A Novel and Secure technique for image. Steganography using DWT

Size: px
Start display at page:

Download "A Novel and Secure technique for image. Steganography using DWT"

Transcription

1 Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton n dgtal cover meda n a manner that the exstence of the message s unknown..it s an applcaton under nformaton securty feld.. The am of ths paper s to propose a novel and secure hgh-capacty mage steganography technque that depends on wavelet transform wth acceptable levels of mperceptblty and dstorton n the cover mage and hgh level of overall securty.our method works as follows:frst secrete nformaton s hdden nsde the grey scale mage whle mantanng good vsual qualty and hgh capacty of secret nformaton and then encrypts the mage for securty purpose. Advantage of ths method s full reconstructon of secret data wthout havng orgnal mage present on the recpent sde. Accordng to the smulaton results the proposed approach provdes fne mage qualty and enough embeddng capacty. Furthermore respectable securty s mantaned as well snce no message can be extracted wthout the Key matrx and the decodng rules. Keywords:Steganographynformaton securtydwt I.INTRODUCTION Watermarkng data hdng and steganography are three very closely related felds that share many techncal approaches and possble to have a great deal of overlap. However there are fundamental dfferences between them that affect the overall requrements and thus the desgn of a techncal soluton [1]. Dgtal watermarkng s mostly used n copyrght protecton but steganography s a technque of embeddng the secret message nto a dgtal meda n a manner that the exstence of the message s unknown whch ensure that unntended recpents wll not be aware of the exstence of the embedded secret data n cover meda [2]. So whole system can be consdered as secret communcaton. Concept of steganography s dfferent from cryptography Cryptography encrypts a message wth the help of certan cryptographc algorthms for convertng the secret data nto unntellgble form. whereas steganography hdes the message n cover mage so that t becomes nvsble. Unlke cryptography steganography conceals the fact that there s secret communcaton gong on and stll mage may be represented as well suted dgtal meda for embeddng of secrete data. Even more the advantage of cryptography technques are executed on secret data before embeddng nto stll mage; to strengthen Steganography usng DWT Vkas pratap sngh Prof. Shrkant Lade 5 securty level and also to suppress the energy compacton of secret data [3]. Steganalyss s the scence of detectng hdden nformaton nto dgtal meda. breakng steganography s the man purpose of Steganalyss and the detecton of stego mage s the goal of steganalyss. All steganalyss algorthms depend on the Steganographc algorthms that ntroduce statstcal dfferences between cover and stego mage. Steganalyss deals wth three mportant categores: Vsual attacks: In these types of attacks wth a assstance of a computer or through nspecton wth a naked eye t reveal the presence of hdden nformaton whch helps to separate the mage nto bt planes for further more analyss. Statstcal attacks: These types of attacks are more powerful and successful because they reveal the smallest alteratons n an mages statstcal behavor. Statstcal attacks can be further dvded nto Passve attack and Actve attack. Passve attacks nvolves wth dentfyng presence or absence of a covert message or the embeddng algorthm used etc. whereas the goal of actve attacks s to estmate the embedded message length or the locatons of the hdden message or the secret key used n embeddng. Thrdly structural attacks are based on fact that format of the data fles often changes as the data to be hdden are embedded; on dentfyng these characterstc structure changes can detect the exstence of mage [4]. Research n hdng nformaton nsde mage usng steganography technque has been developed by many researchers for example n [5-10]. Warkentn et al. [5] proposed an method to hde data nsde the audovsual fles. In ther algorthm to hde data the secret message has to be hdden nto a cover mage. El-Emam [6] on the other hand proposed steganography algorthms that hde a large amount of data wth hgh securty. hs steganography algorthm s based on hdng a large amount of data (mage audo text) fle nsde a color btmap (bmp) mage. In hs research the mage wll be fltered and segmented where bts replacement s used on the approprate pxels. These pxels are selected randomly rather than sequentally. Wu et al. [7] used pxel-value dfferencng by parttonng the orgnal mage nto non-overlappng blocks of two consecutve pxels.and hde the message n these blocks. Lee and Chen s method [8] proposed a method n whch the least sgnfcant bt (LSB) of each pxel n the cover mage s modfed to embed a secret message. In Wang et al. s method [9] the optmal substtuton of LSB s exploted.

2 Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 These schemes have a hgher qualty stego-mage but are senstve to modfcaton. Many practcal tests propose to use the Wavelet transform doman for steganography because of a number of advantages that can be ganed by usng ths approach. The use of such transform wll manly address the capacty and robustness of the Informaton- Hdng system features. The work descrbed n ths paper mplements steganography n the Wavelet doman. The herarchcal nature of the Wavelet representaton allows mult-resolutonal detecton of the hdden message whch s a Gaussan dstrbuted random vector added to all the hgh pass bands n the Wavelet doman. It s shown that when subjected to dstorton from compresson the correspondng hdden message can stll be correctly dentfed at each resoluton n the Dscrete Wavelet Transform (DWT) doman [ ]. In ths paper we propose a novel and secure method utlzng the features obtaned from DWT coeffcents to hde secret nformaton n grey scale mage whle mantanng good vsual qualty and hgh capacty of secret nformaton and then encypted the mage for securty purpose. Advantage of ths method s full reconstructon of secret data wthout havng orgnal mage present on the recpent sde. The organzaton of the paper s as follows.. In the next secton we gve overvew of proposed method based on DWT whch coeffcents were used for embeddng wth specfc way. next we descrbe objectve vsual qualty measurements to smulate human percepton whch are PSNR[dB] and MSE modfed by Contrast Senstvty Functon to better reflecton of Human Vsual System (HVS) model. In Secton 5 are gven results of proposed method n manner of PSNR value usng cover mage wth dfferent detal levels.. Fnally we conclude our paper n Secton 6 wth dscusson and contrbuton of our proposed method to the mage steganography. II.PROPOSED IMAGE STEGNAGRAPHY METHOD In ths secton we propose a new frequency doman method for mage steganography. The mert s to ncrease mage qualty by hdng the messages n HL LH and HH sub-bands whle keepng LL sub-band nvarant. The detaled descrpton for both embeddng and extracton s provded n the followng two subsectons step by step. Suppose X s the orgnal 8-bt gray-level cover-mage of M C N C pxels. It s denoted as: X { x 1 M 1 j N x { }}...(1) j C C j let P s the n-bt secret message represented as: P { p 1 n p {01}}...(2) Next use the random number to generate the prvate key of length same as the length of message because the sze of encrypt message s equal to the orgnal message then apply X-OR operator to generate the cpher message of length n bts. Where S P K K { k 1 n k {01}}...(3) and S { s 1 n c {01} and s p k }...(4) A.2 DWT Decomposton Apply DWT on X to obtan the frequency doman matrx H. The 4 sub-bands obtaned are denoted as H LL H HL H LH and H HH (All 4 sub-bands have the same sze of M C /2 N C /2). The coeffcents sutable for embeddng that are elected from detal areas (H HL H LH and H HH ) are also denoted as A. Embeddng procedure A.1 Input secret message and cover mage C { c 1 M 1 j N }...(5) j C C And secret message as S { s 1 n c {01}} that s reszed to same dmenson as C. 6

3 Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A.3 Message Embeddng Stage B. Extractng Algorthm The process of embeddng conssts of comparng the secret message S j wth detal coeffcents C j n form of followng sequence: f S íj == 0 ^ C j mod 1 0 then C j = C j f S íj == 0 ^ C j mod 1 = 0 then C j = sgn(c j )( C j 1/2) f S íj == 1 ^ C j mod 1 0 then C j = sgn(c j )(C j rem(c j )) f S íj == 1^ C j mod 1 = 0 then C j = C j where C j are modfed coeffcents of DWT detal area. A.4 Stego-Sgnal Reconstructon Stage Ths stage all the modfed detaled coffecent are converted back from frequency doman to tme doman. The IDWT s used to reconstruct the segments of stego- mage based on modfed Detaled coeffcent and unmodfed Approxmate coeffcent. After embeddng all secret data and performng nverse DWT (IDWT) on C j the stego mage E s obtaned. A.5 Block Level XOR Operaton Use the stego mage E as the nput for block level XOR operaton and encrypt t usng 4.2 to generate the fnal encrypted mage Y.. The stego mage E s dvded nto 2 pxels 2 pxels blocks. The mage pxel contaned by every block B j of E s encrypted usng block level XOR operaton by four eght bt sub key K 1 K 2 K 3 and K 4. as gven below Respectvely (6) Where P j s the pxel value at th and jth locaton n block nsde pxel of mage.the encrypted mage by usng the XOR operaton s called by cpher mage Y and t s ready to be sent to recever ste. The total sze of key n our algorthm s 32 bt long whch proves to be strong enough.. The extracton process s dvded nto blocks stego segmentaton wave decomposton Coeffcent selecton Message extracton and reverse encrypton. The Quantzaton parameter Q needs to be the same that s used durng encrypton. B.1 Input Encrypted Stego Image In the message recovery algorthm frst we select the stego mage Y from whch data s to be extracted. Let the 8-bt graylevel stego-mage of MC NC pxels s represented as: Y { y 1 M 1 j N y { }}...(7) j C C j B.2 Block Level X-OR Operaton Next Step s to performs the block level X-OR operaton on encrypted stego mage Y by usng the X-OR operaton. Agan we dvded Cpher mage Y nto 2 pxels 2 pxels blocks. Then mage pxel contaned by every pxel B j of Y s Decrypted usng block level X-OR operaton by Same four eght bt keys (K 1 K 2 K 3 K 4 ) as followed: Decrypton P Decrypton P asp K...(8) Decrypton P Decrypton P asp K asp K asp K B.3 DWT Decomposton Next apply DWT on E to obtan the frequency doman matrx H. The 4 sub-bands obtaned are denoted as H LL H LH H L H HH (All 4 sub-bands have the same sze of MC/2 NC/2). Agan Normalzng coeffcents n H HL H LH and H HH subbands as done at the tme of encrypton. B.4 Secret Message Recovery Stage:Secret message recovery stage s very smple and based on modulo operaton of stego mage coeffcents C j n followng way: 7

4 Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October f C' mod 1= 0 '...(9) 0 f C' mod 1 0 S$ j j j B.5 Reverse Encrypton Before delvery of the secret message S to recever t must be converted back to t s orgnal form.to do so frst we use the same random number to generate the prvate key of length same as the length of message then apply X-OR operator to get the orgnal message of length N bts. next we convert message of t s bnary form to text format.and then delver to the recever. C. Qualty Measurement The qualty of the stego mage and the extracted secret mage s measured by calculaton of certan qualty measurement metrcs [13]. These metrcs gves the comparson rato between the orgnal mage and the modfed mage. The qualty may be assessed on the bass of these values. The metrcs used n ths paper are as follows: 1 MSE f j f j MN M N 2 ( ( ) '( ))...(11) 1 j 1 Where f ( j) s the orgnal mage and f ( j) s the stego mage. A large value for MSE means that the mage s of poor qualty. D. Experment Setup Proposed technque are mplemented on Wndows PC havng Intel 2.4 GHz processor and 2GB RAM and run usng Matlab 9a. We have consdered fve dfferent mage fles n ths experment to embed dgtal data. They are Lena.bmp (27.3 KB) Boat.bmp (71.5 KB) Baboon.bmp (61.2 KB) Papper.bmp (192 KB) and Man.bmp (50.8 KB). all the mages are 8 bt gray scale mages and the dmenson of all the mage s pxels shown n Fgure 1. We appled Haar wavelets on cover mage and choose one of the detaled coeffcent where the data s to be hde. C.1 Peak sgnal to nose rato (PSNR) The PSNR depcts the measure of reconstructon of the compressed mage. Ths metrc s used for dscrmnatng between the cover and stego mage [14]. The easy computaton s the advantage of ths measure. It s formulated as: (a) Leena (b) Baboon PSNR 2 10 log 255 / MSE...(10) A low value of PSNR shows that the constructed mage s of poor qualty. (c) Boat (d) Papper C.2 Mean square error (MSE) MSE s one of the most frequently used qualty measurement technque followed by PSNR. The MSE [14] can be defned as the measure of average of the squares of the dfference between the ntenstes of the stego mage and the cover mage. It s popularly used because of the mathematcal tractablty t offers. It s represented as: (e) Man Fgure1: Test Image (256x256 pxels) Used n our Experments III. PERFORMANCE ANALYSIS 8

5 Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 The tests were performed wth a gray standard testng mage Lena and other cover mage depcted n Fg. 1 wth the same sze 256x256 pxels (contanng 64 kb). The secret message what represented by (contanng 2048B). The PSNR values (qualty) of obtaned stego mages (Table 1). The qualty of our method s stego mages s good and acceptable compared to the stego mages qualty of other three steganography methods. / Image Lena Pepper s Baboo n Grl Arpla ne JSteg F In our method we kept a consderable number of coeffcents to represent each block hence stego mages of our method have good qualty. Even though we have slghtly modfed the mddle frequency coeffcents t gves better results than dscardng such coeffcents. However we embedded the secret bts by modfyng low coeffcents; therefore the stego mages of our method have good qualty Table I: The PSNR(dB) of Our proposed Steganography and other method consdered 16x16 Quantza ton Our proposed / Image Lena Peppe rs Baboon Grl Arplane JSteg F JMQT x16 Quantzaton Our proposed The computatonal tme of the proposed method on dfferent test mages wth other steganography methods (Table 2). The runnng tme of our method s almost double of that n the JSteg and JMQT methods. The steganographc capacty and stego mage mperceptblty represent the two man requrements of mage steganography methods (Zhang and Wang 2005). As a result our steganography method provdes larger steganographc capacty and acceptable stego mage qualty whch makes t superor to the other steganography methods tested. Table II: The Executon tme (sec) of Our proposed Steganography and other method consdered IV. CONCLUSIONS The research am of ths dssertaton s to ncrease the steganographc capacty and mprove the qualty of stego mages In ths paper we proposed a novel and secure mage steganography method utlzng the features obtaned from DWT coeffcents. Qualty of embedded mages s ncreased because the secret messages are embedded n the hgh frequency subbands whch human eyes are less senstve to. Accordng to the smulaton results the proposed approach provdes fne mage qualty and enough embeddng capacty. Furthermore respectable securty s mantaned as well snce no message can be extracted wthout the Key matrx and the decodng rules. REFERENCES [1] Vladmír BÁNOCI Gabrel BUGÁR Dušan LEVICKÝ A Novel of Image Steganography n DWT Doman [2]. COX I. J. MILLER M. L. B KALKER T. Dgtal watermarkng and steganography. 2nd ed. Burlngton: Morgan Kaufmann 200BLOOM J. A. FRIDRICH J. 08. [3]N.N. El-Emam. (2007). Hdng a large amount of data wth hgh securty usngsteganography algorthm. Computer Scence. [On-lne]. 3(4) pp [4] Souvk Bhattacharyya Gautam Sanyal A Robust Image Steganography usng DWT Dfference Modulaton (DWTDM) J. Computer Network and Informaton Securty [5]. M. Warkentn M.B. Schmdt E. BekkerngSteganography and steganalyss Premer reference Source Intellectual Property Protecton for Multmeda Informaton technology Chapter XIX 2008 pp [6] N.N. El-Emam Hdng a large amount of data wth hgh securty usng steganography algorthm Journal of Computer Scence 3 (2007)

6 Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 [7] P.C. Wu W.H. Tsa A steganographc method for mages by pxel-value dfferencng Pattern Recognton Letters 24 (2003) [8] LEE Y.K. CHEN L. H. Hgh cap pacty mage model. IEEE Proc. - Vson Image Sgnal Process Vol. 147 no.3 p [9] WANG R. Z. LIN C. F. LIN J. C. Image hdng by optmal LSB substtuton and genetc algorthm. Pattern recog Vol. 34 no. 3 p [10] Blgn A. Sementll J. Sheng F. and MarcellnW. Scalable Image Codng Usng Reversble Integer Wavelet Transforms Computer Journal of Image Processng IEEE Transactons vol. 9 no. 4 pp [11] Tolbal F. Ghonemy A. Taha A. and Khalfa S. Usng Integer Wavelet Transforms n Colored Image Steganography Internatonal Journal on Intellgent Cooperatve Informaton Systems vol. 4 no. 2 pp [12] Walker S. A Premer of Wavelets and Ther Scentfc Applcatons CRC Press [13] Abbas Cheddad Joan Condell Kevn Curran Paul Mc Kevtt Dgtal mage steganography: Survey and analyss of current methods Sgnal Processng 90 (2010) [14] W. Bender D. Gruhl N. Mormoto A. Lu Technques for data hdng IBM Syst. J. 35 (3&4) (1996)

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty

More information

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Robust Block Selection for Watermarking Video Streams

Robust Block Selection for Watermarking Video Streams Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features Recognton of Low-Resoluton Face Images usng Sparse Codng of Local Features M. Saad Shakeel and Kn-Man-Lam Centre for Sgnal Processng, Department of Electronc and Informaton Engneerng he Hong Kong Polytechnc

More information

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES he Internatonal Journal of Multmeda & Its Applcatons (IJMA) Vol.3, No.1, February 211 CONOURLE RANSFORM BASED WAERMARKING FOR COLOUR IMAGES Dnesh Kumar 1 and Vjay Kumar 2 1 Department of Computer Scence

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications

LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications Dhaa Unv. J. Sc. 60(1): 31-36, 2012 (January) LSPIHT Algorthm for ECG Data Compresson and Transmsson for Telemedcne Applcatons Tahmna Zebn, Eramul Faroo, Syeda Znath Aman and Shahda Rafque Department of

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Double-lock for image encryption with virtual optical wavelength

Double-lock for image encryption with virtual optical wavelength Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution 9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the

More information

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain. Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm 0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

Performance Comparison of Product Codes and Cubic Product Codes using FRBS for Robust Watermarking

Performance Comparison of Product Codes and Cubic Product Codes using FRBS for Robust Watermarking Internatonal Journal of Computer Informaton Systems and Industral Management Applcatons. ISSN 250-7988 Volume 8 (206) pp. 057-066 MIR Labs, www.mrlabs.net/jcsm/ndex.html Performance Comparson of Product

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

A Robust Feature Extraction Algorithm for Audio Fingerprinting

A Robust Feature Extraction Algorithm for Audio Fingerprinting A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS Ferdnan Snaga #, Elathamby Ambkarajah # and Andrew P. Bradley* # School of Electrcal Engneerng and Telecommuncatons

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images

Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images Ompraash Rajanar et al, / (IJCSIT) Internatonal Journal of Computer Scence and Informaton Technologes, Vol. 6 (), 015, 1636-164 Generalzed Multple ROI Prortzaton n JPEG000 for Natural Images Ompraash Rajanar

More information

MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM

MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM Journal of Theoretcal and Appled Informaton Technology 2005-2015 JATIT & LLS. All rghts reserved. ISSN: 1992-8645 www.jatt.org E-ISSN: 1817-3195 MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET

More information

Combination of 2D chaotic Encryption and Turbo Coding for Secure Image Transmission

Combination of 2D chaotic Encryption and Turbo Coding for Secure Image Transmission IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.0 o., ovember 00 79 Combnaton of D chaotc Encrypton and Turbo Codng for Secure Image Transmsson M. A. El-Isandaran, Saad M. Darwsh,

More information

Th P5 13 Elastic Envelope Inversion SUMMARY. J.R. Luo* (Xi'an Jiaotong University), R.S. Wu (UC Santa Cruz) & J.H. Gao (Xi'an Jiaotong University)

Th P5 13 Elastic Envelope Inversion SUMMARY. J.R. Luo* (Xi'an Jiaotong University), R.S. Wu (UC Santa Cruz) & J.H. Gao (Xi'an Jiaotong University) -4 June 5 IFEMA Madrd h P5 3 Elastc Envelope Inverson J.R. Luo* (X'an Jaotong Unversty), R.S. Wu (UC Santa Cruz) & J.H. Gao (X'an Jaotong Unversty) SUMMARY We developed the elastc envelope nverson method.

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. The Impact of Spectrum Sensng Frequency and Pacet- Loadng

More information

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

A Heuristic Speech De-noising with the aid of Dual Tree Complex Wavelet Transform using Teaching-Learning Based Optimization

A Heuristic Speech De-noising with the aid of Dual Tree Complex Wavelet Transform using Teaching-Learning Based Optimization ISSN (Prnt) : 39-863 ISSN (Onlne) : 975-44 D. Yugandhar et al. / Internatonal Journal of Engneerng and Technology (IJET) A Heurstc Speech De-nosng wth the ad of Dual Tree Complex Wavelet Transform usng

More information

Improved Error Detection in the JPEG2000 Codec

Improved Error Detection in the JPEG2000 Codec Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence

More information

Compressive Direction Finding Based on Amplitude Comparison

Compressive Direction Finding Based on Amplitude Comparison Compressve Drecton Fndng Based on Ampltude Comparson Rumng Yang, Ypeng Lu, Qun Wan and Wanln Yang Department of Electronc Engneerng Unversty of Electronc Scence and Technology of Chna Chengdu, Chna { shan99,

More information

FFT Spectrum Analyzer

FFT Spectrum Analyzer THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

Low-Delay 16 kb/s Wideband Speech Coder with Fast Search Methods

Low-Delay 16 kb/s Wideband Speech Coder with Fast Search Methods Low-Delay 16 b/s Wdeband Speech Coder wth Fast Search Methods M. HALIMI M. BENGHERABI A. KADDAI Speech Codng eam Centre de Développement des echnologes Avancées Haouch Oul BP. 17 Baba Hassen Algers ALGERIA

More information

Electrical Capacitance Tomography with a Square Sensor

Electrical Capacitance Tomography with a Square Sensor Electrcal Capactance Tomography wth a Square Sensor W Q Yang * Department of Electrcal Engneerng and Electroncs, Process Tomography Group, UMIST, P O Box 88, Manchester M60 QD, UK, emal w.yang@umst.ac.uk

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking

Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking Proposed pproach for Improvng Bluetooth Netorks Securty through SVD udo Watermarkng M.. M. El-Bendary,. Haggag Dept. of Electroncs echnology, Faculty of Industral Educaton, Helan Unversty. Caro, Egypt.

More information

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM Azura Abdullah, Muhammad Sobrun Jaml Jamal, Khazuran Abdullah, Ahmad Fadzl Ismal and An Lza Asnaw Department of

More information

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS Journal of Engneerng Scence and echnology Vol. 7, No. 4 ( 55-56 School of Engneerng, aylor s Unversty SECURE COMMUNICAION BY USING MULIPLE KEYS HAVING VARIABLE LENGH IN A REAL IME ENVIRONMEN FOR MULIPLE

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES

SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L Laval Unversty, Canada COPL, Physcs department Jl@phy.ulaval.ca KEY WORDS: Image Fuson, Evaluaton, Spatal Qualty, Blur Parameter,

More information

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:4, No:, 200 A Hgh-Speed Multplcaton Algorthm Usng Modfed Partal Product educton Tree P Asadee

More information

Wideband Spectrum Sensing by Compressed Measurements

Wideband Spectrum Sensing by Compressed Measurements Wdeband Spectrum Sensng by Compressed Measurements Davood Mardan Najafabad Department of Electrcal Engneerng Yazd Unversty Emal: d.mardan@stu.yazdun.ac.r Al A. Tadaon Department of Electrcal Engneerng

More information

DISTRIBUTED video coding (DVC) [1] [4] is an attractive

DISTRIBUTED video coding (DVC) [1] [4] is an attractive 1040 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 6, JUNE 2013 Dstrbuted Wreless Vsual Communcaton Wth Power Dstorton Optmzaton Xaopeng Fan, Member, IEEE, Feng Wu, Fellow,

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

Pulse Extraction for Radar Emitter Location

Pulse Extraction for Radar Emitter Location 00 Conference on Informaton Scences and Systems, The Johns opkns Unversty, March 3, 00 Pulse Extracton for Radar Emtter Locaton Mark L. Fowler, Zhen Zhou, and Anupama Shvaprasad Department of Electrcal

More information

AN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS

AN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS Journal of Engneerng Scence and Technology Vol., o. 4 (6) 476-495 School of Engneerng, Taylor s Unversty A IMPROVED BIT LOADIG TECHIQUE FOR EHACED EERGY EFFICIECY I EXT GEERATIO VOICE/VIDEO APPLICATIOS

More information

MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM

MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM XIX IMEKO World Congress Fundamental and Appled Metrology September 6 11, 2009, Lsbon, Portugal MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM Potr Blsk 1,2, Wesław Wneck 2 1 Warsaw

More information

DTIC DTIC. 9o o FILE COPY NATIONAL COMMUNICATIONS SYSTEM TECHNICAL INFORMATION BULLETIN 87-8 PULSE CODE MODULATION FOR GROUP 4 FACSIMILE

DTIC DTIC. 9o o FILE COPY NATIONAL COMMUNICATIONS SYSTEM TECHNICAL INFORMATION BULLETIN 87-8 PULSE CODE MODULATION FOR GROUP 4 FACSIMILE DTC FLE COPY NCS TB 87-8 NATONAL COMMUNCATONS SYSTEM q. nm TECHNCAL NFORMATON BULLETN 87-8 N NTRANSFORM CODNG AND DFFERENTAL Qz PULSE CODE MODULATON FOR GROUP 4 FACSMLE DTC ELECTE JUL 10]1! l AUGUST 1987

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

Robust Image Transmission Performed by SPIHT and Turbo-Codes

Robust Image Transmission Performed by SPIHT and Turbo-Codes SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 5, No.2, November 2008, 353-360 Robust Image Transmsson Performed by SPIHT and Turbo-Codes Abdelmounam Moulay Lakhdar, Rachda Mélan 2, Malka Kandouc 2 Abstract:

More information

REMOVAL OF ELECTRODE MOTION ARTIFACT IN ECG SIGNALS USING WAVELET BASED THRESHOLD METHODS WITH GREY INCIDENCE DEGREE

REMOVAL OF ELECTRODE MOTION ARTIFACT IN ECG SIGNALS USING WAVELET BASED THRESHOLD METHODS WITH GREY INCIDENCE DEGREE Removal of Electrode Moton Artfact n Ecg Sgnals Usng Wavelet Based Threshold Methods wth Grey Incdence Degree REMOVAL OF ELECTRODE MOTION ARTIFACT IN ECG SIGNALS USING WAVELET BASED THRESHOLD METHODS WITH

More information

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 8 Vol II IMECS 8, 9- March, 8, Hong ong Estmaton of Crtcal Performance and Optmzaton of Scalable Jont Source/ Coder (SJSCC)

More information

Design of Shunt Active Filter for Harmonic Compensation in a 3 Phase 3 Wire Distribution Network

Design of Shunt Active Filter for Harmonic Compensation in a 3 Phase 3 Wire Distribution Network Internatonal Journal of Research n Electrcal & Electroncs Engneerng olume 1, Issue 1, July-September, 2013, pp. 85-92, IASTER 2013 www.aster.com, Onlne: 2347-5439, Prnt: 2348-0025 Desgn of Shunt Actve

More information

PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN

PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN Crstan V. SERDEAN 1, Martn TOMLINSON 1, Graham J. WADE 2 and Adran M. AMBROZE 1 1 Unversty of Plymouth, Unted Kngdom and 2 The

More information

Beam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods

Beam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods Beam qualty measurements wth Shack-Hartmann wavefront sensor and M-sensor: comparson of two methods J.V.Sheldakova, A.V.Kudryashov, V.Y.Zavalova, T.Y.Cherezova* Moscow State Open Unversty, Adaptve Optcs

More information

Modeling Hierarchical Event Streams in System Level Performance Analysis

Modeling Hierarchical Event Streams in System Level Performance Analysis Modelng Herarchcal Event Streams n System Level Performance Analyss IK Report 9 obas Ren, Ka Lampka, Lothar hele Computer Engneerng and Networks Laboratory Swss Federal Instsute of echnology (EH) Zurch,

More information

Archive of SID. Channel Capacity Analysis of Spread Spectrum Audio Watermarking. M. Khademi

Archive of SID. Channel Capacity Analysis of Spread Spectrum Audio Watermarking.   M. Khademi KHADEMI: CHAEL CAPACITY AALYSIS OF SPREAD SPECTRUM AUDIO WATERMARKIG Channel Capacty Analyss of Spread Spectrum Audo Watermarkng M. Khadem Abstract In ths paper, nformaton-theoretc analyss of spread spectrum

More information

RC Filters TEP Related Topics Principle Equipment

RC Filters TEP Related Topics Principle Equipment RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)

More information

Estimating Mean Time to Failure in Digital Systems Using Manufacturing Defective Part Level

Estimating Mean Time to Failure in Digital Systems Using Manufacturing Defective Part Level Estmatng Mean Tme to Falure n Dgtal Systems Usng Manufacturng Defectve Part Level Jennfer Dworak, Davd Dorsey, Amy Wang, and M. Ray Mercer Texas A&M Unversty IBM Techncal Contact: Matthew W. Mehalc, PowerPC

More information

[Type text] [Type text] [Type text] Wenjing Yuan Luxun Art Academy of Yan an University Xi an, , (CHINA)

[Type text] [Type text] [Type text] Wenjing Yuan Luxun Art Academy of Yan an University Xi an, , (CHINA) [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 19 BoTechnology 2014 An Indan Journal FULL PAPER BTAIJ, 10(19, 2014 [10873-10877] Computer smulaton analyss on pano tmbre ABSTRACT Wenjng

More information

The Application of Interpolation Algorithms in OFDM Channel Estimation

The Application of Interpolation Algorithms in OFDM Channel Estimation The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School

More information

Order-4 Quasi-Orthogonal Cooperative Communication in STFC MB-OFDM UWB

Order-4 Quasi-Orthogonal Cooperative Communication in STFC MB-OFDM UWB Unversty of Wollongong Research Onlne aculty of Engneerng and Informaton Scences - Papers: Part aculty of Engneerng and Informaton Scences 202 Order-4 Quas-Orthogonal Cooperatve Communcaton n STC MB-ODM

More information

Analysis and Characterization of JPEG 2000 Standard for Imaging Devices

Analysis and Characterization of JPEG 2000 Standard for Imaging Devices S. Battato et al.: Analyss and Characterzaton of JPEG 2 Standard for Imagng Devces Analyss and Characterzaton of JPEG 2 Standard for Imagng Devces S. Battato 1, A. R. Bruna 2, A. Buem 2 and A. Castorna

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information