briassouli and al, Hidden Messages in Heavy-Tails: DCT-Domain Watermark Detection Using Alpha-Stable Models, IEEE Transaction Multimedia,VOL. 7, NO. 4, August 2005.

Image Authentication Scheme using Digital Signature and Digital Watermarking

Image Authentication Scheme using Digital Signature and Digital Watermarking www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

More information

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

More information

Multi-factor Authentication in Banking Sector

Multi-factor Authentication in Banking Sector Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering

More information

Reversible Data Hiding for Security Applications

Reversible Data Hiding for Security Applications Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.

More information

A Digital Audio Watermark Embedding Algorithm

A Digital Audio Watermark Embedding Algorithm Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,

More information

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and

More information

Introduction to image coding

Introduction to image coding Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by

More information

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Ammar Jameel Hussein, Seda Yuksel, and Ersin Elbasi Abstract In order to achieve a good imperceptibility and robustness, using 4-level

More information

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Security Based Data Transfer and Privacy Storage through Watermark Detection

Security Based Data Transfer and Privacy Storage through Watermark Detection Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant

More information

WATERMARKING FOR IMAGE AUTHENTICATION

WATERMARKING FOR IMAGE AUTHENTICATION WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 A novel technique to hide information using Daubechies Transformation Jyotsna

More information

CHAPTER 7 CONCLUSION AND FUTURE WORK

CHAPTER 7 CONCLUSION AND FUTURE WORK 158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section

More information

Combating Anti-forensics of Jpeg Compression

Combating Anti-forensics of Jpeg Compression IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng

More information

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

An Incomplete Cryptography based Digital Rights Management with DCFF

An Incomplete Cryptography based Digital Rights Management with DCFF An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp

More information

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE

More information

Robust Blind Watermarking Mechanism For Point Sampled Geometry

Robust Blind Watermarking Mechanism For Point Sampled Geometry Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,

More information

A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation

A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation S.VENKATA RAMANA ¹, S. NARAYANA REDDY ² M.Tech student, Department of ECE, SVU college of Engineering, Tirupati, 517502,

More information

JPEG Image Compression by Using DCT

JPEG Image Compression by Using DCT International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

DYNAMIC DOMAIN CLASSIFICATION FOR FRACTAL IMAGE COMPRESSION

DYNAMIC DOMAIN CLASSIFICATION FOR FRACTAL IMAGE COMPRESSION DYNAMIC DOMAIN CLASSIFICATION FOR FRACTAL IMAGE COMPRESSION K. Revathy 1 & M. Jayamohan 2 Department of Computer Science, University of Kerala, Thiruvananthapuram, Kerala, India 1 revathysrp@gmail.com

More information

A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain

A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain Roland Kwitt, Peter Meerwald, Andreas Uhl Dept. of Computer Sciences, University of Salzburg, Austria E-Mail: {rkwitt, pmeerw,

More information

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor

More information

Example #1: Controller for Frequency Modulated Spectroscopy

Example #1: Controller for Frequency Modulated Spectroscopy Progress Report Examples The following examples are drawn from past student reports, and illustrate how the general guidelines can be applied to a variety of design projects. The technical details have

More information

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero

More information

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know

More information

International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)

International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012) Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore

More information

Keywords: Image complexity, PSNR, Levenberg-Marquardt, Multi-layer neural network.

Keywords: Image complexity, PSNR, Levenberg-Marquardt, Multi-layer neural network. Global Journal of Computer Science and Technology Volume 11 Issue 3 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172

More information

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS 1. Bandwidth: The bandwidth of a communication link, or in general any system, was loosely defined as the width of

More information

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India Abstract Image compression is now essential for applications such as transmission and storage in data bases. In this paper we review and discuss about the image compression, need of compression, its principles,

More information

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA

More information

FFT Algorithms. Chapter 6. Contents 6.1

FFT Algorithms. Chapter 6. Contents 6.1 Chapter 6 FFT Algorithms Contents Efficient computation of the DFT............................................ 6.2 Applications of FFT................................................... 6.6 Computing DFT

More information

Video-Conferencing System

Video-Conferencing System Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video

More information

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:

More information

Ericsson T18s Voice Dialing Simulator

Ericsson T18s Voice Dialing Simulator Ericsson T18s Voice Dialing Simulator Mauricio Aracena Kovacevic, Anna Dehlbom, Jakob Ekeberg, Guillaume Gariazzo, Eric Lästh and Vanessa Troncoso Dept. of Signals Sensors and Systems Royal Institute of

More information

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder Performance Analysis and Comparison of 15.1 and H.264 Encoder and Decoder K.V.Suchethan Swaroop and K.R.Rao, IEEE Fellow Department of Electrical Engineering, University of Texas at Arlington Arlington,

More information

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National

More information

Colour Image Encryption and Decryption by using Scan Approach

Colour Image Encryption and Decryption by using Scan Approach Colour Image Encryption and Decryption by using Scan Approach, Rinkee Gupta,Master of Engineering Scholar, Email: guptarinki.14@gmail.com Jaipal Bisht, Asst. Professor Radharaman Institute Of Technology

More information

Efficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding

Efficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 13, NO. 2, JUNE 2015 97 Efficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding Wei-Hsiang Chang, Mei-Juan Chen, Gwo-Long

More information

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia sjafari@ut.ee

More information

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2 ISSN 2277-2685 IJESR/June 2014/ Vol-4/Issue-6/333-337 Y. Naveena et al./ International Journal of Engineering & Science Research INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena

More information

Less naive Bayes spam detection

Less naive Bayes spam detection Less naive Bayes spam detection Hongming Yang Eindhoven University of Technology Dept. EE, Rm PT 3.27, P.O.Box 53, 5600MB Eindhoven The Netherlands. E-mail:h.m.yang@tue.nl also CoSiNe Connectivity Systems

More information

Using fractal compression scheme to embed a digital signature into an image

Using fractal compression scheme to embed a digital signature into an image Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:

More information

Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object

More information

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, o, January 01 www.ijcsi.org 394 Hybrid Watermarking and IDEA Encryption of Internet Contents M.A. Mohamed and A.M. El-Mohandes Electronics

More information

Redundant Wavelet Transform Based Image Super Resolution

Redundant Wavelet Transform Based Image Super Resolution Redundant Wavelet Transform Based Image Super Resolution Arti Sharma, Prof. Preety D Swami Department of Electronics &Telecommunication Samrat Ashok Technological Institute Vidisha Department of Electronics

More information

A Concept of Digital Picture Envelope for Internet Communication

A Concept of Digital Picture Envelope for Internet Communication A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,

More information

DIGITAL IMAGE PROCESSING AND ANALYSIS

DIGITAL IMAGE PROCESSING AND ANALYSIS DIGITAL IMAGE PROCESSING AND ANALYSIS Human and Computer Vision Applications with CVIPtools SECOND EDITION SCOTT E UMBAUGH Uffi\ CRC Press Taylor &. Francis Group Boca Raton London New York CRC Press is

More information

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh

More information

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,

More information

CDMA TECHNOLOGY. Brief Working of CDMA

CDMA TECHNOLOGY. Brief Working of CDMA CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile

More information

How To Filter Spam Image From A Picture By Color Or Color

How To Filter Spam Image From A Picture By Color Or Color Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among

More information

PCM Encoding and Decoding:

PCM Encoding and Decoding: PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth

More information

A Feature Selection Methodology for Steganalysis

A Feature Selection Methodology for Steganalysis A Feature Selection Methodology for Steganalysis Yoan Miche 1, Benoit Roue 2, Amaury Lendasse 1, Patrick Bas 12 1 Laboratory of Computer and Information Science Helsinki University of Technology P.O. Box

More information

Implementation of Digital Signal Processing: Some Background on GFSK Modulation

Implementation of Digital Signal Processing: Some Background on GFSK Modulation Implementation of Digital Signal Processing: Some Background on GFSK Modulation Sabih H. Gerez University of Twente, Department of Electrical Engineering s.h.gerez@utwente.nl Version 4 (February 7, 2013)

More information

Introduction to Medical Image Compression Using Wavelet Transform

Introduction to Medical Image Compression Using Wavelet Transform National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自

More information

How To Improve Performance Of The H264 Video Codec On A Video Card With A Motion Estimation Algorithm

How To Improve Performance Of The H264 Video Codec On A Video Card With A Motion Estimation Algorithm Implementation of H.264 Video Codec for Block Matching Algorithms Vivek Sinha 1, Dr. K. S. Geetha 2 1 Student of Master of Technology, Communication Systems, Department of ECE, R.V. College of Engineering,

More information

Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning

Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning SAMSI 10 May 2013 Outline Introduction to NMF Applications Motivations NMF as a middle step

More information

IN current film media, the increase in areal density has

IN current film media, the increase in areal density has IEEE TRANSACTIONS ON MAGNETICS, VOL. 44, NO. 1, JANUARY 2008 193 A New Read Channel Model for Patterned Media Storage Seyhan Karakulak, Paul H. Siegel, Fellow, IEEE, Jack K. Wolf, Life Fellow, IEEE, and

More information

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically. Sampling Theorem We will show that a band limited signal can be reconstructed exactly from its discrete time samples. Recall: That a time sampled signal is like taking a snap shot or picture of signal

More information

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen

More information

A Secure Data Transmission By Integrating Cryptography And Video Steganography

A Secure Data Transmission By Integrating Cryptography And Video Steganography A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances

More information

Image Compression and Decompression using Adaptive Interpolation

Image Compression and Decompression using Adaptive Interpolation Image Compression and Decompression using Adaptive Interpolation SUNILBHOOSHAN 1,SHIPRASHARMA 2 Jaypee University of Information Technology 1 Electronicsand Communication EngineeringDepartment 2 ComputerScience

More information

SCAN-CA Based Image Security System

SCAN-CA Based Image Security System SCAN-CA Based Image Security System Bhagyashree.S.Anantwar 1, S.P.Sonavane 2 Student, Department of Computer Science and Engg, Walchand College of Engg, Sanli, India 1 Asso. Professor, Department of Information

More information

Performance Verification of Super-Resolution Image Reconstruction

Performance Verification of Super-Resolution Image Reconstruction Performance Verification of Super-Resolution Image Reconstruction Masaki Sugie Department of Information Science, Kogakuin University Tokyo, Japan Email: em13010@ns.kogakuin.ac.jp Seiichi Gohshi Department

More information

Euler Vector: A Combinatorial Signature for Gray-Tone Images

Euler Vector: A Combinatorial Signature for Gray-Tone Images Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, murthyg@isical.ac.in Indian Statistical Institute,

More information

NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS

NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS TEST DESIGN AND FRAMEWORK September 2014 Authorized for Distribution by the New York State Education Department This test design and framework document

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Transcription of polyphonic signals using fast filter bank( Accepted version ) Author(s) Foo, Say Wei;

More information

A deterministic fractal is an image which has low information content and no inherent scale.

A deterministic fractal is an image which has low information content and no inherent scale. FRACTAL IMAGE COMPRESSION: A RESOLUTION INDEPENDENT REPRESENTATION FOR IMAGER?? Alan D. Sloan 5550 Peachtree Parkway Iterated Systems, Inc. Norcross, Georgia 30092 1. Background A deterministic fractal

More information

SteganographyinaVideoConferencingSystem? AndreasWestfeld1andGrittaWolf2 2InstituteforOperatingSystems,DatabasesandComputerNetworks 1InstituteforTheoreticalComputerScience DresdenUniversityofTechnology

More information

An Efficient Architecture for Image Compression and Lightweight Encryption using Parameterized DWT

An Efficient Architecture for Image Compression and Lightweight Encryption using Parameterized DWT An Efficient Architecture for Image Compression and Lightweight Encryption using Parameterized DWT Babu M., Mukuntharaj C., Saranya S. Abstract Discrete Wavelet Transform (DWT) based architecture serves

More information

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final

More information

Establishing the Uniqueness of the Human Voice for Security Applications

Establishing the Uniqueness of the Human Voice for Security Applications Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.

More information

Common Core Unit Summary Grades 6 to 8

Common Core Unit Summary Grades 6 to 8 Common Core Unit Summary Grades 6 to 8 Grade 8: Unit 1: Congruence and Similarity- 8G1-8G5 rotations reflections and translations,( RRT=congruence) understand congruence of 2 d figures after RRT Dilations

More information

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of

More information

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Ying Liu and William A. Pearlman January 2006 Center for Image Processing Research Rensselaer Polytechnic

More information

DCT-JPEG Image Coding Based on GPU

DCT-JPEG Image Coding Based on GPU , pp. 293-302 http://dx.doi.org/10.14257/ijhit.2015.8.5.32 DCT-JPEG Image Coding Based on GPU Rongyang Shan 1, Chengyou Wang 1*, Wei Huang 2 and Xiao Zhou 1 1 School of Mechanical, Electrical and Information

More information

Big Ideas in Mathematics

Big Ideas in Mathematics Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Super-resolution method based on edge feature for high resolution imaging

Super-resolution method based on edge feature for high resolution imaging Science Journal of Circuits, Systems and Signal Processing 2014; 3(6-1): 24-29 Published online December 26, 2014 (http://www.sciencepublishinggroup.com/j/cssp) doi: 10.11648/j.cssp.s.2014030601.14 ISSN:

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers

Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers Sung-won ark and Jose Trevino Texas A&M University-Kingsville, EE/CS Department, MSC 92, Kingsville, TX 78363 TEL (36) 593-2638, FAX

More information

A Study of Direct Sequence Spread Spectrum Technique for Data Compression Purpose

A Study of Direct Sequence Spread Spectrum Technique for Data Compression Purpose 3 ÒÃÈÖ ÉÒà ¹Ô ä àãç «Õà Çé¹Êà» Êà»ç µãñá ྠèí ÒÃãªé Ò¹ Ò éò¹ ÒúպÍÑ éíáùå Óà Ãѵ¹ì ÍÁÃÃÑ ÉÒ 1 ÁËÒÇÔ ÂÒÅÑÂà â¹âåâõ¾ãð ÍÁà ÅéÒ ¹ºØÃÕ ºÒ Á Øè ÃØ ÃØ à ¾Ï 10140 º Ñ ÂèÍ Ò¹ÇÔ Ñ¹Õéä éí ÔºÒÂ Ö ÇÔ Õ ÒÃ˹Öè «Öè

More information

Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary

Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary Shape, Space, and Measurement- Primary A student shall apply concepts of shape, space, and measurement to solve problems involving two- and three-dimensional shapes by demonstrating an understanding of:

More information

Multiple Embedding Using Robust Watermarks for Wireless Medical Images

Multiple Embedding Using Robust Watermarks for Wireless Medical Images Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell

More information

Taking the Mystery out of the Infamous Formula, "SNR = 6.02N + 1.76dB," and Why You Should Care. by Walt Kester

Taking the Mystery out of the Infamous Formula, SNR = 6.02N + 1.76dB, and Why You Should Care. by Walt Kester ITRODUCTIO Taking the Mystery out of the Infamous Formula, "SR = 6.0 + 1.76dB," and Why You Should Care by Walt Kester MT-001 TUTORIAL You don't have to deal with ADCs or DACs for long before running across

More information

Signal to Noise Instrumental Excel Assignment

Signal to Noise Instrumental Excel Assignment Signal to Noise Instrumental Excel Assignment Instrumental methods, as all techniques involved in physical measurements, are limited by both the precision and accuracy. The precision and accuracy of a

More information

Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds

Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds S.Saranya Devi 1, K.Kanimozhi 2 1 Assistant professor, Department of Computer Science and Engineering, Vivekanandha Institute

More information

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Quality Estimation for Scalable Video Codec Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Purpose of scalable video coding Multiple video streams are needed for heterogeneous

More information

Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel

Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 2, FEBRUARY 2002 359 Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel Lizhong Zheng, Student

More information