JCS&T Vol. 11 No. 1 April 2011

Size: px
Start display at page:

Download "JCS&T Vol. 11 No. 1 April 2011"

Transcription

1 Reversble Data Hdng Explotng Varance n Wavelet Coeffcents Xu-Ren Luo Department of Electrcal and Electronc Engneerng, Cung Ceng Insttute of Tecnology, Natonal Defense Unversty, Tas, Taoyuan 33509, Tawan, Republc of Cna. and Te-Lung Yn Department of Computer Scence and Informaton Engneerng, Cna Unversty of Tecnology, Hukou, Hsncu 303, Tawan, Republc of Cna. ABSTRACT In ts paper, we present a new reversble data dng sceme tat utlzes te wavelet transform and better explots te large wavelet coeffcent varance to aceve g capacty and mperceptble embeddng. Our sceme dffers from tose of prevous studes n tat te wavelet coeffcents stogram rater tan te gray-level stogram s manpulated. In addton, we desgn ntellgent stogram-sftng rules to avod te decmal problem n grayscale pxel values after recovery process to aceve reversblty. Small canges n te wavelet coeffcents after embeddng process are mportant factors contrbutng to low vsual dstorton n te marked mage. Furtermore, an mportant property of our sceme s tat te use of tresold dffers greatly from prevous scemes. Te expermental results sow tat our sceme outperforms oter reversble data dng scemes. Keywords: reversblty, marked meda, wavelet transform, wavelet coeffcent, dstorton, stogram.. Introducton Reversble data dng, or so-called nvertble, dstortonfree data dng, s a branc of fragle tecnque manly used for qualty-senstve applcatons suc as multmeda content autentcaton, medcal magng systems, law enforcement, and mltary magery, etc. One of te most mportant requrements n tese felds s to recover te orgnal meda exactly durng analyss to enable te rgt decsons. Te oter sgnfcant necesstes of reversble data dng are te embeddng capacty and vsual qualty of te marked meda, snce tey are crtcally essental to acevng satsfactory performance n varous applcatons. [][2] Te sceme we present n ts paper s an attempt to aceve g-performance reversble data dng, n wc te embeddng and recoverng processes are devsed n te frequency doman. Te partculartes of large varance n wavelet coeffcents and mnor canges n wavelet coeffcents followng from te embeddng process n wavelet coeffcents are exploted to aceve g capacty and mperceptblty. Te rest of ts paper s organzed as follows. In Secton 2, prevous reversble data dng scemes and ter caracterstcs wll be brefly revewed n terms of embeddng capacty and vsual qualty. Our proposed sceme s ntroduced n Secton 3. Expermental results and comparatve analyses are presented n Secton 4. Fnally, some conclusons are drawn n Secton Related studes Nowadays, a number of researc works n ts feld can be classfed nto two major categores accordng to te embeddng strateges. Category-I reversble data dng scemes work on te transform doman. In 2002, Frdrc et al. [3][4] proposed a novel paradgm of lossless data embeddng. Te payload of ts so-called RS sceme s gly dependent on te compresson algortm and nsuffcent for some applcatons. Subsequently, Xuan et al. [5] presented a new sceme carred out n te nteger wavelet transform (IWT) doman. In ts sceme, one or multple mddle bt-plan(s) n te g-frequency subbands s(are) cosen to embed data bts. In 2003, Tan [6] proposed a dfference expanson (DE) sceme, wc exploted te DE tecnque to embed data bts nto te g-frequency coeffcents. However, ts sceme suffers from te locaton map problem tat t s dffcult to aceve capacty control. Alattar [7][8] extended Tan s sceme by generalzng te DE tecnque to te trplets and quads of adjacent pxels. Kamstra et al. [9][0] mproved te DE sceme by predctng te expandable locatons n te g-pass band. Ts sceme mproves te effcency of lossless compresson, altoug te embeddng capacty s small. In 2007, Tod et al. [] proposed a new sceme combnng stogram sftng and predcton-error expanson approaces to remedy te problems of Tan s sceme. In category-ii, scemes are performed n te spatal doman. Frdrc et al. [2] presented te jont b-level mage experts group (JBIG) lossless compresson tecnque to save space for data embeddng. However, te payload s gly dependent on te lossless compresson algortm. Celk et al. [3][4] employed te generalzed least-sgnfcant-bt (G-LSB) tecnque and te contextbased adaptve lossless mage codng (CALIC) to aceve lossless data dng. In 2006, N et al. [5] utlzed te pars of maxmum and mnmum ponts of a gven mage stogram to aceve reversblty. In ts sceme, te pxels between eac par are modfed for data embeddng and extracton. However, suc a strategy may lead to sgnfcant overead and nsuffcent vsual qualty. In [6][7], Hwang et al. and Kuo et al. extend N s sceme by usng a locaton map to aceve reversblty. Altoug te sceme s smple, te sgnfcant overead and nsuffcent vsual qualty are crtcal problems. In 2009, Km et al. [8] exploted te feature of g spatal correlaton between negborng pxels to aceve g- 27

2 performance data dng. Te embeddng capacty n te paper ranges from 6 to 20 k. For all of te above reversble data dng scemes, te requrement of addtonal overead s one of te tornest problems n te restore process. Ts paper presents a novel metod and enances te embeddng performance recently proposed by Luo et al. [9] n te frequency doman to aceve g-performance lossless data dng Data embeddng algortm We assume tat te embedded message s a random bnary sequence. Te stograms of te sub-band dfferences between te reference sub-band and te oter destnaton sub-bands are sfted to embed te secret message. Fg. 3 depcts te overall data embeddng process, wc s descrbed n detal below. 3. Proposed sceme Te proposed sceme combnes te two-level Haar dscrete wavelet transform (HDWT) algortm and a new stogram sftng tecnque to aceve reversble data dng. In our sceme, a gven mage s frst transformed nto a frequency doman and sub-bands n te mddle- and g-frequency ranges are ten used to create sub-band dfferences. Eac stogram of tese sub-band dfferences s ten sfted accordng to a selected tresold. Message bts can ten be embedded n te empty space of te sfted stograms. Fnally, te marked mage s reconstructed wt te sub-bands carryng and noncarryng dden message by performng te nverse HDWT algortm to complete te embeddng process. As to te extractng process, te correspondng nverse operatons can be performed to recover te dden nformaton and te orgnal mage. Te new sceme dffers from our prevous study [9] n tat sx rater tan four of te wavelet sub-bands are manpulated. 3.. Segmentaton algortm Te two-level HDWT algortm utlzes te four-band sub-band codng system to decompose an mage nto a set of dfferent frequency sub-bands. As llustrated n Fgs. and 2, te sze of eac sub-band s one egt of te orgnal mage n te spatal doman. Te egt dfferent sub-bands can be classfed nto te low-, mddle-, and g-frequency sub-bands. Snce te low-frequency subband of an mage ncorporates more energy tan te oter sub-bands, ts coeffcents are te most fragle tat f any of tem are manpulated, a suspect can vsbly detect te canges on te spatal doman mage. In contrast, f te coeffcents n te mddle- and/or g-frequency subbands are altered, canges n te spatal doman mage are mperceptble to uman eyes. As a result, ts feature s generally exploted to conceal secret messages. Fg.. Te two-level segmentaton process. Fg. 2. A tow-level HDWT four-band splt of Lena. Fg. 3. Flowcart of data embeddng process. Embeddng_process, T, Input:, te orgnal mage; T, te tresold accordng to wc te empty bns n eac stogram are prepared;, te secret message. Output:, te marked mage, f, te mark of embeddng status. Advan Proceedngs: Step : Create sub-bands by performng two-level HDWT four-band sub-band codng system on an nput mage. Sx of te sub-bands to be utlzed are denoted by L H ( x, y ), H L( x, y ), H H ( x, y ), L H 2( x, y ), H H 2 and H L2( x, y ), were ndcates te coordnate of te coeffcents n eac sub-band. Step 2: Create sub-band dfferences D, D, 2 D and 3 D between te reference sub-bands L H, L H 2 and 4 te oter destnaton sub-bands HL, HH, HL2 and HH 2 by te followng formulas: x y LH x y HL x y, () 2 x y LH x y HH x y, (2) D3 HL2, (3) D4 HH 2. (4) Step 3: Denote te stograms of D as, were 28

3 , 2, 3 and 4. Step 4: Sft stogram accordng to te tresold T selected. Te sfted can be calculated as follows: j 8, f j T, j 8, f j ( T ), (5) were, 2, 3, 4 and j ndcates te value of eac bn. Tese can also be obtaned by te followng formulas: x y LH x y HL x y, (6) 2 x y LH x y HH x y, (7) 3 x y LH x y HL x y, (8) 4 x y LH x y HH x y. (9) were HL (, x y), HH (, xy), HL (, ) 2 xy and HH (, ) 2 xy can be expressed as: HL( x, y ) 8, f j T, HL HL( x, y ) 8, f j T. (0) HH( x, y ) 8, f 2 j T, HH HH( x, y ) 8, f 2 j T. () HL2( x, y ) 8, f 3 j T, HL2( x, y) HL2( x, y ) 8, f 3 j T. (2) HH2( x, y ) 8, f 4 j T, HH2( x, y) HH2( x, y ) 8, f 4 j T. (3) Embeddng Data: Step 5: We frst set an nteraton ndex to T and ten embed message bts sequentally by modfyng. Eac s sfted to become, were, 2, 3 and 4 by te followng rules: j 8, f j, ( 0, j 4, f j, (, j j for 0. 8, 4, f f j j,, ( 0, (, (4) j 8, f j 0, ( 0, j 4, f j 0, (, (5) for 0. Te canges n te dfference stograms above result n canges n te coeffcents. Ts mples tat D( xy, ) s scanned and modfed agan. Once te value of D( xy, ) s equal to, te message bt s embedded. Ts process s repeated untl tere are no D ( xy, ) wt te value of. We ten decrease by and repeat te step untl 0. Tese steps can be formulated as follows: x y LH x y HL x y, (6) 2 x y LH x y HH x y, (7) 3 x y LH x y HL x y, (8) 4 x y LH x y HH x y. (9) f 0, HL( x, y ) 4, f j, (, HL( x, y ) 4, f j, (, HL HL( x, y ) 8, f j, ( 0, HL( x, y ) 8, f j, ( 0. HH ( x, y ) 4, f 2 j, (, HH ( x, y ) 4, f 2 j, (, HH HH ( x, y ) 8, f 2 j, ( 0, HH ( x, y ) 8, f 2 j, ( 0. HL2 ( x, y ) 4, f 3 j, (, HL2 ( x, y ) 4, f 3 j, (, HL2( x, y) HL2 ( x, y ) 8, f 3 j, ( 0, HL2 ( x, y ) 8, f 3 j, ( 0. HH 2 ( x, y ) 4, f 4 j, (, HH 2 ( x, y ) 4, f 4 j, (, HH 2( x, y) HH 2 ( x, y ) 8, f 4 j, ( 0, HH 2 ( x, y ) 8, f 4 j, ( 0. f 0, HL(, x y) HH(, x y) HL2( x, y) (20) (2) (22) (23) HL( x, y ) 4, f j = 0, ( =, HL( x, y ) 8, f j = 0, ( = 0. (24) HH( x, y ) 4, f 2 j = 0, ( =, HH( x, y ) 8, f 2j = 0, ( = 0. (25) HL2( x, y ) 4, f 3 j = 0, ( =, HL2( x, y ) 8, f 3j = 0, ( = 0. (26) 4 4 HH2( x, y ) 4, f j = 0, ( =, HH2( x, y) HH2( x, y ) 8, f j = 0, ( = 0. (27) Centralzng Hstogram Step 6: Wen all te bns n te dfference stogram are exausted, egt bns, valued from 4 to 3, wll become empty. In ts case, te mark f s set to be and all bns on te rgt sde wll be moved left 4 bns, and tose on te left wll be moved rgt 4 bns n order to mprove te vsual qualty by decreasng te varance of te dfferences n te coeffcents. Oterwse, te mark f s set to be 0. Eac s sfted to become by te followng rules: ( j ) 4, f ( j) 0, j ( j ) 4, f ( j) 0, (28) were, 2, 3 and 4. Sftng stograms as above creates coeffcent canges, wc can be formulated as follows: x y LH x y HL x y, (29) 2 x y LH x y HH x y, (30) 29

4 3 x y LH x y HL x y, (3) 4 x y LH x y HH x y, (32) were HL (, xy), HH (, x y), HL (, x y) 2 and HH (, x y) 2 can be expressed as: HL( x, y ) 4, f j 0, HL HL( x, y ) 4, f j 0. (33) HH( x, y ) 4, f 2 j 0, HH(, x y) HH( x, y ) 4, f 2 j 0. HL2 HH 2(, x y) (34) HL2 ( x, y ) 4, f 3 j 0, HL2 ( x, y ) 4, f 3 j 0. (35) HH 2 ( x, y ) 4, f 4 j 0, HH 2 ( x, y ) 4, f 4 j 0. (36) Step 7: Usng te sub-bands HL and HL2 wt te dden message as te reference sub-bands, and ten fft and sxt dfference stogram s created wt te orgnal sub-bands LH and LH2. Te secret message s ten dden nto tese dfference stograms accordng to steps to 6; as a result, LH x, yand LH2 x, y wll be created. Ts completes te embeddng process. Obtanng Marked Image: Step 8: Reconstruct te marked mage by utlzng te nverse of te two-level HDWT four-band sub-band codng on tese sub-bands. We frst reconstruct te LL sub-band and ten reconstruct te marked mage. Ts procedure can be formulated as follows: LL IDWT ( LL2,, HL2, HH 2 ), (37) IDWT ( LL, L H, H L, H H ). (38) Preventon of overlap and over/underflow A flag-bt s used to ndcate weter te bn n te dfferent stograms s overlap or not. Te flag-bt s set to f a bn value sfted by 8 overlaps wt one sfted by 4. Te flag-bt s set to 0 f no overlap occurs. Tese flag-bts and te values of T and f n te btmap wll ultmately all be compressed wt an effcent compresson tool based on te LZMA algortm. Te compressed result s ten dden nto te reserved nonoverlappng bns. Accordng to expermental results, ts process results n less tan 2.92% overead n entre embeddng capacty for many dfferent types of mages. Toug te generated pxel values n te marked mage may be outsde te allowable range, te metod n [2][8] could be used to deal wt te problem. Te nterval range s dynamcally selected wt te mage caracterstcs tat t wll reduce dstortons to mnmum. 3.3 Data extractng and recoverng algortm Before extractng te dden message, recever needs to verfy weter or not te marked mage as been modfed. If tere s more tan one occurrence at j, we can conclude tat te marked mage as been tampered wt. Te proposed sceme ten stops te followng extracton steps mmedately. Te extracton and recovery process s scematzed n Fg. 4. Fg. 4. Flowcart of extracton and recovery process. Te detaled extracton and recovery process ncludes te followng steps: Extractng_process, T, f Input:, te marked mage; T, te tresold; f, te mark, accordng to wc te embeddng status s determned. Output:, te secret message;, te orgnal mage. Advan Proceedngs: Step : Create sub-bands by performng two-level HDWT four-band codng on te marked mage. Sx of te sub-bands to be utlzed are denoted by ( x LH, y ), HL ( x, y), HL ( x, y), (, ) x y, (, ) HL2 x y and (, ) HH 2 x y, were x, y ndcates te coordnate of te coeffcents n eac sub-band. Recoverng LL Sub-band Step 2: Create sub-band dfference D (, x y) between te reference sub-band and te destnaton sub-band HL2 accordng to te followng formulas: D HL2. (39) Step 3: Denote te stogram of D as j, were j ndcates te value of eac bn. Step 4: Ceck te dstrbuton of te stogram j. If tere s more tan one occurrence at j, te 30

5 subsequent steps wll be stopped mmedately. Step 5: Ceck te embeddng status. Once te value of f s equal to, t can be concluded tat te sub-band s completely flled wt dden message bts. Subsequently, restore te orgnal dfference stogram. Te bns greater tan or equal to zero wll be sfted to te rgt by 4 and tose less tan zero to te left by 4. Te restored j can be calculated as follows: j 4, f j 0, j j4, f j 0. (40) Tese can also be obtaned by te followng formulas: D HL2 LH 2, (4) were (, ) LH 2 x y can be expressed as: ( xy, ) 4, f ( j) 0, LH 2 (42) ( xy, ) 4, f ( j) < 0. Extractng Data: Step 6: Extract te dden message (, were n denotes te ndex of a message bt, by sftng j wt reference to te btmap and nvertng te embeddng process. Frst, te teraton ndex s set to 0. Once a j wt a value of ( 4) s encountered, a bnary bt s retreved. On te oter and, a bnary bt 0 s retreved f j as a value of ( 8). Ts procedure s repeated untl tere are no j values of ( 4) or ( 8). Subsequently, s ncreased by. Te same procedures as descrbed above are repeated untl reaces T+. Te retrevng rule s as follows: j 8, f j = 8, j 4, f j = 4, (43) for 0. j 8, f j 8, j 4, f j 4, j j 8, f j ( 8), j 4, f j ( 4), for T. (44) Step 7: At te same tme, te modfed sub-band dfference D s also scanned and modfed. Te extractng operaton can be expressed as te followng formula: ( 0, f D ( 8 ),, f (, ) ( 4 ). D x y Ts procedure s executed untl = T+. (45) Step 8: Remove te dden message bts ( 0, from te sub-band dfference. Te removng rule s gven by D HL2 LH 2, (46) were (, ) LH 2 x y can be expressed as LH 2( xy, ) 8, f j8, n0, (47) LH 2( xy, ) 4, f j4, n, for = 0, and LH 2( xy, ) 8 f j 8, n0, LH 2( xy, ) 4 f j 4, n, (48) LH 2( xy, ) LH 2( xy, ) 8 f j( 8), n0, LH 2( xy, ) 4 f j( 4), n, for T. Step 9: Restore te orgnal stogram. Te orgnal stogram can be calculated accordng to te followng rules: j 8 f j T, j j 8 f j ( T). (4) for L. Te restoraton of te stogram as descrbed above results n canges n te coeffcents. Ts can be descrbed by te followng formula: D ( xy, ) HL2( xy, ) LH 2( xy, ). (42) Here, (, ) 2 x y can be expressed as: LH LH ( xy, ) 8, f j T, LH 2(, xy) LH 2( xy, ) 8, f j ( T). 2 (43) Step 0: After recoverng te LH2 sub-band, steps to 9 are repeated to recover te rest of HL2 and HH2 subbands as (, ) 2 x y and (, ) 2 x y. HL HH Obtanng te LL Sub-band: Step : Recover te orgnal Sub-band LL troug te nverse operaton of te HDWT algortm wt (, ) 2 x y, (, ) LH 2 x y, (, ) HL 2 x y, and (, ) HH 2 x y. Ts procedure can be formulated as follows: LL IDWT ( LL2, LH 2, HL 2, HH 2). (44) Recoverng LH, HL and HH Sub-bands: Step 2: After recoverng te LL sub-band, steps to 9 are also repeated to recover te LH, HL and HH subbands. Obtanng Orgnal Image: Step 3: Recover te orgnal mage troug te nverse operaton of te HDWT algortm wt te LH, HL and HH sub-bands. Ts procedure can be formulated as follows: IDWT ( LL, LH, HL, HH). (45) Tese steps fns te extracton and recoverng process. LL 3

6 4. Expermental results and comparson In ts secton, a seres of experments are performed to evaluate of our sceme. For tese experments, we used many dfferent types of mages, ncludng some commonly used ones and two medcal mages (Fg. 5). Te message bts to be embedded n our experments are randomly generated by a pseudo-random bnary generator. Te tresold ranges from 0 to 00. wavelet transform. Gven tat te mddle/g-frequency sub-bands ncorporate less energy, te test mages wt larger varance between mddle and g-wavelet coeffcents suc as MRI and MRI 2 can aceve ger vsual qualty tan Baboon at te tresold 0. Fg bt mages(a)lena, (b)baboon, (c)boat, (d)arplane, (e)aeral, (f)tank, (g)trucks, ()Medcal mage, () Medcal mage2. Capacty versus Tresold Te relatonsp between te capacty (n bpp) and te tresold s presented n Fg. 6. Te embeddng rate almost reaces 0.8 bpp at tresold 00 for most te test mages. As expected te capacty s nearly proportonal to te tresold at te begnnng and saturates wen te tresold s suffcently g. Fg. 7. PSNR at varous tresolds. Comparson of vsual qualty wt oter scemes To address te great contrbuton of our sceme, analyses n terms of actual embeddng capacty and vsual qualty were performed. Te proposed sceme was compared wt te DE sceme [4], G-LSB sceme [5], Km et al. s sceme [9], and N et al. s sceme [6] for te Lena, Baboon, Boat, and Arplane mages as sown n Fg. 8. Te embeddng capacty s te amount of embedded bts wt overead subtracted. It s observed tat our proposed tecnque as aceved te gest PSNR at te same bpp. Fg. 6. Embeddng capacty at varous tresolds. Vsual Qualty versus Tresold Fg. 7 depcts te vsual qualty n PSNR of te marked mage versus tresold varyng from 0 to 00 for test mages on te premse tat maxmal bts are embedded. Te expermental result ndcates tat te PSNR rses as te tresold ncreases and ts s not te case for te prevous studes. Te marked mage can aceve 43 db at te tresold 0, and above 46 db at te tresold of 00 for most test mages. It s noteworty tat larger values of tresold contrbute less varaton to te stogram of te 32

7 Fg. 8. Comparson of embeddng capacty n bpp versus dstorton wt exstng reversble scemes: DE sceme, G-LSB sceme, Km et al. s sceme, and N et al s sceme: (A) Baboon; (B) Lena; (C) Boat; (D) Arplane. 5. Concluson In ts paper, a reversble data dng sceme explotng te large varance of wavelet coeffcents and clever stogram sftng rules s presented. Te proposed sceme, compared wt prevous ones, can obtan better vsual qualty of te marked mage gven te same payload. Te man reason s tat te vsual qualty of our sceme does not decay wt ncreasng tresold as n te oter scemes. In addton, our sceme provdes te greatest embeddng capacty and s even better tan te one publsed recently [9]. It may be of nterest for future researc tat te tresold predctons, mult-round scemes, and fast algortms wll be explored to meet real-tme applcaton requrements. References [] W. Bender, D. Grul, N. Mormoto, and A. Lu, Tecnques for data dng, IBM Systems Journal, vol.35, no.3, pp , 996. [2] M. Awrangjeb, An overvew of reversble data dng, Proc. Sxt Internatonal Conf. on Computer and Informaton Tecnology, Jaangrnagar Unversty, Banglades, pp , December [3] J. Frdrc, M. Goljan, and R. Du, Dstorton-free data embeddng, Proc. 4t Informaton Hdng Worksop, New York, vol.237, pp.27 4, Lecture Notes n Computer Scence, 200. [4] J. Frdrc, M. Goljan, and R. Du, Lossless data embeddng new paradgm n dgtal watermarkng, EURASIP J. Appl. Sgnal Process. vol.2, pp.85 96, [5] G.. Xuan, Y.Q. S, J. Cen, J. Zu, and Z. N, W. Su, Lossless data dng based on nteger wavelet transform, IEEE Internatonal Worksop on Multmeda Sgnal Processng, St. Tomas, Vrgn Islands, USA, December 9-, [6] J. Tan, Reversble data embeddng usng a dfference expanson, IEEE Trans. on Crcuts and Systems for Vdeo Tecnology vol.3, no.8, pp , [7] A.M. Alattar, Reversble watermark usng dfference expanson of trplets, Proc. IEEE Internatonal Conference on Image Processng, vol., Barcelona, Span, pp , September [8] A.M. Alattar, Reversble watermark usng dfference expanson of quads, Proc. IEEE Internatonal Conference on Acoustcs, Speec, and Sgnal Processng, Montreal, Canada, vol.3, pp , May [9] L. Kamstra and H.J.A.M. Hejmans, Wavelet tecnques for reversble data embeddng nto mages, Centrum voorwskunde en Informatca Rep. August [0] L. Kamstra and H.J.A.M. Hejmans, Reversble data embeddng nto mages usng wavelet tecnques and sortng, IEEE Trans. on Image Processng vol.4, no.2, pp , December [] D.M. Tod, J.J. Rodrguez, Expanson embeddng tecnques for reversble watermarkng, IEEE Trans. on Image Processng vol.6, no.3, pp , [2] J. Frdrc, M. Goljan, and R. Du, Invertble autentcaton, Proc. of te SPIE, Securty and Watermarkng of Multmeda Contents, vol.434, San Jose, CA, pp , January 200. [3] M.U. Celk, G. Sarma, and A.M. Tekalp, Reversble data dng, Proc. IEEE Internatonal Conf. on Image Processng, Rocester, NY, pp.57 60, [4] M.U. Celk, G. Sarma, A.M. Tekalp, and E. Saber, Lossless generalzed-lsb data embeddng, IEEE Trans. on Image Proc. vol.4, no.2, pp , February [5] Z. N, Y.Q. S, N. Ansar, and W. Su, Reversble data dng, IEEE Transactons on Crcuts and Systems for Vdeo Tecnology vol.6, no.3, pp , Marc [6] J. Hwang, J.W. Km, and J.U. Co, A reversble watermarkng based on stogram sftng, Internatonal Worksop on Dgtal Watermarkng, Lecture Notes n Computer Scence, Sprnger-Verlag, Jeju Island, Korea, vol.4283, pp , [7] W.-C. Kuo, D.-J. Jang, and Y.-C. Huang, Reversble data dng based on stogram, Internatonal Conf. on Intellgent Computng, Lecture Notes n Artfcal Intellgence, Sprnger- Verlag, Qng Dao, Cna, vol.4682, pp.52 6, [8] K.-S. Km, M.-J. Lee, H.-Y. Lee, and H.-K. Lee, Reversble data dng explotng spatal correlaton between subsampled mages, Pattern Recognton, vol.42, pp , [9] X.-R. Luo, C.-H. Jerry Ln, and T.-L. Yn, Reversble data dng based on two-level HDWT coeffcent stograms, Advanced Computng: An Internatonal Journal, vol.2, no., pp.-6, January

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Adaptive Fractal Image Coding in the Frequency Domain

Adaptive Fractal Image Coding in the Frequency Domain PROCEEDINGS OF INTERNATIONAL WORKSHOP ON IMAGE PROCESSING: THEORY, METHODOLOGY, SYSTEMS AND APPLICATIONS 2-22 JUNE,1994 BUDAPEST,HUNGARY Adaptve Fractal Image Codng n the Frequency Doman K AI UWE BARTHEL

More information

Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes

Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY 2006 47 Autentcated AODV Routng Protocol Usng One-Tme Sgnature and Transtve Sgnature Scemes Sd Xu Unversty of Wollongong, Wollongong, Australa Emal: sdx86@uow.edu.au

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

The Cox-Ross-Rubinstein Option Pricing Model

The Cox-Ross-Rubinstein Option Pricing Model Fnance 400 A. Penat - G. Pennacc Te Cox-Ross-Rubnsten Opton Prcng Model Te prevous notes sowed tat te absence o arbtrage restrcts te prce o an opton n terms o ts underlyng asset. However, te no-arbtrage

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

A Suspect Vehicle Tracking System Based on Video

A Suspect Vehicle Tracking System Based on Video 3rd Internatonal Conference on Multmeda Technology ICMT 2013) A Suspect Vehcle Trackng System Based on Vdeo Yad Chen 1, Tuo Wang Abstract. Vdeo survellance systems are wdely used n securty feld. The large

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

Effective wavelet-based compression method with adaptive quantization threshold and zerotree coding

Effective wavelet-based compression method with adaptive quantization threshold and zerotree coding Effectve wavelet-based compresson method wth adaptve quantzaton threshold and zerotree codng Artur Przelaskowsk, Maran Kazubek, Tomasz Jamrógewcz Insttute of Radoelectroncs, Warsaw Unversty of Technology,

More information

Image Compression of MRI Image using Planar Coding

Image Compression of MRI Image using Planar Coding (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Image Compresson of MRI Image usng Planar Codng Laltha Y. S Department of Electroncs & Communcaton Engg. Appa Insttute of Engneerng

More information

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems Proceedngs of the nd Internatonal Conference on Computer Scence and Electroncs Engneerng (ICCSEE 03) Laddered Multlevel DC/AC Inverters used n Solar Panel Energy Systems Fang Ln Luo, Senor Member IEEE

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Vehicle Detection and Tracking in Video from Moving Airborne Platform

Vehicle Detection and Tracking in Video from Moving Airborne Platform Journal of Computatonal Informaton Systems 10: 12 (2014) 4965 4972 Avalable at http://www.jofcs.com Vehcle Detecton and Trackng n Vdeo from Movng Arborne Platform Lye ZHANG 1,2,, Hua WANG 3, L LI 2 1 School

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Texture Analysis and Modified Level Set Method for Automatic Detection of Bone Boundaries in Hand Radiographs

Texture Analysis and Modified Level Set Method for Automatic Detection of Bone Boundaries in Hand Radiographs Texture Analyss and Modfed Level Set Method for Automatc Detecton of Bone Boundares n Hand Radographs Syaful Anam Graduate School of Scence and Engneerng Yamaguch Unversty Yamaguch, Japan Department of

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Document image template matching based on component block list

Document image template matching based on component block list Pattern Recognton Letters 22 2001) 1033±1042 www.elsever.nl/locate/patrec Document mage template matchng based on component block lst Hanchuan Peng a,b,c, *, Fuhu Long b, Zheru Ch b, Wan-Ch Su b a Department

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

E-learning Vendor Management Checklist

E-learning Vendor Management Checklist E-learning Vendor Management Checklist June 2008 Permission is granted to print freely, unmodified, this document from www.doingelearning.com or to copy it in electronic form. If linked to from the net

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Techniques for multi-resolution image registration in the presence of occlusions 1

Techniques for multi-resolution image registration in the presence of occlusions 1 Technques for mult-resoluton mage regstraton n the presence of occlusons organ cgure Harold S. Stone morganm@mt.edu, hstone@research.n.nec.com Abstract Ths paper descrbes and compares technques for regsterng

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

ECE544NA Final Project: Robust Machine Learning Hardware via Classifier Ensemble

ECE544NA Final Project: Robust Machine Learning Hardware via Classifier Ensemble 1 ECE544NA Fnal Project: Robust Machne Learnng Hardware va Classfer Ensemble Sa Zhang, szhang12@llnos.edu Dept. of Electr. & Comput. Eng., Unv. of Illnos at Urbana-Champagn, Urbana, IL, USA Abstract In

More information

An interactive system for structure-based ASCII art creation

An interactive system for structure-based ASCII art creation An nteractve system for structure-based ASCII art creaton Katsunor Myake Henry Johan Tomoyuk Nshta The Unversty of Tokyo Nanyang Technologcal Unversty Abstract Non-Photorealstc Renderng (NPR), whose am

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Forensic Handwritten Document Retrieval System

Forensic Handwritten Document Retrieval System Forensc Handwrtten Document Retreval System Sargur N SRIHARI and Zhxn SHI + Center of Excellence for Document Analyss and Recognton (CEDAR), Unversty at Buffalo, State Unversty of New York, Buffalo, USA

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings

A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings A system for real-tme calculaton and montorng of energy performance and carbon emssons of RET systems and buldngs Dr PAAIOTIS PHILIMIS Dr ALESSADRO GIUSTI Dr STEPHE GARVI CE Technology Center Democratas

More information

SPATIO-FREQUENCY BASED IMAGE WATERMARKING

SPATIO-FREQUENCY BASED IMAGE WATERMARKING STANBUL UNVERSTY JOURNAL OF ELECTRCAL & ELECTRONCS ENGNEERNG YEAR VOLUME NUMBER : 29 : 9 : (93-92) SPATO-FREQUENCY BASED MAGE WATERMARKNG Mahmut ÖZTÜRK Aydın AKAN 2 Yalçın ÇEKĐÇ Eletr-Eletron Mühendslğ

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM

VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM IJRET: Internatonal Journal of Research n Engneerng and Technology eissn: 2319-1163 pissn: 2321-7308 VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM Yogn Ashokrao Kanhegaonkar 1, Jagtap Rupal

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM Internatonal Research Journal of Appled and Basc Scences 2013 Avalable onlne at www.rjabs.com ISSN 2251-838X / Vol, 4 (12):3658-3663 Scence Explorer Publcatons CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE

More information

A Fuzzy Group Decision Making Approach to Construction Project Risk Management

A Fuzzy Group Decision Making Approach to Construction Project Risk Management Internatonal Journal of Industral Engneerng & Producton Researc Marc 03, Volume 4, Number pp. 7-80 ISSN: 008-4889 ttp://ijiepr.ust.ac.r/ A Fuzzy Group Decson Makng Approac to Constructon Project Rsk Management

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Fast degree elevation and knot insertion for B-spline curves

Fast degree elevation and knot insertion for B-spline curves Computer Aded Geometrc Desgn 22 (2005) 183 197 www.elsever.com/locate/cagd Fast degree elevaton and knot nserton for B-splne curves Q-Xng Huang a,sh-mnhu a,, Ralph R. Martn b a Department of Computer Scence

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Network Aware Load-Balancing via Parallel VM Migration for Data Centers

Network Aware Load-Balancing via Parallel VM Migration for Data Centers Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung

More information

QoS-Aware Active Queue Management for Multimedia Services over the Internet

QoS-Aware Active Queue Management for Multimedia Services over the Internet QoS-Aware Actve Queue Management for Multmeda Servces over the Internet I-Shyan Hwang, *Bor-Junn Hwang, Pen-Mng Chang, Cheng-Yu Wang Abstract Recently, the multmeda servces such as IPTV, vdeo conference

More information

SMOOTH TRAJECTORY PLANNING ALGORITHMS FOR INDUSTRIAL ROBOTS: AN EXPERIMENTAL EVALUATION

SMOOTH TRAJECTORY PLANNING ALGORITHMS FOR INDUSTRIAL ROBOTS: AN EXPERIMENTAL EVALUATION 1. Albano LANZUTTI SMOOTH TRAJECTORY PLANNING ALGORITHMS FOR INDUSTRIAL ROBOTS: AN EXPERIMENTAL EVALUATION 1. DIPARTIMENTO DI INGEGNERIA ELETTRICA, GESTIONALE E MECCANICA UNIVERSITA' DI UDINE, UDINE ITALY

More information

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures An ILP Formulaton for Task Mappng and Schedulng on Mult-core Archtectures Yng Y, We Han, Xn Zhao, Ahmet T. Erdogan and Tughrul Arslan Unversty of Ednburgh, The Kng's Buldngs, Mayfeld Road, Ednburgh, EH9

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION

MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION R. SEULIN, F. MERIENNE and P. GORRIA Laboratore Le2, CNRS FRE2309, EA 242, Unversté

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Automated Mobile ph Reader on a Camera Phone

Automated Mobile ph Reader on a Camera Phone Automated Moble ph Reader on a Camera Phone B.Y. Loh, N.K. Vuong, S. Chan and C.. Lau AbstractA robust classfcaton algorthm that apples color scence and mage processng technques s developed to automatcally

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Performance Management and Evaluation Research to University Students

Performance Management and Evaluation Research to University Students 631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Search Efficient Representation of Healthcare Data based on the HL7 RIM

Search Efficient Representation of Healthcare Data based on the HL7 RIM 181 JOURNAL OF COMPUTERS, VOL. 5, NO. 12, DECEMBER 21 Search Effcent Representaton of Healthcare Data based on the HL7 RIM Razan Paul Department of Computer Scence and Engneerng, Bangladesh Unversty of

More information

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow Dragan Smć Svetlana Smć Vasa Svrčevć Invocng and Fnancal Forecastng of Tme and Amount of Correspondng Cash Inflow Artcle Info:, Vol. 6 (2011), No. 3, pp. 014-021 Receved 13 Janyary 2011 Accepted 20 Aprl

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

A Multi-mode Image Tracking System Based on Distributed Fusion

A Multi-mode Image Tracking System Based on Distributed Fusion A Mult-mode Image Tracng System Based on Dstrbuted Fuson Ln zheng Chongzhao Han Dongguang Zuo Hongsen Yan School of Electroncs & nformaton engneerng, X an Jaotong Unversty X an, Shaanx, Chna Lnzheng@malst.xjtu.edu.cn

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

STANDING WAVE TUBE TECHNIQUES FOR MEASURING THE NORMAL INCIDENCE ABSORPTION COEFFICIENT: COMPARISON OF DIFFERENT EXPERIMENTAL SETUPS.

STANDING WAVE TUBE TECHNIQUES FOR MEASURING THE NORMAL INCIDENCE ABSORPTION COEFFICIENT: COMPARISON OF DIFFERENT EXPERIMENTAL SETUPS. STADIG WAVE TUBE TECHIQUES FOR MEASURIG THE ORMAL ICIDECE ABSORPTIO COEFFICIET: COMPARISO OF DIFFERET EXPERIMETAL SETUPS. Angelo Farna (*), Patrzo Faust (**) (*) Dpart. d Ing. Industrale, Unverstà d Parma,

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Intelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS) for Building Security

Intelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS) for Building Security Journal of Computer Scence 3 (5): 274-280, 2007 ISSN 1549-3636 2007 Scence Publcatons Intellgent Voce-Based Door Access Control System Usng Adaptve-Network-based Fuzzy Inference Systems (ANFIS) for Buldng

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

ANALYTICAL CHARACTERIZATION OF WLANS FOR QUALITY-OF-SERVICE WITH ACTIVE QUEUE MANAGEMENT

ANALYTICAL CHARACTERIZATION OF WLANS FOR QUALITY-OF-SERVICE WITH ACTIVE QUEUE MANAGEMENT M USHA AND K MADHANA: ANALYTICAL CHARACTERIZATION OF WLANS FOR QUALITY-OF-SERVICE WITH ACTIVE QUEUE MANAGEMENT ANALYTICAL CHARACTERIZATION OF WLANS FOR QUALITY-OF-SERVICE WITH ACTIVE QUEUE MANAGEMENT M.

More information

Eye Center Localization on a Facial Image Based on Multi-Block Local Binary Patterns

Eye Center Localization on a Facial Image Based on Multi-Block Local Binary Patterns Eye Center Localzaton on a Facal Image Based on Mult-Bloc Local Bnary Patterns Anatoly tn, Vladmr Khryashchev, Olga Stepanova Yaroslavl State Unversty Yaroslavl, Russa anatolyntnyar@gmal.com, vhr@yandex.ru,

More information

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

High Correlation between Net Promoter Score and the Development of Consumers' Willingness to Pay (Empirical Evidence from European Mobile Markets)

High Correlation between Net Promoter Score and the Development of Consumers' Willingness to Pay (Empirical Evidence from European Mobile Markets) Hgh Correlaton between et Promoter Score and the Development of Consumers' Wllngness to Pay (Emprcal Evdence from European Moble Marets Ths paper shows that the correlaton between the et Promoter Score

More information

A Novel Auction Mechanism for Selling Time-Sensitive E-Services

A Novel Auction Mechanism for Selling Time-Sensitive E-Services A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,

More information

Response Coordination of Distributed Generation and Tap Changers for Voltage Support

Response Coordination of Distributed Generation and Tap Changers for Voltage Support Response Coordnaton of Dstrbuted Generaton and Tap Changers for Voltage Support An D.T. Le, Student Member, IEEE, K.M. Muttaq, Senor Member, IEEE, M. Negnevtsky, Member, IEEE,and G. Ledwch, Senor Member,

More information