Steganography in JPEG2000 Compressed Images

Size: px
Start display at page:

Download "Steganography in JPEG2000 Compressed Images"

Transcription

1 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed mages s nvestgated n ths research. The challenges of covert communcaton n ths state-of-the-art mage codec are analyzed and a steganographc scheme s then proposed to relably embed hgh-volume data nto the JPEG2000 btstream. A specal mode of JPEG2000 s employed, and ts usage and functons are explaned and justfed. Expermental results are gven to demonstrate the performance of the proposed algorthm. Index Terms Informaton hdng, steganography, JPEG2000. I. INTRODUCTION INFORMATION hdng n dgtal mages, vdeo or audo clps has drawn much attenton n recent years [1]-[3]. Some auxlary nformaton s mplctly combned wth a pece of multmeda data,.e. the host sgnal, to form a composte sgnal for certan nterestng applcatons. Dgtal watermarkng s one type of nformaton hdng. The copyrght related nformaton about the meda data s nserted to enforce ntellectual property rght protecton. Castng a fragle sgnal nto the meda fle to assst detectng or locatng subsequent unauthorzed modfcaton may serve as a potental tool for data authentcaton. The other applcaton s to transmt a large volume of nformaton covertly n a multmeda fle va nformaton hdng technques. The objectve s to delver the data to the ntended recever relably and secretly. We can vew the nnocuous host meda fle as a camouflage to fool possble eavesdroppers or as a secret channel from a communcaton vewpont. The case of covert communcaton can also be termed as steganography, whch s derved from the Greek words meanng covered wrtng. In ths research, we wll focus on steganography n dgtal mages. Two nformaton hdng approaches have been commonly used. One s to cast the nformaton on the magery data wthout takng any fle format nto consderaton. The other s to explctly operate on a specfc mage format. Most of the prevous work n the latter category, such as the methods presented n [4] and [5], was based on JPEG. Ths s partly because that most of the stll mages crculated nowadays are compressed wth JPEG. The other reason s that, as a block DCT codec, JPEG lends tself to a good canddate for nformaton hdng due to ts fxed block structure. Gven that mages are usually compressed before transmsson or storage, nformaton hdng n a compressed data format should be a better choce. The authors are wth the Integrated Meda Systems Center and Department of Electrcal Engneerng-Systems, Unversty of Southern Calforna, Los Angeles, CA Emal: {pochysu,cckuo}@sp.usc.edu. JPEG2000 s an upcomng stll mage codng standard. Ths new standard complements JPEG by provdng several mportant features such as resoluton/qualty progressve mage transmsson, better reslence to bt-errors, and Regon of Interest (ROI) codng, etc. It s beleved that JPEG2000 wll be used wdely and ts rch features wll beneft many emergng applcatons. As many mages wll be compressed by JPEG2000 n the near future, t s worthwhle to nvestgate how to hde hgh-volume data n JPEG2000 compressed mages effcently. Ths s the man objectve of our research. Ths paper s organzed as follows. We frst provde a bref revew of the basc archtecture of JPEG2000 n Secton II, whch should offer suffcent nformaton to help understand our concerns n desgnng an nformaton hdng scheme n ths mage standard. Readers are referred to [6]-[8] for more detals. Then, we wll pont out some challengng ssues of nformaton hdng n JPEG2000 and present a steganographc scheme under ths compresson framework n Secton III to acheve relable covert communcaton. Expermental results wll be shown n Secton IV to demonstrate the feasblty of the proposed method. Fnally, concludng remarks are gven n Secton V. II. REVIEW OF JPEG2000 CODING The block dagram of JPEG2000 s shown n Fg. 1. In the encoder sde, the orgnal mage frst undergoes the forward mage transform, whch ncludes the nter-component transform and the ntra-component transform (.e. the wavelet transform). The resultng wavelet coeffcents are then quantzed and coded. Scalar or Trells Coded Quantzaton s used, whch may cause some nformaton loss f the mage s lossy compressed. The codng paradgm of JPEG2000 can be vewed as a two-tered structure as shown n Fg. 1 and wll be explaned n detal below. Rate control s appled n quantzaton and codng steps to acheve the targeted bt-rate. The decoder sde bascally reverses the operatons by decodng and dequantzng the bt-stream and applyng the nverse mage transform to reconstruct the mage. Now, let us take a closer look at the two-tered codng structure n JPEG2000. We llustrate the concept from the encoder part. In ter-1 codng, the quantzaton ndces for each subband are parttoned nto code blocks, whch are ndependently coded usng a bt-plane coder. More specfcally, the code block s coded one bt-plane at a tme startng from the most sgnfcant bt-plane to the least sgnfcant bt-plane. Each ndvdual bt-plane s coded wth three codng passes. The frst codng pass s the sgnfcance propagaton pass, whch conveys sgnfcance and necessary sgn nformaton for samples that have not yet been found to be sgnfcant and are predcted to become sgnfcant. The Contrbuted Paper Manuscrpt receved September 29, /00 $ IEEE

2 P.-C. Su and C.-C. J. Kuo: Steganography n JPEG2000 Compressed Images 825 second codng pass s the magntude refnement pass. All bts that became sgnfcant n a prevous bt-plane are conveyed n ths pass by usng bnary symbols. The fnal pass s the cleanup pass, n whch all bts that have not yet been coded durng the prevous two passes are encoded. The symbols generated from the sgnfcance propagaton and the magntude refnement passes can be ether raw coded or entropy coded by a context-based adaptve bnary arthmetc coder,.e. MQ coder. The cleanup pass s run-length coded and always processed by the MQ coder. The output of the ter-1 encodng process s therefore a collecton of compact representatons of codng passes for the code blocks. Source Image Expanded Image Forward Transform Inverse Transform Quantzaton Dequantzaton Ter-1 Encoder Ter-1 Decoder Fg. 1. The block dagram of JPEG2000. Ter-2 codng operates on the summary nformaton of code blocks, whch determnes block contrbutons to the fnal code stream. The bt-stream of each code-block s truncated n an optmal way so as to mnmze dstorton subject to the bt-rate constrant. Bascally, truncaton can only happen at the end of a codng pass. Feasble truncaton ponts have been further dentfed as those located wthn the convex hull of the ratedstorton curve. To mnmze the dstorton wth the targeted bt-rate constrant, the exact truncaton pont s chosen from these feasble ones n each block after the statstcs of a collecton of code blocks are avalable. The codng passes are then packaged nto packets and output to form the fnal code stream. The orderng of packets n the code stream facltates progressve transmsson of the mage by fdelty, resoluton or component. Snce the rate dstorton algorthm of the ter-2 codng s appled after all subband samples have been compressed n ter-1 codng, the rate-control mechansm of JPEG2000 can thus be referred to as Post-Compresson Rate- Dstorton (PCRD) optmzaton. Besdes, t should be noted that some codng passes may be dscarded by ths optmzed truncaton procedure so that the ter-2 codng s another prmary source of nformaton loss n the codng path besdes quantzaton. III. INFORMATION HIDING IN JPEG2000 Ter-2 Encoder Ter-2 Decoder Compressed Bt-stream A. Challenges of Informaton Hdng Our objectve s to develop an nformaton hdng scheme under the framework of JPEG2000 so that a hgh volume of data can be secretly transmtted to the ntended recpent n a more relable fashon. Frst, we have to determne an approprate poston n JPEG2000 codng flow for nformaton hdng. From the structure gven n Fg. 1, there are three postons to be consdered. We examne ther sutablty for nformaton hdng below. (1) Image Transform After the ntra-component mage transform, the mage data are transformed to wavelet coeffcents. If we modfy the data at ths stage, the scheme wll be equvalent to many exstng wavelet-based watermarkng algorthms, whch may take other wavelet-based codecs as attacks. For dgtal watermarkng, the payload s usually low, and multple embeddng wth the majorty detecton or the spread-spectrum concept can be appled. The embedded nformaton can thus have suffcent robustness aganst lossy compresson of another codec. However, multple embeddng s not sutable n the data hdng applcaton as the requred payload s hgh and we have to make effcent use of the already lmted bandwdth. (2) Quantzaton Quantzaton s an mportant step n mage compresson, whch reduces certan vsual redundancy for effcent codng. As mentoned n Secton II, quantzaton s the prmary source of nformaton loss. We can avod losng the hdden data due to coarser quantzaton by embeddng them n the quantzaton ndces. Ths soluton works for JPEG (as many JPEG-based nformaton hdng schemes operate on the quantzaton ndces), but s not good for JPEG2000. It should be noted that wavelet-based coders usually truncate the compressed btstream to fulfll the targeted bt-rate. In JPEG2000, PCRD optmzaton strategy s adopted so that the truncaton mechansm s actvated after the whole mage has been compressed. If embeddng the nformaton at ths stage, we cannot predct exactly whch quantzaton ndex or bt-plane of an ndex wll be ncluded n the fnal code stream. The embedded nformaton wll not be perfectly recovered unless the lossless compresson mode s chosen (3) Codng If the nformaton s embedded n the output of ter-2 codng,.e. the JPEG2000 packets, t can be guaranteed that all the embedded nformaton wll be receved wthout error and n a correct order because we avod the two major sources of nformaton loss,.e. quantzaton and bt-stream truncaton. However, we wll have dffculty n modfyng the packets for nformaton embeddng snce the bt-streams may have been compactly compressed by the arthmetc coder. Careless modfcaton could result n falure of expandng the compressed mage. B. Progressvely Embeddng a Hdden Image and Its Drawbacks There does exst a soluton to partally acheve hgh-volume nformaton hdng n wavelet-based codecs. From the prevous dscusson, we know that the hdden nformaton could be lost after the subsequent truncaton of the compressed bt-stream f t s embedded n the quantzaton ndex. However, an ntutve concept ndcates that certan ndces may have a better chance of survval snce they are of more sgnfcance. To be more specfc, wavelet coeffcents n lower frequency subbands are

3 826 usually more mportant than those n hgher frequency bands. An extreme example s resoluton progressve transmsson, n whch lower frequency subbands wll be sent pror to hgher ones. In ths case, lower frequency bands should be preserved well at hgh bt-rates. On the other hand, although some portons of the embedded nformaton may be lost, the recpent can stll receve enough nformaton f the sgnfcant portons are transmtted successfully. Therefore, f the hdden nformaton s a dgtal mage of a smaller sze, we may transmt t by embeddng n the quantzaton ndces. Ths general dea should work n most of the wavelet codecs. We brefly descrbe the dea and factors that should be consdered. Frst of all, we decompose the hdden mage wth the wavelet transform. The number of wavelet decomposng levels and the mage sze should be related to the host mage. For example, f the host mage s 512 by 512 and decomposed wth 3 levels, we may set the rule that the hdden mage s onefourth the sze,.e. 256 by 256, wth the same decomposng levels. We may need to pad the sdes of the hdden mage when ts sze s smaller than requred. Ths strategy s to make sure that no mage specfc nformaton should be necessarly known by the recpent. Besdes, t should be noted that coeffcents n each level be represented by a fxed number of bts, whch s also known by both sdes. Then we embed the wavelet subbands of the hdden mage accordng to ther mportance nto the counterparts n the host mage. Bascally, lower (hgher) frequency subbands of the hdden mage wll be embedded n the lower (hgher) frequency subbands of the host mage. Embeddng s based on modfcaton of lower btplanes of the host quantzaton ndex,.e. replacng ts least sgnfcant bts wth the bts of the hdden nformaton. The number of the bt-planes used for nformaton embeddng wll affect both capacty and qualty of the resultng mage. Embeddng follows certan predefned agreements between the nformaton embedder and the recpent. A rule of thumb s that the sgn of a coeffcent, whch s comparatvely mportant than the magntude, should be embedded more carefully. In addton, bt-planes of lower frequency subbands of the hdden mage should also be better embedded than those of the hgher frequency subbands. Permutaton can be appled to the hdden nformaton before embeddng to ncrease uncertanty. The recpent should be able to permute t back correctly to reconstruct the hdden mage. We should not embed any data n the lowest frequency band,.e. the DC band, of the host mage to avod generatng unpleasant artfacts. Many exstng wavelet-based watermarkng schemes, such as [9] and [10], may emphasze the functon of progressve embeddng/detecton. However, there are some drawbacks n the dea of progressve hdden mage transmsson. Frst of all, we know from the prevous dscusson that many parameters have to be known n advance by both the sender and the recever so that the hdden mage can be correctly extracted and perceved. Nevertheless, f a lot of nformaton has to be shared beforehand between the sender and the recever through a certan sde channel, the steganographc scheme becomes IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 mpractcal. Besdes, f the hdden nformaton s an mage, the eavesdropper may have more chances to detect ts exstence, gven that the characterstcs of an mage are qute dfferent from that of the host sgnal. Encrypton mght not be applcable here snce we cannot guarantee that the hdden nformaton be transmtted wthout errors due to the truncaton of JPEG2000 and the fact that an encrypted bt-stream s usually not robust to any error. The most we can do to ncrease the securty level s to permute the poston of the wavelet coeffcents of the hdden mage as mentoned above. It s not clear how ths permutaton procedure wll prevent the eavesdropper from detectng the hdden mage. Fnally, the requrement of embeddng an mage as the hdden nformaton sgnfcantly lmts the usage of ths algorthm. The embedded nformaton should be general bnary data, n any form such as texts, encrypted bt-streams, raw/compressed mages, or else, to acheve practcal covert communcaton. It s apparent that the method presented above may not meet our requrements. In the followng sectons, we would lke to develop a practcal steganographc scheme to convey hgh-volume general bnary data n a more secret and relable manner. C. Informaton Hdng wth Lazy Mode Codng As analyzed n Secton III-A, n order to transmt general bnary data secretly wthout error, we should embed the hdden nformaton n the JPEG2000 packets. However, we have to avod modfyng the bt-stream that s entropy coded for ts correct decodng. In JPEG2000, a so-called lazy mode codng opton s ntroduced, n whch the arthmetc codng procedure s completely bypassed for most of the sgnfcance and the magntude refnement codng passes. To be more specfc, except for the four most sgnfcant bt-planes, the sgnfcance and magntude refnement passes n the remanng bt-planes are raw coded. Thanks to ths lazy mode codng opton, we propose a steganographc scheme, whch solves all the abovementoned problems to acheve relable covert communcaton n JPEG2000. Ths lazy mode choce for the proposed scheme can be justfed below. It has been observed that, at hgh bt-rates, the symbols produced by the sgnfcance and magntude refnement passes have dstrbutons close to a unform one so that there s no substantal beneft from arthmetc codng. Bypassng the MQ coder can thus reduce the complexty and mprove the executon speed wthout degradng the codng performance. For nformaton hdng, the mages used to host a large volume of data are usually compressed at hgh bt-rates. Therefore, t s approprate to embed the nformaton n JPEG2000 compressed bt-stream wth the lazy mode enabled. Besdes, the hdden nformaton may also be unformly dstrbuted gven that encrypton s usually appled. It turns out that the data n these passes are pretty good canddates for nformaton hdng wth less chance of beng notced. Informaton hdng s acheved by modfyng the data n the codng passes. Among the three types of codng passes, only the magntude refnement passes are chosen n our steganographc scheme. The cleanup passes are defntely

4 P.-C. Su and C.-C. J. Kuo: Steganography n JPEG2000 Compressed Images 827 prohbted snce they are always entropy/run-length coded and modfcaton of them wll cause errors n expandng the btstream. The sgnfcant passes carry the sgnfcance and necessary sgn nformaton. Although the sgnfcant passes may be raw coded, the modfcaton may cause ether sgn flppng or decodng errors as well. The magntude refnement passes carry subsequent bts after the most sgnfcant bt for each sample. When the magntude refnement passes are raw coded, modfcaton of them wll not cause problems. Besdes, the sgnfcant bts or MSB of each sample can act as vsual maskng so that the change of these subsequent bts can be made less obvous. Furthermore, the amount of raw coded magntude refnement passes s qute large so carryng a large payload s achevable. By consderng these factors, we conclude that only the magntude refnement pass s sutable for steganographc purposes. D. Selecton of Refnement Passes for Embeddng In order to avod degradng the composte mage severely, we may only use a subset of the raw coded magntude refnement passes for nformaton embeddng. We descrbe three scenaros of selectng sutable magntude refnement passes as follows. (1) Fxed number of the lowest bt-planes The most straghtforward method s to examne the bt-planes where these raw coded magntude refnement passes are located. Gven that the total number of meanngful bt-planes n a subband s K, whch s sgnaled explctly n the code stream, the modfcaton for nformaton hdng s restraned to those btplanes lower than K-G. The smaller G s assgned, the more btplanes can be modfed so that more hdden nformaton can be carred. Bascally, ths dea s smlar to the common LSB-based nformaton-hdng methodologes, n whch only the lowest few bt-planes are modfed to avod ntroducng vsble artfacts. The subtle dfference s that, n ths steganographc scheme, not all the data n those bt-planes but the data ncluded n the magntude refnement passes are affected by the embeddng process. The advantage of ths embeddng scenaro s ts smple mplementaton snce both the nformaton embeddng and extracton can be done effcently n the ter-2 codng. Besdes, both of the nformaton embedder and extractor only need to know the parameter G to acheve successful secret communcaton. The amount of the nformaton that has to be transmtted through other subsdary channels s thus sgnfcantly reduced. (2) Bt-planes below the MSB A more sophstcated way s to take the MSB of the quantzaton ndex nto account. In ths embeddng scenaro, the dgt of a quantzaton ndex s allowed to be modfed for nformaton hdng f t s located at the bt-plane that s below the MSB of a sample by at least $P$ bt-planes. Ths dea s somewhat analogous to those watermarkng schemes that use the magntude of a host coeffcent to scale the embedded watermark [11]. If a host sgnal s large n magntude, we may modfy t wth a greater scale so that more nformaton or a stronger watermark can be embedded owng to the maskng effect. Therefore, the capacty of the steganographc scheme may thus be mproved wthout further affectng the vsual qualty. In addton, we can ntentonally gnore some bt-planes of certan coeffcents for embeddng due to a more advanced vsual maskng model or ncreased securty concerns. However, the complexty of the mplementaton ncreases accordngly snce the nformaton embeddng/extracton processes become coeffcent-wse, nstead of smply vewng the whole bt-planes as a group. In ths way, the ter-1 codng has to be nvolved n the nformaton embeddng/extracton processes. Besdes, we have to deal wth such problems as the varyng length of the codng passes and the specal patterns reserved for error reslence n a more careful manner. (3) Backward embeddng A better way of selectng sutable magntude refnement passes for steganography s to consder the mportance of these passes to the overall qualty of the compressed mage. The ter-2 codng acheves rate scalablty through multple qualty layers. Each codng pass s ether assgned to one of the layers or dscarded accordng to ts rate-dstorton slope, whch s calculated n the ter-1 codng and passed to the ter-2 codng for organzng the code stream. The codng passes wth larger rate-dstorton slopes are ncluded earler n the lower layers, whle the codng passes wth smaller rate-dstorton slopes are ncluded later n the hgher layers. Our goal s to hde as much nformaton as possble wth the mnmal mpact on the mage qualty. Obvously, the embeddng process should functon n the opposte order of the ter-2 codng by selectng less mportant codng passes earler for modfyng. Therefore, we propose the dea of backward embeddng to take account of the mportance of the passes to the overall mage qualty. After the ter-2 codng determnes the passes that wll be ncluded nto the code stream, an extra procedure embeds the nformaton backward, startng from the last ncluded refnement pass. On one hand, modfyng these nsgnfcant passes may be smlar to dscardng them, whch does not severely affect the mage, compared to those passes ncluded earler n the lower layers. On the other hand, the length of these passes could be larger so that we can actually hde more nformaton. The embeddng procedure can be carred out untl the mage qualty has been degraded wthn an acceptable level. A termnaton pattern may be necessary to sgnal the end of embeddng so that the decoder can learn when to stop extractng the hdden nformaton. E. Issues on Backward Embeddng By consderng the complexty and the performance, we adopt backward embeddng n the proposed steganographc scheme. Wth multple layers beng employed n JPEG2000, backward embeddng can easly select those passes that are less mportant to the compressed mage for nformaton hdng wthout consderng the locaton of the bt-plane and the assocated coeffcent. The embeddng process can thus be done very effcently snce only the ter-2 codng s nvolved n the embeddng process and the codng structure of JPEG2000 can be kept almost the same except that an extra procedure to embed the data n a backward fashon s necessary. It s noteworthy that a major beneft of the proposed JPEG2000

5 828 steganographc scheme over the exstng JPEG schemes s ts controllable rate-dstorton trade-off. Here, the rate means the capacty of the hdden nformaton whle the dstorton s referred to as the addtonal degradaton resultng from the nformaton hdng process. In the exstng JPEG embeddng schemes, the effect on mage qualty due to nformaton hdng s usually unpredctable snce t s dffcult to acheve good rate-control n the JPEG standard. In contrast, our scheme may explot the characterstcs of wavelet-codecs to acheve a better balance between the payload of the hdden nformaton and the resultng mage qualty. As the embeddng process starts from the last ncluded magntude refnement pass, the endng pont of embeddng wll decde the dstorton of the composte mage. A smple scenaro for controllng capacty and dstorton goes as follows. If the mage wll be compressed wth the bt-rate equal to B bpp, we can guarantee that the composte mage wll have the qualty of the mage compressed wth C bpp, where C<B, by embeddng the raw coded magntude refnement passes untl the one that s ncluded n both the bt-stream wth B bpp and the bt-stream wth C bpp. The dea s easy to mplement but the estmaton of the qualty s conservatve snce we do not modfy all the three codng passes n a bt-plane but magntude refnement passes, whch may only occupy a small porton. We can see ths argument from an extreme case that C s equal to 0 whle the resultng composte mage wll stll have a reasonably good qualty. Therefore, to demonstrate the advantages of the proposed JPEG2000 steganographc scheme over other exstng schemes based on the JPEG standard, a more accurate qualty measurement s necessary. If MSE s used as the qualty measure, the most accurate way s to calculate the addtonal dstorton n the spatal (or the mage) doman. However, the complexty s too hgh n ths approach snce we have to expand the compressed btstream several tmes after each embeddng of a pass. A more practcal way s to evaluate the addtonal dstorton n the wavelet doman along wth the generaton of the bt-stream. In JPEG2000, the overall dstorton n terms of MSE of the compressed mage and the orgnal mage can be estmated n the wavelet doman drectly. For each code block, B, the n embedded bt-stream s truncated to the rates, R, wth the truncaton pont, n. The contrbuton from B to the dstorton mprovement n the reconstructed mage s denoted by D n. The overall mage dstorton, D, can be calculated by, n 2 n 2 D = D = { ω ( s [ k] s [ k]) }, (1) b k B where s [k] denotes the subband samples n the code block B, s n [k] denotes the quantzed representaton of these samples assocated wth the truncaton pont n, and ω denotes the b L2-norm of the wavelet bass functon for the subband, b, to whch the code block belongs. Ths approxmaton s vald provded the wavelet transform's bass functons are orthogonal and the quantzaton errors n each of the samples IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 are uncorrelated. Although nether of the assumptons s held perfectly, the estmaton s acceptable n the case of compresson. Followng the same route, we can calculate the addtonal dstorton ntroduced by nformaton hdng. Durng the embeddng process, dstorton happens when the bt flps from 0 to 1 or from 1 to 0,.e. when the orgnal bt and the embeddng bt are dfferent. The addtonal dstorton can then be calculated by the sum of the dfference between the orgnal quantzaton ndex and the ndex after possble bt flppng and scaled wth the quantzaton step sze and the L-2 norm of the wavelet base functon. In the mplementaton, we need not keep the orgnal quantzaton ndex or the resultng ndex to calculate ther dfference but evaluate the dstorton on the fly wth each bt-plane processed. For the same ndex, f a bt n a certan bt-plane changes from 1 to 0, we record t as a negatve change whle f a bt changes from 0 to 1, we vew t as a postve change. The dfference between the ndex values before and after nformaton hdng can be calculated by takng the sum of the postve changes subtracted by the sum of the negatve changes. We gve a quck example. If the orgnal value s 44 (101100) and the value after embeddng s 50 (110010). Each of the postve change and negatve change happens twce. The sum of postve changes wll be = 18 and the sum of negatve changes wll be = 12 so the dfference wll be 6. Ths way of calculaton s straghtforward, and the beneft s ts adaptaton to the bt-plane codng structure. However, the exact determnaton of dstorton comes wth a few drawbacks, whch ncrease the complexty of the mplementaton. Frst of all, the nformaton embeddng process s carred out n the ter-2 codng. At ths stage, what the ter-2 encoder sees s only a bt-stream. It knows nothng more than the poston of the bt-plane or the code-block to whch the pass belongs. When flppng a bt n a pass, we may not know exactly whch coeffcent wll be affected. Ths problem may be solved by passng more nformaton from ter- 1 codng to ter-2 codng. Snce only the raw coded magntude refnement passes wll be embedded wth the hdden nformaton, the ter-1 encoder may have to send extra nformaton to the ter-2 encoder, ndcatng the correspondence between the bt n the pass and ts assocated coeffcent. For a 64 by 64 block, the extra nformaton may be 64 by 64 bts long for each pass wth 1 representng that the pass ncludes the bt nformaton and 0 representng the null nformaton. The encoder s then able to scan wth the same order to dentfy whch coeffcent wll be affected by a certan bt flppng to evaluate the dstorton. Nevertheless, the other problem exsts. We have to keep the dstorton value for each coeffcent n each code block, whch ncreases the memory consumpton sgnfcantly and contradcts the requrement of effcent memory usage n the ter-2 codng. Next, we provde two rough evaluaton methods, whch smply operate n the btplane level and we wll then valdate ther feasblty by comparng them wth the exact dstorton approach. The frst method s to calculate the dstorton by summng

6 P.-C. Su and C.-C. J. Kuo: Steganography n JPEG2000 Compressed Images 829 up MSE of bt flppng n each bt-plane. If a bt flppng happens, we add t to the overall dstorton wthout takng account of the coeffcent. The addtonal dstorton D wth one bt flppng s expressed as 2 2 p 2 D = ω b ( b ) (2 ), (2) where ω s the L-2 norm of the wavelet bass functon, b s the quantzaton step sze assocated wth subband b and p s the bt-plane poston. It s apparent that the dstorton calculated n ths way s only a rough estmaton snce the exact change of the dstorton wth each coeffcent s not recorded and we smply use the sum of the square of the dfference n each bt-plane to estmate the square of the sum of the dfference n each btplane. However, n most of the common cases, we found that many ntermedate terms between bt-planes tend to cancel each other. Besdes, the overestmate and underestmate compensate each other, as the number of the bt-planes s large. Ths method wll thus provde us a pretty good estmaton of the addtonal dstorton ntroduced by nformaton embeddng. The second estmaton method s to utlze the dstorton of each pass calculated durng the ter-1 encodng. The dstorton mprovement of each pass s estmated by the dfference between the dstorton measured before and after ncludng the pass. The dstorton s recorded and then evaluated wth the rate ncrease of ths pass for rate control. We can vew ths step as a measurement of mportance of the pass snce the ncluson of the pass wth large dstorton mprovement makes great mpact on the compressed mage. We beleve that, n nformaton embeddng, f the host sgnal and the hdden sgnal are both of the unform dstrbuton, the dstorton ntroduced by embeddng or modfyng the content of the pass would be very smlar to dscardng the whole pass. Therefore, we may also use ths dstorton measurement of a pass as an estmaton of the dstorton resultng from nformaton embeddng. A clear beneft of ths method s that the overhead of nformaton hdng s made as small as possble snce the embeddng process shares the same procedure of dstorton measurement n the codng process. Besdes, ths estmaton method allows us to measure the dstorton of the host mage even before the secret nformaton s embedded. By usng ths estmaton method, we may predct the dstorton of many mages n advance and choose a more approprate one for hdng the targeted nformaton. It should be noted that the md-pont reconstructon rule s often employed n the dstorton measurement n the ter-1 codng. Informaton hdng, however, results n bt flppng wthout md-pont reconstructon as done n the dequantzaton step. Therefore, we multply the dstorton estmated n the ter-1 codng by 2 as a measurement of the dstorton ntroduced by the modfcaton of ths pass. F. Steganalyss of the Proposed Informaton-Hdng Scheme Unlke dgtal mage watermarkng, robustness s not the man ssue of steganographc applcatons snce we do not b expect the attacker wll modfy the mage content by ether transcodng or other sgnal processng procedures, especally n the case that the secret nformaton s hdden n a compressed fle for storage or crculaton. Capacty, relablty and securty are the three major concerns. In our nformatonhdng scheme wth the JPEG2000 standard, we can guarantee that the secret transmsson be carred out wthout errors by embeddng the nformaton n raw coded magntude refnement passes. We can acheve hgh-volume covert communcaton by choosng an approprate amount of passes for nformaton embeddng. The remanng ssue to be dscussed s the securty of the proposed scheme. In ths secton, we try to play the role of an eavesdropper to clarfy some securty ssues to whch we should pay attenton when desgnng a steganographc scheme. The frst step the eavesdropper may take s to analyze the bt-stream structure. One drawback of the proposed scheme s that the nformaton-hdng procedure s operated n a specal mode of JPEG2000,.e. the lazy mode. Some people may queston that the attacker may suspect the exstence of certan hdden nformaton n the JPEG2000 bt-stream f t s compressed wth the lazy mode. Eventually, ths problem depends on how popular the lazy mode wll be. From our vewpont, the lazy mode codng operaton s very useful n hgh bt-rate mage compresson. The complexty can be sgnfcantly reduced by employng the lazy mode codng because the computatonally expensve MQ codng s bypassed whle codng effcency wll not be affected much, especally n the hgh bt-rate codng, whch s a very possble case for nformaton hdng. The ROI codng may be the only scenaro that the lazy mode s not approprate to be appled. Therefore, we do not see many reasons for not adoptng the lazy mode codng n a broad range of magery applcatons. Next, the eavesdropper may analyze the data n the magntude refnement passes to see f any unusual dstrbuton appears. As mentoned before, the reason why the MQ coder does not mprove codng effcency n the magntude refnement passes n the lower few bt-planes s that the dstrbuton of these data s close to a unform one. Therefore, f we can encrypt or scramble the data n some way so that the hdden nformaton also has a unform dstrbuton, the chance that the eavesdropper can tell the dfference wll be small. However, we have to make sure that some specal patterns desgned for ncreased error reslence n JPEG2000 should not appear n the modfed bt-stream. Asde from the purpose of correct expandng the compressed bt-stream, ths cautous strategy can prevent that the appearance of the mark at the wrong poston reveals the exstence of the hdden nformaton. The eavesdropper may further expand the compressed btstream to see f any abnormal stuaton happens. In the proposed steganographc scheme, we do not change the length of the magntude refnement passes but modfy the bnary content. In general cases, the modfed magntude refnement passes generate the same number of symbols wth the orgnal passes. However, some specal stuatons may happen when more symbols or less symbols are generated than expected.

7 830 Ths comes from the fact that extra bts are added by the encoder to avod generatng error reslence patterns as descrbed before. The naccurate number of symbols wll not affect the normal operaton of the codng but may gve a loophole for the eavesdropper to sense the exstence of the hdden nformaton. Besdes, the bt-stuffng at the end of the pass to comply wth the byte boundary may appear dfferently f embeddng s done n a careless way. We may not embed nformaton nto the bts that are used for bt-stuffng f a unfed bt-stuffng byte s adopted n most of the JPEG2000 coders. In other words, we should only modfy the bts that come from the magntude refnement passes and avod the bts used n the smplfed mplementaton or certan markers to ensure better securty. A more advanced eavesdropper may examne the behavor of wavelet coeffcents to see f possble hdden nformaton exsts. Ths s actually an nterestng topc to nvestgate f nformaton hdng has dfferent effects on wavelet coeffcents from the quantzaton process. We beleve that modfyng the JPEG2000 packets may result n some ntrgung phenomenon on the nverse wavelet transform. We may study ths subject by avod the quantzaton step,.e. by operatng the nformaton-hdng process n the lossless compresson mode. We leave ths part as future research. IV. EXPERIMENTAL RESULTS The mplementaton of our steganographc scheme was based on JASPER [8]. JASPER s a free reference code of JPEG2000 offerng the baselne codng wth an excellent performance and thus serves as a good framework. In the experment, we used the four well-known gray-level mages, Lena, Boat, Peppers and Baboon, as the host mages, all wth the same sze of 512 by 512, to carry the generalzed bnary nformaton. We assume that the mage wll be compressed nto the bt-stream wth a hgh bt-rate,.e. 2 bpp. It should be noted that the length of the bt-stream s not changed by the nformaton-hdng process. In other words, the embeddng process wll only affect the qualty of the mage by modfyng the bt-stream content,.e. certan magntude refnement passes, as descrbed n Secton III-C. Frst of all, we would lke to justfy the clam that the lazy mode codng does not gve an nferor performance compared wth the normal mode n the case of hgh bt-rate mage codng. We compressed Lena, Baboon, Boat and Peppers mages from 0.5 bpp to 2 bpp wth the normal mode and the lazy mode and then compared the PSNR values of the expanded mages n each case. The results are shown n Table I. We see that the dfference of PSNR values s very lmted. It should be noted that the larger dfference, such as Peppers n 2 bpp, comes from the fact that the two compressed bt-streams are dfferent n ther lengths although we have tred to make them as close to the target bt-rate as possble. Ths result may suggest that the lazy mode s applcable n many cases and the compresson/decompresson speed s thus tremendously mproved wthout much qualty degradaton. IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 One of the man advantages of ths steganography scheme over other JPEG-based schemes s ts controllable dstorton durng the process of nformaton embeddng. As we mentoned before, we can estmate the addtonal dstorton n MSE n the wavelet doman qute precsely. However, n order TABLE I THE COMPARISON OF PSNR (DB) USING THE LAZY AND THE NORMAL MODES UNDER VARIOUS BIT-RATES (BPP) Bt-rate Lena n Lena z Boat n Boat z Peppers n Peppers z Baboon n Baboon z Image n : mage compressed wth the normal mode. Image z : mage compressed wth the lazy mode. to smplfy the structure wthout ncreasng memory consumpton, we presented two methods to roughly estmate the dstorton ntroduced by nformaton embeddng,.e. the method one estmatng the overall MSE by addng up errors n each bt-plane and the method two utlzng the exstng dstorton value calculated n the ter-1 codng. We would lke to verfy ther applcablty by some experments. Fgure 2 shows the addtonal MSE measured n Lena, Boat, Peppers and Baboon. The horzontal axs represents the number of magntude refnement passes that are chosen for nformaton hdng. As more passes are modfed for embeddng the secret data, the MSE ncreases accordngly. The dash lnes are the actual MSE whle the plus marks and cross marks show the estmated MSE values calculated by the method one and method two respectvely. We can see that the two methods track the actual dstorton pretty well. They both perform better at the begnnng of the estmaton but worse at the end snce the errors accumulate as more passes are processed. Some calbratng steps may need to be taken to acheve a more accurate measurement. In steganographc applcatons, we are nterested n the relatonshp between the capacty and the resultng composte mage. We embedded the four mages wth the same bnary data and examned the MSE ncrease of the mage due to the embeddng process assocated wth the payload of the hdden nformaton. We can see from Fg. 3 that the capacty vares n the four mages even though they are compressed wth the same rato. Ths phenomenon should not be too surprsng snce the compresson affects mages n dfferent ways. In our scheme, the capacty s eventually determned by the number of magntude refnement passes that are raw coded so the dstrbuton of the data across the three passes wll affect the payload. Fg. 3 also shows that, wth more nformaton beng embedded, the MSE value grows as expected. However, they do not relate to each other lnearly. We take Lena as an example. Embeddng the frst 3000 bytes of the bnary data only results n about 1 addtonal MSE of each pxel n average

8 P.-C. Su and C.-C. J. Kuo: Steganography n JPEG2000 Compressed Images 831 but embeddng the next 1000 bytes quckly ncreases the MSE to 2. The last 100 bytes even cause the MSE to change by more than 9. Therefore, the embeddng process should evaluate ths curve to decde how much nformaton s approprate to be embedded. It should be noted that the MSE ncrease may be roughly estmated n conjuncton wth the embeddng process so that we can stop embeddng at the pont that a mnmal acceptable qualty s reached. result demonstrates the benefts of backward embeddng, n whch the less mportant refnement passes are used to carry the more mportant nformaton of the hdden mage owng to the layered structure of JPEG2000. Progressve transmsson of the hdden mage can thus be acheved. At the begnnng of the embeddng, the composte mage degrades lttle whle the PSNR of the hdden mage boosts quckly. At the latter part of the embeddng, the large sacrfce of the composte mage only helps to mprove the fner detal of the hdden mage so the ncrease of the PSNR value s lmted. Under ths scenaro, the embeddng process should proceed untl both the composte and the hdden mages have an acceptable qualty. (a) (b) V. CONCLUSION A steganographc scheme was proposed to hde a large volume of data nto JPEG2000 compressed mages for covert communcaton. Several desgn ssues were examned to help acheve relable nformaton hdng n ths state-of-the-art mage codng standard. Expermental results showed the practcablty of the proposed algorthms and the decent performance. Progressve transmsson of the hdden nformaton was also demonstrated. As future extenson, we would lke to apply a more rgorous steganalyss to the proposed scheme to further ensure ts securty. (c) (d) Fg. 2. Addtonal MSE estmaton of (a) Lena, (b) Boat, (c) Peppers and (d) Baboon. Fg. 4. PSNR of the composte mage vs. PSNR of the hdden mage Fg. 3. Capacty vs. addtonal MSE of the composte mage. Snce the payload s qute large n our experment, we may consder usng an mage wth a smaller sze as the ntended bnary data for nformaton embeddng. We compressed the mage, F-16 (128 by 128), nto a JPEG2000 bt-stream and embedded t nto the four host mages. The relatonshp between the PSNR of the composte mage and that of the hdden mage along wth embeddng s shown n Fg. 4. The REFERENCES [1] W. Bender, D. Gruhl, N. Mormoto and A. Lu, Technques for data hdng, IBM System Journal, vol. 35, no. 3, pp , [2] M. D. Swanson, M. Kobayash and A. H. Tewfk, Multmeda data embeddng and watermarkng technologes, Proc. IEEE, vol. 86, pp , [3] F. Hartung and M. Kutter, Multmeda watermarkng technques, Proc IEEE, vol. 87, no. 2, pp , [4] M. Hollman, N. Memon, B.-L. Yeo and M. Yeung, Adaptve publc watermarkng of DCT-based compressed mages, n Proc. SPIE Photoncs West, Securty and Watermarkng of Multmeda Contents, San Jose, CA, Jan [5] C. I. Podlchuk and W. Zeng, Watermarkng of the JPEG bt-stream, n Proc.Internatonal Conference Image Scence, Systems and Technology, Las Vegas, NV, June 1997.

9 832 [6] D. Taubman, Hgh performance scalable mage compresson wth EBCOT, IEEE Trans. on Image Processng, vol. 9, no. 7 pp , July [7] C. Chrstopoulos, A. Skodras and T. Ebrahm, The JPEG2000 stll mage codng system: An overvew, IEEE Trans. on Consumer Electroncs, vol. 46, no. 4, pp , Nov [8] M. D. Adams, The JPEG-2000 stll mage compresson standard, ISO/IEC JTC 1/SC 29/WG 1, Tech. Rep., Sep [9] X. G. Xa, C. G. Boncelet and G.R. Arce, A multresoluton watermark for dgtal mages, n Proc. IEEE Internatonal Conference on Image Processng, vol. 1, Santa Barbara, CA, July [10] M.D. Swanson, B. Zhu and A. H. Tewfk, Multresoluton scene-based vdeo watermarkng usng perceptual models, IEEE Journal Selected Areas n Communcatons, vol. 16, pp , May [11] I. J. Cox, F. T. Leghton and T. Shamoon, Secure spread spectrum watermarkng for multmeda, IEEE Trans. on Image Processng, vol. 6, no. 12, IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Po-Chy Su was born n Tape, Tawan n He receved the B.S. degree from the Natonal Tawan Unversty, Tape, Tawan, n 1995 and the M.S. and Ph.D. degrees from the Unversty of Southern Calforna, Los Angeles, n 1998 and 2003, respectvely, all n Electrcal Engneerng. Hs research nterests nclude nformaton hdng, dgtal mage processng and mage/vdeo compresson. C.-C. Jay Kuo receved the B.S. degree from the Natonal Tawan Unversty, Tape, n 1980 and the M.S. and Ph.D. degrees from the Massachusetts Insttute of Technology, Cambrdge, n 1985 and 1987, respectvely, all n Electrcal Engneerng. Dr. Kuo was Computatonal and Appled Mathematcs (CAM) Research Assstant Professor n the Department of Mathematcs at the Unversty of Calforna, Los Angeles, from October 1987 to December Snce January 1989, he has been wth the Department of Electrcal Engneerng-Systems and the Sgnal and Image Processng Insttute at the Unversty of Southern Calforna, where he currently has a jont appontment as Professor of Electrcal Engneerng and Mathematcs. Hs research nterests are n the areas of dgtal sgnal and mage processng, audo and vdeo codng, wavelet theory and applcatons, multmeda technologes and large-scale scentfc computng. He has authored around 500 techncal publcatons n nternatonal conferences and journals, and guded more than 50 students to ther Ph.D. degrees. Dr. Kuo s a member of SIAM, ACM, a Fellow of IEEE and SPIE. He s the Edtor-n- Chef for the Journal of Vsual Communcaton and Image Representaton. Dr. Kuo receved the Natonal Scence Foundaton Young Investgator Award (NYI) and Presdental Faculty Fellow (PFF) Award n 1992 and 1993, respectvely.

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract

More information

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

A Novel and Secure technique for image. Steganography using DWT

A Novel and Secure technique for image. Steganography using DWT Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images

Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images Ompraash Rajanar et al, / (IJCSIT) Internatonal Journal of Computer Scence and Informaton Technologes, Vol. 6 (), 015, 1636-164 Generalzed Multple ROI Prortzaton n JPEG000 for Natural Images Ompraash Rajanar

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel

More information

Improved Error Detection in the JPEG2000 Codec

Improved Error Detection in the JPEG2000 Codec Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 8 Vol II IMECS 8, 9- March, 8, Hong ong Estmaton of Crtcal Performance and Optmzaton of Scalable Jont Source/ Coder (SJSCC)

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION Vncent A. Nguyen Peng-Jun Wan Ophr Freder Computer Scence Department Illnos Insttute of Technology Chcago, Illnos vnguyen@t.edu,

More information

Robust Block Selection for Watermarking Video Streams

Robust Block Selection for Watermarking Video Streams Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. The Impact of Spectrum Sensng Frequency and Pacet- Loadng

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H

Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H Delay Constraned Fuzzy Rate Control for Vdeo Streamng over DVB-H Mehd Rezae, Moncef Gabbouj, 3 med Bouazz,, Tampere Unversty of Technology, 3 Noka Research Center, Tampere, Fnland mehd.rezae@tut.f, moncef.gabbouj@tut.f,

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Double-lock for image encryption with virtual optical wavelength

Double-lock for image encryption with virtual optical wavelength Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1 Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

Multiple Error Correction Using Reduced Precision Redundancy Technique

Multiple Error Correction Using Reduced Precision Redundancy Technique Multple Error Correcton Usng Reduced Precson Redundancy Technque Chthra V 1, Nthka Bhas 2, Janeera D A 3 1,2,3 ECE Department, Dhanalakshm Srnvasan College of Engneerng,Combatore, Tamlnadu, Inda Abstract

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty

More information

Encoder and Decoder Side Global and Local Motion Estimation for Distributed Video Coding

Encoder and Decoder Side Global and Local Motion Estimation for Distributed Video Coding Encoder and Decoder Sde Global and Local Moton Estmaton for Dstrbuted Vdeo Codng Frederc Dufaux, Touradj Ebrahm MultMeda Sgnal Processng Group Ecole Polytechnque Fédérale de Lausanne (EPFL) CH-1015 Lausanne,

More information

An Adaptive Over-current Protection Scheme for MV Distribution Networks Including DG

An Adaptive Over-current Protection Scheme for MV Distribution Networks Including DG An Adaptve Over-current Protecton Scheme for MV Dstrbuton Networks Includng DG S.A.M. Javadan Islamc Azad Unversty s.a.m.javadan@gmal.com M.-R. Haghfam Tarbat Modares Unversty haghfam@modares.ac.r P. Barazandeh

More information

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION Albert M. Chan, Jon Feldman, and Raghu Madyastha (Vanu, Inc., Cambrdge, MA, USA, {chanal,jonfeld,raghu}@vanu.com); Potr Indyk and Davd

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

Hierarchical Generalized Cantor Set Modulation

Hierarchical Generalized Cantor Set Modulation 8th Internatonal Symposum on Wreless Communcaton Systems, Aachen Herarchcal Generalzed Cantor Set Modulaton Smon Görtzen, Lars Schefler, Anke Schmenk Informaton Theory and Systematc Desgn of Communcaton

More information

arxiv: v1 [cs.lg] 8 Jul 2016

arxiv: v1 [cs.lg] 8 Jul 2016 Overcomng Challenges n Fxed Pont Tranng of Deep Convolutonal Networks arxv:1607.02241v1 [cs.lg] 8 Jul 2016 Darryl D. Ln Qualcomm Research, San Dego, CA 92121 USA Sachn S. Talath Qualcomm Research, San

More information

Robust Image Transmission Performed by SPIHT and Turbo-Codes

Robust Image Transmission Performed by SPIHT and Turbo-Codes SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 5, No.2, November 2008, 353-360 Robust Image Transmsson Performed by SPIHT and Turbo-Codes Abdelmounam Moulay Lakhdar, Rachda Mélan 2, Malka Kandouc 2 Abstract:

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES *

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * SLAC PUB 874 3/1999 THE GENERATION OF 4 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * Sam G. Tantaw, Arnold E. Vleks, and Rod J. Loewen Stanford Lnear Accelerator Center, Stanford Unversty P.O. Box

More information

DISTRIBUTED video coding (DVC) [1] [4] is an attractive

DISTRIBUTED video coding (DVC) [1] [4] is an attractive 1040 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 6, JUNE 2013 Dstrbuted Wreless Vsual Communcaton Wth Power Dstorton Optmzaton Xaopeng Fan, Member, IEEE, Feng Wu, Fellow,

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

PERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER. Chirala Engineering College, Chirala.

PERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER. Chirala Engineering College, Chirala. PERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER 1 H. RAGHUNATHA RAO, T. ASHOK KUMAR & 3 N.SURESH BABU 1,&3 Department of Electroncs and Communcaton Engneerng, Chrala Engneerng College,

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS Pedro Godnho and oana Das Faculdade de Economa and GEMF Unversdade de Combra Av. Das da Slva 65 3004-5

More information

POWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION

POWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION POWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION Ruqn Xong 1, Feng Wu, Xaopeng Fan 3, Chong Luo, Swe Ma 1, Wen Gao

More information

A Simple Satellite Exclusion Algorithm for Advanced RAIM

A Simple Satellite Exclusion Algorithm for Advanced RAIM A Smple Satellte Excluson Algorthm for Advanced RAIM Juan Blanch, Todd Walter, Per Enge Stanford Unversty ABSTRACT Advanced Recever Autonomous Integrty Montorng s a concept that extends RAIM to mult-constellaton

More information

A NEW TRANSMISSION STRATEGY FOR SCALABLE MULTIMEDIA DATA ON OFDM SYSTEMS

A NEW TRANSMISSION STRATEGY FOR SCALABLE MULTIMEDIA DATA ON OFDM SYSTEMS 15th European Sgnal Processng Conference (EUSIPCO 27), Poznan, Poland, September 3-7, 27, copyrght by EURASIP A NEW TRANSMISSION STRATEGY FOR SCALABLE MULTIMEDIA DATA ON OFDM SYSTEMS Heykel Houas, Cléo

More information

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,

More information

RC Filters TEP Related Topics Principle Equipment

RC Filters TEP Related Topics Principle Equipment RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network Relevance of Energy Effcency Gan n Massve MIMO Wreless Network Ahmed Alzahran, Vjey Thayananthan, Muhammad Shuab Quresh Computer Scence Department, Faculty of Computng and Informaton Technology Kng Abdulazz

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications

LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications Dhaa Unv. J. Sc. 60(1): 31-36, 2012 (January) LSPIHT Algorthm for ECG Data Compresson and Transmsson for Telemedcne Applcatons Tahmna Zebn, Eramul Faroo, Syeda Znath Aman and Shahda Rafque Department of

More information

On the Feasibility of Receive Collaboration in Wireless Sensor Networks

On the Feasibility of Receive Collaboration in Wireless Sensor Networks On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN Internatonal Journal of Scentfc & Engneerng Research, Volume 4, Issue, November-203 ISSN 2229-558 33 COMPARATIVE STUDY OF HUFFMAN CODING, SBAC AND CABAC USED IN VARIOUS VIDEO CODING STANDARS AND THEIR

More information

Motion Vector Recovery for Real-Time H.264 Video Streams

Motion Vector Recovery for Real-Time H.264 Video Streams Internatonal J. of Recent Trends n Engneerng and Technology, Vol., No., May 2 Moton Vector Recovery for Real-Tme H.264 Vdeo Streams Kavsh Seth, Tummala Rajesh, V. Kamakot 2, and S. Srnvasan Dept. of Electrcal

More information

@IJMTER-2015, All rights Reserved 383

@IJMTER-2015, All rights Reserved 383 SIL of a Safety Fuzzy Logc Controller 1oo usng Fault Tree Analyss (FAT and realablty Block agram (RB r.-ing Mohammed Bsss 1, Fatma Ezzahra Nadr, Prof. Amam Benassa 3 1,,3 Faculty of Scence and Technology,

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

Electrical Capacitance Tomography with a Square Sensor

Electrical Capacitance Tomography with a Square Sensor Electrcal Capactance Tomography wth a Square Sensor W Q Yang * Department of Electrcal Engneerng and Electroncs, Process Tomography Group, UMIST, P O Box 88, Manchester M60 QD, UK, emal w.yang@umst.ac.uk

More information

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain. Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal

More information

NETWORK 2001 Transportation Planning Under Multiple Objectives

NETWORK 2001 Transportation Planning Under Multiple Objectives NETWORK 200 Transportaton Plannng Under Multple Objectves Woodam Chung Graduate Research Assstant, Department of Forest Engneerng, Oregon State Unversty, Corvalls, OR9733, Tel: (54) 737-4952, Fax: (54)

More information

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng

More information

Clustering Based Fractional Frequency Reuse and Fair Resource Allocation in Multi-cell Networks

Clustering Based Fractional Frequency Reuse and Fair Resource Allocation in Multi-cell Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE ICC 21 proceedngs Clusterng Based Fractonal Frequency Reuse and Far Resource

More information

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution 9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

DTIC DTIC. 9o o FILE COPY NATIONAL COMMUNICATIONS SYSTEM TECHNICAL INFORMATION BULLETIN 87-8 PULSE CODE MODULATION FOR GROUP 4 FACSIMILE

DTIC DTIC. 9o o FILE COPY NATIONAL COMMUNICATIONS SYSTEM TECHNICAL INFORMATION BULLETIN 87-8 PULSE CODE MODULATION FOR GROUP 4 FACSIMILE DTC FLE COPY NCS TB 87-8 NATONAL COMMUNCATONS SYSTEM q. nm TECHNCAL NFORMATON BULLETN 87-8 N NTRANSFORM CODNG AND DFFERENTAL Qz PULSE CODE MODULATON FOR GROUP 4 FACSMLE DTC ELECTE JUL 10]1! l AUGUST 1987

More information

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS Ferdnan Snaga #, Elathamby Ambkarajah # and Andrew P. Bradley* # School of Electrcal Engneerng and Telecommuncatons

More information