A Novel DCT-based Approach for Secure Color Image Watermarking

Size: px
Start display at page:

Download "A Novel DCT-based Approach for Secure Color Image Watermarking"

Transcription

1 A Novel DCT-based Aroach for Secure Color Image Watermarkng Narges Ahmd Amrkabr Unversty of Technology Reza Safabakhsh Amrkabr Unversty of Technology Abstract In ths aer, focusng on vsually meanngful color mage atermarks, e construct a ne dgtal atermarkng scheme based on the Dscrete Cosne transformaton. The roosed method uses the senstvty of human eyes to adatvely embed a atermark n a color mage. In addton, to revent tamerng or unauthorzed access, a ne atermark ermutaton functon s roosed, hch causes a structural nose over the extracted atermark. Also, e have roosed a rocedure to elmnate ths nose to decrease false ostves and false negatves n the extracted atermark. The exermental results sho that embeddng the color atermark adated to the orgnal mage roduces the most mercetble and the most robust atermarked mage under geometrc and valumetrc attacks.. Introducton The rad evoluton of the Internet technology makes the transmsson of dgtal multmeda content easer. So, dgtal atermarkng technques are roosed for coyrght rotecton or onersh dentfcaton of dgtal meda. A dgtal atermarkng technque must meet the follong three requrements: Imercetblty: Accordng to the Human Vsual System (HVS) arameters, the atermark embedded n the dgtal mage should be ercetually nvsble to human eyes. Robustness: The embedded atermark must be dffcult (hoefully mossble) to detect or delete, and any attack should result n severe degradaton n fdelty. Securty: The securty of the atermarkng system reles on the use of secret keys knon exclusvely by the coyrght oner. All the arameters usng n embeddng rocess can be a art of secret key. These keys are requred n the extracton rocess. In general, there s a tradeoff beteen the atermark embeddng strength (the atermark robustness) and qualty (the atermark nvsblty). Increased robustness requres a stronger embeddng, hch n turn ncreases the vsual degradaton of the mages. The roosed atermarkng scheme adots a color mage as the atermark so human eyes can easly verfy the extracton of ths vsually meanngful atermark. In general, a color mage can rovde more ercetual nformaton [].e. suffcent evdence aganst any llegal coyrght nvason. In sectons and 3, e ll descrbe the roosed embeddng and extracton rocesses. Secton 5 gves the exermental results. We have evaluated robustness and nvsblty of the roosed scheme and comared them to those of Tsa's [], s [,5], Frdrch's [3, 6] and 's [4] methods under varous attacks such as JPEG lossy comresson, medan flterng and crong.. Embeddng Process As shon n Fg., the roosed rocess embeds an M M color atermark mage W n an N N orgnal mage X usng secret keys K for better securty. All the relatons used n the embeddng rocess are nvertble. The follong aragrahs descrbe the model brefly. Y X W Secret keys (K) IDCT RGB YIQ Yˆ X Y Permutaton Yˆ DCT Embeddng aa DCT Fgure. The roosed embeddng rocess Intally, the orgnal mage X s converted to the NTSC color sace. One of the man advantages of the NTSC color sace s that the grayscale nformaton s searated from color data; as a result, the same sgnal can be used for both color and black-and-hte mages. Then the orgnal mage lumnance comonent Y s dvded nto non-overlang 8 8-xels blocks, and each block s ndeendently transformed to frequency doman reresentaton through D-DCT. W Frequency selecton Ŵ Ŷ mf Adataton Unt HVS Proceedngs of the Internatonal Conference on Informaton Technology: Codng and Comutng (ITCC 4)

2 A beneft of such a scheme s that f the mages are stored as comressed JPEG bt streams, the atermark can be nserted drectly nto the artally decomressed bt stream...mddle -frequency coeffcents selecton DCT concentrates the sgnal energy n the lo-frequency bands. So, embeddng the atermark n loer frequences roduces more robust atermarked mages th loer qualty. Hence, to meet both the nvsblty and robustness requrements, mddle-frequency coeffcents of the transformed blocks are selected n a zgzag order to embed the dgtal atermark n. The total number of selected coeffcents n each block, denoted as t, s determned by Eq. () []. t = ( 8M / N ) The frst coeffcent s selected randomly usng a secret key K as the seed of a seudo-random number generator (PRNG). All the selected coeffcents comose a transformed M M mageŷ mf. Furthermore, by usng a seed value K, the oston of each coeffcent n the related block n Ŷ mf s selected... Permutaton of the atermark For gettng more securty and more robustness W must be shuffled before embeddng nto X []. Usng a random ermutaton ll add a nose to the extracted atermark (Fg. 6). Here, e roose a D ermutaton functon that generates a structural nose over the extracted atermark that can be modeled (Fg. 8). Consequently, e roose a ost-rocessng algorthm to elmnate ths nose. Ths algorthm ll be descrbed n secton 3. The roosed ermutaton functon s nsred from automorhsm. A one-arameter automorhsm s as follos [8]: = j k3 mod M 3 k + j It means that each xel at coordnates (, j) of the atermark mage s moved to (, j ) usng Eq. (). The number of transformatons erformed on the atermark mage (K 4 )and k 3 are ket as secret keys. In the mage ermutaton alcatons, ths functon s erodc th erod R. The erod deends only uon the arameters k 3 [, M-] and M. Fgure shos the erodc roerty of the ermutaton here arameters of Eq. () are k 3 = and M=8. It shos that for these arameters the erod s equal to 96. () () (c) Fgure. Permuted atermark after tmes th Eq. (), here a) =, b) =5, and c) =96.3. Adatng atermark to the orgnal mage For more securty and mercetblty, the atermark strength must deend on the ntensty values of the DCT coeffcents of the orgnal mage. In ths ay, the atermark sgnal ll be strengthened n large DCT values, and attenuated n small ones. Ths adataton rocedure s fulflled through the follong stes: ) Snce the number of blocks n both the atermark mage and the orgnal mages must be equal, the ermuted atermark s dvded nto non-overlang nxn blocks, here n = 8M / N. Then each block s DCT transformed ndvdually to obtan Ŵ. ) A block-based mean s calculated over Ŵ usng Eq. (3). ( M / n ) f ( ) ( ) ˆ = W = (3) ( M / n ) here reresents the block number and W ˆ ( ) s the th block n Ŵ, and f () s an nxn matrx used for the eghted averagng. The result ( Ŵ ) s an nxn matrx. 3) Usng Eq. (5), Each block n Ŵ s normalzed and then adated to Ŷ mf by multlyng t by Yˆ mf hch s the mean of all coeffcents n Ŷ mf. ( ) a = Yˆ mf (4).4. Inserton rocess A good vsual model should rovde the maxmum atermark strength and sze that can be nserted thout vsual dstortons. We roose Eq. (5) for embeddng the adated atermark n a Ŷ mf. ˆ ˆ aa ( ) = Ymf ( ) + α W a ( ), α (5) Here, reresents the current block number, and α s calculated va HVS arameters to meet nvsblty and robustness requrements. Consequently, a one-to-one relacement of each coeffcent n th the corresondng one n Ŷ s aa erformed to obtan Ŷ. Ths rocedure needs the secret Proceedngs of the Internatonal Conference on Informaton Technology: Codng and Comutng (ITCC 4)

3 keys K and K, and the zgzag attern to fnd the exact lace of each coeffcent. If the amltude of such atermarkng scheme ( α ) s ncreased to thart flterng attacks for a robustness, the atermark may become vsble. The just notceable dfference threshold (JND) α can be used to determne the maxmum amount of the atermark sgnal that can be tolerated at each regon n the mage thout affectng ts vsual qualty. In an mage-deendent adataton, α s calculated based on HVS roertes: frequency senstvty, lumnance senstvty and contrast maskng. We ll sho that α s ndeendent from the orgnal mage. Fnally, an 8 8 nverse-dct s aled to Yˆ to obtan NTSC format of the atermarked mage ( Y ). Consequently, th a color sace converson the atermarked mage ( X ll be obtaned. 3. Extracton Process The detecton rocess roosed n ths aer s dected n Fg. 3. The recovered atermark W ~ s extracted from the ossbly dstorted mage X ~ usng the orgnal magex and the secret keys. Secret keys (K) X ~ YIQ Y DCT Yˆ Frequency selecton Inverse W ~ Post -rocess Fgure 3. The roosed extracton rocess Intally, the attacked atermarked mage X ~ s converted to the NTSC color sace and then dvded nto non-overlang 8 8 blocks, and each block s DCT transformed ndeendently to obtan Y ˆ. After extractng t coeffcents from each block n Y ˆ, reverse adataton ll be aled to obtan W ~ W ~ IDCT ~ Inverse W Adataton ~ W aa W ˆ aa and W ~, resectvely. Next, the nverse DCT can be aled to each n n block n W ~ to obtan the satal-doman atermark mage W ~. Fnally, functon s erformed (R-K 4 ) tmes over W ~ to obtan the embedded atermark (W ~ ). A more relable detecton rocess has loer false ostves and false negatves n the extracted atermark. So, e roose a ost-rocessng rocedure to obtan a X hgher qualty atermark, esecally for human eyes. The roosed extracton scheme decreases both false negatves and false ostves. 4. Evaluaton Process By usng W ~ and the regstered atermark W, the arbtrator can verfy the onersh of the orgnal mage. The evaluaton of the atermarked mage nvsblty s calculated th Masked Peak Sgnal to Nose Rato (MPSNR) that s a ercetual qualty metrc that exlots the contrast senstvty and maskng henomena of the HVS and s based on a mult-channel model of the human satal vson [7]. Mc MPSNR ( vdb) = log( ) (6) MSE here MSE s the Mean Squared-Error beteen X and X. Values of X are beteen and Mc. The extracted atermark robustness s evaluated by Normalzed Correlaton () rato beteen W andw ~ [7]. In comarng to atermarkng systems, the system th hgher MPSNR value has better vsual qualty, and under an assumed attack, the system th hgher value s more robust [7]. 5. Exermental Results In our exerments, a RGB-color Mnature (Mornng Star mnature, anted by Mahmud Farshchan) th 5 5 xels, and a 56-color atermark (Mahmud Farshchan's hoto) th 8 8 xels are used. After erformng the roosed scheme, the MPSNR value of the atermarked mage (Fg. 4) s equal to 57.9vdB, hch ndcates a hgher qualty atermarked mage n terms of human vsual system. The value of the extracted atermark form an unattacked atermarked mage s equal to ;.e. no degradaton n the extracted atermark. In Tsa's method vsual qualty s 39.65dB and value s 9. Fgure 4. Watermarked mage, MPSNR=57.9 vdb Extracted atermark, = As shon n Fg. 5, for α <. the embeddng strength arameter α ncreases, the nvsblty decreases and the robustness ncreases. But for α >., hgher Proceedngs of the Internatonal Conference on Informaton Technology: Codng and Comutng (ITCC 4)

4 values for α results n less robust atermarked mage. On the other hand, based on the HVS, an MPSNR value hgher than 3 s sutable [7]. So, e selected α =. hch results n MPSNR=57.9vdB and = for an assumed attack such as 75% crong over the atermarked mage. The roosed system as also tested th dfferent orgnal mages and th ths secfc atermark. The results ere the same as above; so the vsual qualty of the roosed scheme s ndeendent of the orgnal mage. 5.. The ost rocessng unt advantages The roosed scheme has been tested usng a PRNG for atermark ermutaton, and an assumed attack such as mage crong to sho the benefts of ost-rocessng. Images shon n Fgs. 6 and 6 are a atermarked mage after 75% crong and addtve-nose attacks, resectvely. Fgs. 6(c) and 6(e) are the extracted atermarks, usng seudo-random atermark ermutaton thout ost-rocessng. Fgs. 6(d) and 6(f) are the extracted atermarks usng seudo-random atermark ermutaton and ost-rocessng. Accordng to the calculated ratos for each extracted atermark, t s obvous that erformng ost-rocessng over an extracted atermark mroves qualty of the oututs,.e. less false ostves and false negatves n the extracted atermark. As shon n Fg. 7, usng the embeddng rocess th seudo-random ermutaton, the vsual qualty of a ostrocessed atermark (Rost) s hgher than that of the atermark thout ost-rocessng (Rand) n the extracton algorthm. It shos that even usng seudorandom atermark, the robustness of the roosed scheme s better than Tsa's method. So, usng ost-rocessng mroves the vsual qualty of the extracted atermark. 5.. ermutaton advantages In Fg. 7, the robustness of a seudo-random ermutaton atermark (Rost) and a D ermutaton () are beng comared under varous mage crong ratos. Ths fgure shos that usng ermutaton mroves the atermark robustness and removng addtve nose after atermark extracton mroves the extracted atermark qualty. Fg. 8 shos the extracted atermark from a 75% croed atermarked mage (Fg. 6). Comarng Fg. 6(d) and Fg. 8, although the values are close to each other, the ercetual qualty mrovement s notceable Robustness aganst attacks Fgure 9 llustrates that the value ll only slghtly decrease even for the hghest JPEG lossy comresson ratos. Qualty Embeddng strength MPSNR Fgure 5. Embeddng strength ( α ) versus vsual qualty (MPSNR*.) and robustness () n the roosed embeddng rocess (c) (d) (e) (f) Fgure 6. Usng seudo-random ermutaton n the embeddng rocess, 75% croed atermarked mage, nosy atermarked mage, (c) extracted atermark from a, =5, (d) c after ost-rocessng, =9, (e) extracted atermark from b, =, (f) e after ostrocessng, = Croed to N% of orgnal mage Tsa Rost Rand Fgure 7. Comarson of robustness beteen the roosed scheme (), Tsa's method, seudo-random ermutaton thout ost-rocessng (Rand) and seudorandom ermutaton th ost-rocessng (Rost) aganst an assumed attack (mage crong) Fgure 8. Extracted atermark usng ermutaton n the embeddng rocess thout ost-rocessng, =6, th ost-rocessng, = Proceedngs of the Internatonal Conference on Informaton Technology: Codng and Comutng (ITCC 4)

5 Fgure shos the robustness of the roosed scheme under varous medan-flter szes n comarson to that of other methods. Exerments sho that the atermark s successfully extracted from the atermarked mage even f the mage undergoes more than once blurrng attack. On the average, the roosed method s the most robust system under medan flter attack. Furthermore, the values do not decrease hen sze of the flter ncreases. As shon n Fg., the roosed scheme s the most robust method aganst mage crong attack. 6. Conclusons In ths aer, e roosed a ne block DCT-based dgtal atermarkng scheme, hch nserts an adated coloratermark n the mddle-frequency coeffcents of the orgnal color mage transform. The roosed adatve embeddng rocedure mroved robustness and nvsblty of the atermarked mage. Image-deendent adatatons not only take the advantage of HVS frequency senstvty, but also rely on adatng the atermark to local mage roertes n order to rovde maxmum erformance n terms of robustness, hle satsfyng the nvsblty constrant. For gettng hgher securty and hgher robustness, a D erodc ermutaton functon has been descrbed hch mroved robustness and ercetual qualty of the extracted atermark. Consequently, to decrease both false ostves and false negatves n the extra cted atermark, a ost-rocessng algorthm as roosed hch mroved the vsual qualty of the extracted atermark. The vsual qualty of the roosed scheme as ndeendent of the orgnal mage. The exermental results shoed that the roosed scheme as the most robust method, esecally for hgher lossy comresson ratos. Also, on the average, t as the most robust system under blurrng attacks. Indeed, the atermarked mage robustness dd not decrease hen blurrng ncreased due to larger flter sze. In addton, the roosed scheme as the most robust method under mage crong attacks. 7. References [] C-S Tsa, C-C Chang, T-S Chen, and M -H Chen, Dstrbuted multmeda databases: Technques and Alcatons, Natonal Chung Chang Unversty, and Natonal Tachung Insttute of Technology, Taan,. [] I.J., J. Klan, T. Leghton, and T. Shamoon, Secure sread sectrum atermarkng for multmeda, IEEE Trans. on Image Processng, Vol. 6, No., 997, [3] J. Frdrch, Combng lo-frequency and sread sectrum atermarkng, SPIE Symosum on Otcal Scence Engneerng and Instrumentaton, San Dego, USA, July 998. [4] E. and J. Zhao, Toards robust and hdden mage coyrght labelng, IEEE Internatonal Worksho on Non- Lnear Sgnal and Image Processng, Neos Marmaras, Greece, June 995, [5] I.J. and M.L. Mller, Robust dgtal atermarkng, Unted States Patent, atent number 67879, August,. [6] J. Frdrch, Image atermarkng for tamer detecton, IEEE Internatonal Conf. On Image Processng (ICIP 98), Vol., 998, [7] M. Kutter and F.A.P. Pettcolas, Far evaluaton methods for mage atermarkng systems, Journal of Electronc Imagng, Vol. 9, No. 4, October, [8] G. Voyatzs and I. Ptas, Chaotc mxng of dgtal mages and alcatons to atermarkng, Euroean Conf. on Multmeda Alcatons, Servces and Technques (ECMAST 96), Vol., 996, [9] R.B. Wolfgang, C.I. Podlchuk, and E.J. Del, Percetual atermarks for dgtal mages and vdeo, IEEE roc., Vol. 87, No. 7, July 999, JPEG comresson qualty Tsa Frdrch Proosed method Fgure 9. Comarson of robustness beteen the roosed scheme and other methods aganst JPEG lossy comresson attack NxN medan flter Tsa Frdrch Prosed method Fgure. Comarson of robustness beteen roosed scheme and other methods aganst blurrng attack Croed to N% of orgnal mage Tsa Frdrch Fgure. Comarson of robustness beteen roosed scheme and other methods aganst mage crong attack Proceedngs of the Internatonal Conference on Informaton Technology: Codng and Comutng (ITCC 4)

Robust Block Selection for Watermarking Video Streams

Robust Block Selection for Watermarking Video Streams Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng

More information

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract

More information

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel

More information

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty

More information

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES he Internatonal Journal of Multmeda & Its Applcatons (IJMA) Vol.3, No.1, February 211 CONOURLE RANSFORM BASED WAERMARKING FOR COLOUR IMAGES Dnesh Kumar 1 and Vjay Kumar 2 1 Department of Computer Scence

More information

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution 9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln

More information

Adaptively Weighted Sub-Directional Two-Dimensional Linear Discriminant Analysis for Face Recognition

Adaptively Weighted Sub-Directional Two-Dimensional Linear Discriminant Analysis for Face Recognition Adatvely Weghted Su-Drectonal To-Dmensonal Lnear Dscrmnant Analyss for Face Recognton Muhammad Khurram Khan ABSTRACT dscrmnant analyss (AWSDLDA) s roosed n ths aer. AWSDLDA can extract the drectonal features

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

IEEE Communications Society /04/$20.00 (c) 2004 IEEE I. INTRODUCTION II. TIMING ACQUISITION IN MC-CDMA UPLINK

IEEE Communications Society /04/$20.00 (c) 2004 IEEE I. INTRODUCTION II. TIMING ACQUISITION IN MC-CDMA UPLINK esgn of lot sgnal for MC-CMA ulnk systems yunseok Yu * and Yong-an Lee ** * Modem System Lab. Modem R& eam Samsung Electroncs Co. L elecommuncaton R& center elecommuncaton etork Suon 44-74 Korea ** School

More information

Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking

Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking Proposed pproach for Improvng Bluetooth Netorks Securty through SVD udo Watermarkng M.. M. El-Bendary,. Haggag Dept. of Electroncs echnology, Faculty of Industral Educaton, Helan Unversty. Caro, Egypt.

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

Mobile Node Positioning in Mobile Ad Hoc Network

Mobile Node Positioning in Mobile Ad Hoc Network Moble Node Postonng n Moble Ad Hoc Networ G.Lu, R.M.Edwards, C.Ladas The Unversty of Sheffeld Abstract: Many Ad Hoc networ rotocols and alcatons assume that the locaton of moble nodes can be obtaned by

More information

A Robust Feature Extraction Algorithm for Audio Fingerprinting

A Robust Feature Extraction Algorithm for Audio Fingerprinting A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry

More information

The Pilot Alignment Pattern Design in OFDM Systems

The Pilot Alignment Pattern Design in OFDM Systems The Plot Algnment Pattern Desgn n OFDM Systems *, Yong Chan Lee, Won Chol Jang, 3 Un Kyong Choe, Gyong Chol Leem,3 College of Comuter Scence, Km Il Sung Unversty, D.P.R.K Emal: leeyongchan@yahoo.com Emal:

More information

Degree Distribution Optimization in Raptor Network Coding

Degree Distribution Optimization in Raptor Network Coding 2 IEEE Internatonal Symosum on Informaton Theory Proceedngs Degree Dstrbuton Otmzaton n Rator Network Codng Nkolaos Thomos and Pascal Frossard Sgnal Processng Laboratory (LTS4) Swss Federal Insttute of

More information

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm 0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,

More information

An Iterative Parameters Estimation Method for Hyperbolic Frequency Modulated Signals with Colored Noise

An Iterative Parameters Estimation Method for Hyperbolic Frequency Modulated Signals with Colored Noise An Iteratve Parameters Estmaton Method for Hyerbolc Freuency Modulated Sgnals wth Colored Nose Shua Yao and Shlang Fang Abstract Ths aer resents an teratve method for estmatng the startng freuency and

More information

Reduction of Neural Network Training Time Using an Adaptive Fuzzy Approach in Real Time Applications

Reduction of Neural Network Training Time Using an Adaptive Fuzzy Approach in Real Time Applications Internatonal Journal of Informaton and Electroncs Engneerng, Vol., No. 3, May Reducton of Neural Network Tranng Tme Usng an Adatve Fuzzy Aroach n Real Tme Alcatons Hamdreza Rashdy Kanan and Mahd Yousef

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

A NOVEL MUSIC BEAT DETECTION ALGORITHM BASED ON PERIODICITY OF ENERGY FLUX. Ajit V. Rao

A NOVEL MUSIC BEAT DETECTION ALGORITHM BASED ON PERIODICITY OF ENERGY FLUX. Ajit V. Rao A NOVEL MUSIC BEAT DETECTION ALGORITHM BASED ON PERIODICITY OF ENERGY FLUX Pradee J. Undergraduate Student Deartment of Electroncs and Communcaton, NITK, Surathkal 575 025. radeejraman@yahoo.com Ajt V.

More information

Comparison of Current-Source and Voltage-Source Shunt Active Power Filters for Harmonic Compensation and Reactive Power Control

Comparison of Current-Source and Voltage-Source Shunt Active Power Filters for Harmonic Compensation and Reactive Power Control J. G. Pnto, Bruno Exosto, Vtor Montero, L. F. C. Montero, Carlos Couto, João L. Afonso, Comarson of Current and Voltage Shunt Actve Power Flters for Harmonc Comensaton and Reactve Power Control, 8th Annual

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

GAME THEORY AND INTERFERENCE AVOIDANCE IN DECENTRALIZED NETWORKS

GAME THEORY AND INTERFERENCE AVOIDANCE IN DECENTRALIZED NETWORKS GAME TEORY AD ITERFERECE AVOIDACE I DECETRALIZED ETWORS Rekha Menon, (MPRG Vrgna Tech, Blacksburg, VA, USA, rmenon@vt.edu) Dr. Allen B. Macenze, (Electrcal and Comuter Engneerng Deartment, Vrgna Tech)

More information

Complexity-Optimized Low-Density Parity-Check Codes for Gallager Decoding Algorithm B

Complexity-Optimized Low-Density Parity-Check Codes for Gallager Decoding Algorithm B Comlexty-Otmzed Low-Densty Party-Check Codes for Gallager Decodng Algorthm B We Yu, Masoud Ardakan, Benjamn Smth, Frank Kschschang Electrcal and Comuter Engneerng Det. Unversty of Toronto Toronto, Ontaro

More information

A Novel and Secure technique for image. Steganography using DWT

A Novel and Secure technique for image. Steganography using DWT Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton

More information

The Application of Interpolation Algorithms in OFDM Channel Estimation

The Application of Interpolation Algorithms in OFDM Channel Estimation The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

The Clock-Aided Method for GPS Receiver Positioning in an Urban Environment

The Clock-Aided Method for GPS Receiver Positioning in an Urban Environment Internatonal Journal of Comuter and Electrcal Engneerng, Vol. 3, No. 3, June The Cloc-Aded Method for GPS Recever Postonng n an Urban Envronment Yunlong Teng, Ybng Sh, and Zh Zheng Abstract As the sgnals

More information

Automatic Level Difficulty Adjustment in Platform Games Using Genetic Algorithm Based Methodology

Automatic Level Difficulty Adjustment in Platform Games Using Genetic Algorithm Based Methodology Automatc Level Dffculty Adjustment n Platform Games Usng Genetc Algorthm Based Methodology Nrach Watcharasatharornong Deartment of Comuter Engneerng Faculty of Engneerng Chulalongkorn Unversty Payatha

More information

Automatic Tuning of Model Predictive Control Using Particle Swarm Optimization

Automatic Tuning of Model Predictive Control Using Particle Swarm Optimization Automatc Tunng of Model Predctve Control Usng Partcle Swarm Otmzaton Rohe Suzuk Fukko Kawa Hdeuk Ito Chkash Nakazawa Yoshkazu Fukuama Etaro Aosh Keo Unverst 3-- Hosh Kohoku-ku Yokohama 3-5 Jaan Fuj Electrc

More information

Minimal K-Covering Set Algorithm based on Particle Swarm Optimizer

Minimal K-Covering Set Algorithm based on Particle Swarm Optimizer 87 JOURAL OF ETWORKS, VOL. 8, O., DECEMBER 3 Mnmal K-Coverng Set Algorthm based on Partcle Swarm Otmzer Yong Hu Chongqng Water Resources and Electrc Engneerng College, Chongqng, 46, Chna Emal: huyong969@63.com

More information

OPTIMAL PERMUTATION CORRECTION BY MULTIOBJECTIVE GENETIC ALGORITHMS

OPTIMAL PERMUTATION CORRECTION BY MULTIOBJECTIVE GENETIC ALGORITHMS OPTIMAL PERMUTATION CORRECTION BY MULTIOBJECTIVE GENETIC ALGORITHMS Dorothea Kolossa, Bert-Uwe Köhler, Markus Conrath, Renhold Orglmester Berln Unversty of Technology, Insttute of Electroncs, Enstenufer

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Gamma Correction and Absolute Coordinate Residual Compensation for Triangular Patterns Phase Shifting Profilometry

Gamma Correction and Absolute Coordinate Residual Compensation for Triangular Patterns Phase Shifting Profilometry nternatonal Journal of Multmeda and Ubqutous Engneerng Vol.9, o. (014),.177-186 htt://dx.do.org/10.1457/jmue.014.9..18 Gamma orrecton and Absolute oordnate Resdual omensaton for rangular Patterns Phase

More information

Improving Automatic Age Estimation Algorithms using an Efficient Ensemble Technique

Improving Automatic Age Estimation Algorithms using an Efficient Ensemble Technique Internatonal Journal of Machne earnng and Comutng, Vol., No., Arl 0 Imrovng Automatc Age Estmaton Algorthms usng an Effcent Ensemble Technque Alreza Keshavarz Choobeh Abstract The age s one of the most

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Determination of the Multi-slot Transmission in Bluetooth Systems with the Estimation of the Channel Error Probability

Determination of the Multi-slot Transmission in Bluetooth Systems with the Estimation of the Channel Error Probability Determnaton of the Mult-slot Transmsson n Bluetooth Systems wth the Estmaton of the Channel Error Probablty K Won Sung and Chae Y. Lee Det. of Industral Engneerng, KAIST, 373-1 Kuseong Dong, Taejon, Korea

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

SIR-Based Power Control Algorithms in CDMA Networks

SIR-Based Power Control Algorithms in CDMA Networks Global Journal of Comuter Scence and Technology Network, Web & Securty Volume 13 Issue 10 Verson 1.0 Year 2013 Tye: Double Blnd Peer Revewed Internatonal Research Journal Publsher: Global Journals Inc.

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Robust Filter Design based on Generalized Maximum-Likelihood Estimation

Robust Filter Design based on Generalized Maximum-Likelihood Estimation Robust Flter Desgn based on Generalzed Maxmum-Lkelhood Estmaton STEFA LEISCHER, ROBERT KLISKI, HOLGER HUTZELMA, RUDI KORR Fraunhofer Insttute for Communcaton Systems Hansastr. 3, 8686 Munch GERMAY Abstract:

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

Control of Nonlinear Industrial Processes Using Fuzzy Wavelet Neural Network Based on Genetic Algorithm

Control of Nonlinear Industrial Processes Using Fuzzy Wavelet Neural Network Based on Genetic Algorithm Internatonal Journal of Research n Engneerng and Scence (IJRES) ISSN (Onlne): 2320-9364, ISSN (Prnt): 2320-9356 www.res.org Volume 2 Issue 5 ǁ May 2014 ǁ PP.01-06 Control of Nonlnear Industral Processes

More information

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department

More information

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features Recognton of Low-Resoluton Face Images usng Sparse Codng of Local Features M. Saad Shakeel and Kn-Man-Lam Centre for Sgnal Processng, Department of Electronc and Informaton Engneerng he Hong Kong Polytechnc

More information

Improving Device-to-Device Communication Performance in 5G Networks through Joint Power Control and Resource Allocation

Improving Device-to-Device Communication Performance in 5G Networks through Joint Power Control and Resource Allocation Internatonal Journal of Communcatons htt://www.aras.org/aras/ournals/oc Imrovng Devce-to-Devce Communcaton Performance n 5G Networks through Jont Power Control and Resource Allocaton HWANG-CHENG WANG 1,

More information

Battery-aware Static Scheduling for Distributed Real-time Embedded Systems

Battery-aware Static Scheduling for Distributed Real-time Embedded Systems Battery-aware Statc Schedulng for Dstrbuted Real-tme Embedded Systems Jong Luo and Nraj K. Jha Deartment of Electrcal Engneerng Prnceton Unversty, Prnceton, NJ, 08544 {jongluo, jha}@ee.rnceton.edu Abstr

More information

Target Response Adaptation for Correlation Filter Tracking

Target Response Adaptation for Correlation Filter Tracking Target Response Adaptaton for Correlaton Flter Tracng Adel Bb, Matthas Mueller, and Bernard Ghanem Image and Vdeo Understandng Laboratory IVUL, Kng Abdullah Unversty of Scence and Technology KAUST, Saud

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

A Method for Monitoring the Underground Mining Position Based on the Blasting Source Location

A Method for Monitoring the Underground Mining Position Based on the Blasting Source Location 0.78/msr-0-0009 MEASUREMENT SCIENCE REVIEW, Volume, No., 0 A Method for Montorng the Underground Mnng oston Based on the Blastng Source Locaton Xu-zh Meng,, Zong-sheng Wang, Zeng-zh Zhang, Feng-qan Wang

More information

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery 017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang

More information

Chain Codes. Shape Representation and Description. Signatures. Polygonal Approximations

Chain Codes. Shape Representation and Description. Signatures. Polygonal Approximations Shae Reresentaton and Descrton Reresentaton Matchng or comarng reresentatons for shae recognton Invarance wth resect to nusance arameters Image codng Descrton Classf shaes based on a descrtor Invarance

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

TEMPERATURE PREDICTION IN TIMBER USING ARTIFICIAL NEURAL NETWORKS

TEMPERATURE PREDICTION IN TIMBER USING ARTIFICIAL NEURAL NETWORKS TEMPERATURE PREDICTION IN TIMBER USING ARTIFICIAL NEURAL NETWORKS Paulo Cachm ABSTRACT: Neural networks are a owerful tool used to model roertes and behavour of materals n many areas of cvl engneerng alcatons.

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

FFT Spectrum Analyzer

FFT Spectrum Analyzer THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------

More information

Performance Analysis of the Weighted Window CFAR Algorithms

Performance Analysis of the Weighted Window CFAR Algorithms Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,

More information

Chess players fame versus their merit

Chess players fame versus their merit Ths artcle s ublshed n Aled Economcs Letters htt://www.tandfonlne.com/do/full/0.080/350485.05.0435 Chess layers fame versus ther mert M.V. Smkn and V.P. Roychowdhury Deartment of Electrcal Engneerng, Unversty

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

Phasor Representation of Sinusoidal Signals

Phasor Representation of Sinusoidal Signals Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e

More information

STUDY OF MATRIX CONVERTER BASED UNIFIED POWER FLOW CONTROLLER APPLIED PI-D CONTROLLER

STUDY OF MATRIX CONVERTER BASED UNIFIED POWER FLOW CONTROLLER APPLIED PI-D CONTROLLER Journal of Engneerng Scence and Technology Specal Issue on Appled Engneerng and Scences, October (214) 3-38 School of Engneerng, Taylor s Unversty STUDY OF MATRIX CONVERTER BASED UNIFIED POWER FLOW CONTROLLER

More information

SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES

SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L Laval Unversty, Canada COPL, Physcs department Jl@phy.ulaval.ca KEY WORDS: Image Fuson, Evaluaton, Spatal Qualty, Blur Parameter,

More information

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS Ferdnan Snaga #, Elathamby Ambkarajah # and Andrew P. Bradley* # School of Electrcal Engneerng and Telecommuncatons

More information

Direct Sequence Spread Spectrum (DSSS)

Direct Sequence Spread Spectrum (DSSS) Drect Sequence Spread Spectrum (DSSS) DS-SS DS-SS uses sequences for spectrum spreadng and phase modulaton Modulaton s bnary SK (BSK) or quaternary SK (QSK) Message BSK - - - - QSK BSK Bt hase Dr. Cesar

More information

PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN

PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN Crstan V. SERDEAN 1, Martn TOMLINSON 1, Graham J. WADE 2 and Adran M. AMBROZE 1 1 Unversty of Plymouth, Unted Kngdom and 2 The

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

A Novel MIMO-OFDM Scheme Based on Modulation Diversity for IEEE ac Standard

A Novel MIMO-OFDM Scheme Based on Modulation Diversity for IEEE ac Standard ACCESS 01 : he hrd nternatonal Conference on Access Networks A Novel MMO-OFDM Scheme Based on Modulaton Dversty for EEE 80.11ac Standard Wu Zhanj, Gao Xang, L Yunzhoun Bejng Unversty of Post & elecommuncatons,

More information

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas Impact of Interference Model on Capacty n CDMA Cellular Networks Robert Akl, D.Sc. Asad Parvez Unversty of North Texas Outlne Introducton to CDMA networks Average nterference model Actual nterference model

More information

Study on Conflict Detection Method with Downlink Aircraft Parameters

Study on Conflict Detection Method with Downlink Aircraft Parameters Study on Conflct Detecton Method wth Downlnk Arcraft Parameters Atsush SENOGUCHI, and Yutaka FUKUDA Ar Traffc Management Dvson Electronc Navgaton Research Insttute Tokyo, Jaan senoguch@enr.go.j, fukuda@enr.go.j

More information

Digital Compensation of Amplifier Nonlinearities in the Receiver of a Wireless System

Digital Compensation of Amplifier Nonlinearities in the Receiver of a Wireless System Dgtal Comensaton of Amlfer Nonlneartes n the Recever of a Wreless System Cedrc Dehos* and Tm C. W. Schen * CEA-LETI MINATEC, 7 rue des Martyrs, 8 05 Grenoble CEDEX 9, France, Tel. +-8-7868, cedrc.dehos@cea.fr

More information

Combined Independent Component Analysis and Kalman Filter Based Real-Time Digital Video Stabilization

Combined Independent Component Analysis and Kalman Filter Based Real-Time Digital Video Stabilization Internatonal Journal of Sgnal Processng Systems Vol. 1, No. 2 December 2013 Combned Independent Component Analyss and Kalman Flter Based Real-Tme Dgtal Vdeo Stablzaton Hassaan S. Quresh, Syed A. Jabr,

More information

DTIC DTIC. 9o o FILE COPY NATIONAL COMMUNICATIONS SYSTEM TECHNICAL INFORMATION BULLETIN 87-8 PULSE CODE MODULATION FOR GROUP 4 FACSIMILE

DTIC DTIC. 9o o FILE COPY NATIONAL COMMUNICATIONS SYSTEM TECHNICAL INFORMATION BULLETIN 87-8 PULSE CODE MODULATION FOR GROUP 4 FACSIMILE DTC FLE COPY NCS TB 87-8 NATONAL COMMUNCATONS SYSTEM q. nm TECHNCAL NFORMATON BULLETN 87-8 N NTRANSFORM CODNG AND DFFERENTAL Qz PULSE CODE MODULATON FOR GROUP 4 FACSMLE DTC ELECTE JUL 10]1! l AUGUST 1987

More information

NOISE ESTIMATION USING STANDARD DEVIATION OF THE FREQUENCY MAGNITUDE SPECTRUM FOR MIXED NON-STATIONARY NOISE

NOISE ESTIMATION USING STANDARD DEVIATION OF THE FREQUENCY MAGNITUDE SPECTRUM FOR MIXED NON-STATIONARY NOISE DOI: 10.1917/jct.015.0178 ESTIMATION USING STANDARD DEVIATION OF THE FREQUENCY MAGNITUDE SPECTRUM FOR MIXED NON-STATIONARY A. Indumath 1 and E. Chandra 1 Department of Master of Computer Applcatons, Dr.

More information

International Steering Committee:

International Steering Committee: 14 th Internatonal Worksho on ROBOTICS IN ALPE-ADRIA-DANUBE REGION RAAD'05 BUCHAREST ROMANIA : MAY 6-8 005 Internatonal Steerng Commttee: G. Belforte Poltecnco d Torno Italy J. F. Bto Centre of Robotcs

More information

Archive of SID. Channel Capacity Analysis of Spread Spectrum Audio Watermarking. M. Khademi

Archive of SID. Channel Capacity Analysis of Spread Spectrum Audio Watermarking.   M. Khademi KHADEMI: CHAEL CAPACITY AALYSIS OF SPREAD SPECTRUM AUDIO WATERMARKIG Channel Capacty Analyss of Spread Spectrum Audo Watermarkng M. Khadem Abstract In ths paper, nformaton-theoretc analyss of spread spectrum

More information

We assume a two-layered model, and a P wave is excited in the upper layer.

We assume a two-layered model, and a P wave is excited in the upper layer. 3.4 Crtcal angle We assume a two-layered model, and a P wave s ected n the uer layer. When a P wave mnges on a horontal boundary, the ncdence angle for the transmtted P wave n the second medum s gven by

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

Unfalsified Adaptive Control with Online Optimization to a ph Neutralization Process

Unfalsified Adaptive Control with Online Optimization to a ph Neutralization Process Research Artcle Unfalsfed Adatve Control wth Onlne Otmzaton to a H Neutralzaton Process anet Wonghong Deartment of Electrcal Engneerng, Faculty of Engneerng, Kasetsart Unversty, S Racha Camus, S Racha,

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Cooperative Collision Avoidance between Multiple Mobile Robots

Cooperative Collision Avoidance between Multiple Mobile Robots Cooeratve Collson Avodance between Multle Moble Robots Atsush Fujmor,* Masato Teramoto Deartment of Mechancal Engneerng Shzuoka Unversty 3-5-1, Johoku, Hamamatsu 432-8561, Jaan e-mal: a-fujmor@eng.shzuoka.ac.j

More information

Camera Calibration and Performance Evaluation of Depth From Defocus (DFD)

Camera Calibration and Performance Evaluation of Depth From Defocus (DFD) Please verfy that () all pages are present, () all fgures are acceptable, (3) all fonts and specal characters are correct, and (4) all text and fgures ft wthn the margn lnes shown on ths revew document.

More information

USE OF GPS MULTICORRELATOR RECEIVERS FOR MULTIPATH PARAMETERS ESTIMATION

USE OF GPS MULTICORRELATOR RECEIVERS FOR MULTIPATH PARAMETERS ESTIMATION Rdha CHAGGARA, TeSA Chrstophe MACABIAU, ENAC Erc CHATRE, STNA USE OF GPS MULTICORRELATOR RECEIVERS FOR MULTIPATH PARAMETERS ESTIMATION ABSTRACT The performance of GPS may be degraded by many perturbatons

More information

A Fuse-Before-Track Approach to Target State Estimation Using Passive Acoustic Sensors

A Fuse-Before-Track Approach to Target State Estimation Using Passive Acoustic Sensors 4th Internatonal Conference on Informaton Fuson Chcago Illnos USA July 5-8 A Fuse-Before-rac Aroach to arget State Estmaton Usng Passve Acoustc Sensors Chrs Kreucher and Ben Shao Integrty Alcatons Incororated

More information

POWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION

POWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION POWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION Ruqn Xong 1, Feng Wu, Xaopeng Fan 3, Chong Luo, Swe Ma 1, Wen Gao

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Research on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating

Research on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating , pp. 337-344 http://dx.do.org/10.1457/jht.014.7.6.9 Research on Peak-detecton Algorthm for Hgh-precson Demodulaton System of Fber ragg Gratng Peng Wang 1, *, Xu Han 1, Smn Guan 1, Hong Zhao and Mngle

More information

An Automatic Weight-Based High Dynamic Range Imaging Syntheses with Multiple Different Exposed Low Dynamic Range Images

An Automatic Weight-Based High Dynamic Range Imaging Syntheses with Multiple Different Exposed Low Dynamic Range Images 49 An Automatc Weght-Based Hgh Dynamc Range Imagng Syntheses wth Multple Dfferent Exposed Low Dynamc Range Images 1 Jun-You Chen and 2 Chen-Chung Lu Abstract 1. Introducton Hgh dynamc range (HDR) magng

More information

FPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm

FPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm IACSIT Internatonal Journal of Engneerng and Technology, Vol. 7, No. 3, June 25 FPGA Implementaton of Ultrasonc S-Scan Coordnate Converson Based on Radx-4 CORDIC Algorthm Ruobo Ln, Guxong Lu, and Wenmng

More information