IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING

Size: px
Start display at page:

Download "IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING"

Transcription

1 U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel atermarkng scheme for mage authentcaton and recovery s presented. The algorthm can detect modfed regons n mages and s able to recover a good approxmaton of the orgnal content of the tampered regons. For ths purpose, to dfferent atermarks have been used: a sem-fragle atermark for mage authentcaton and a robust atermark for mage recovery, both embedded n the Dscrete Wavelet Transform doman. The proposed method acheves good mage qualty th mean Peak Sgnal-to-Nose Rato values of the atermarked mages of 4 db and dentfes mage tamperng of up to 0% of the orgnal mage. Keyords: multmeda securty, mage forgery detecton, dgtal atermarkng, mage authentcaton, mage recovery, Dscrete Wavelet Transform 1. Introducton Dgtal content, such as mages, vdeo and audo can be easly coped and dstrbuted through dfferent communcaton channels. The avalablty of poerful sgnal processng tools makes t very dffcult to guarantee the ntegrty of multmeda content. Dgtal mages are used n legal dsputes nvolvng tampered pctures publshed n nespapers and magaznes, accdents, poltcal or celebrty scandals, etc. Under these crcumstances, n order to prevent malcous, ntentonal tamperng, mage authentcaton has become a very mportant and challengng ssue n the dgtal orld. One of the best solutons for mage authentcaton s dgtal atermarkng, a process by hch a user specfed sgnal (atermark) s hdden or embedded n the orgnal mage. A great number of scentfc publcatons n ths feld only authentcate the content of dgtal mages and are not able to reconstruct the orgnal content [1-6]. Most technques use fragle atermarks for authentcaton [3-7]. These atermarks can detect malcous alterng of the mage content, but are also destroyed even after the smallest unntentonal modfcaton, an undesred property n most applcatons. Compared to these methods, the technque 1 Assoc. Prof., Telecommuncatons Dept., Unversty POLITEHNICA of Bucharest, Romana, e- mal: radu@comm.pub.ro Lect., Telecommuncatons Dept., Unversty POLITEHNICA of Bucharest, Romana 3 Lect., Telecommuncatons Dept., Unversty POLITEHNICA of Bucharest, Romana

2 00 Radu Ovdu Preda, Ioana Marcu, Amela Cobanu proposed n ths paper uses a sem-fragle authentcaton atermark, hch s able to thstand a good degree of common mage processng. Many other sem-fragle authentcaton technques use block-based approaches n the spatal or Dscrete Cosne Transform (DCT) doman to detect the tampered regons [6, 8, 9]. Most of these schemes are vulnerable to counterfetng attacks, lke the Vector Quantzaton (VQ), and the tamper detecton resoluton s lmted to the block sze. Smaller block szes and hgher atermark payloads are necessary to mprove the detecton resoluton, resultng n a consderable degradaton of the mage qualty. To allevate these problems, the technque proposed n ths paper uses Wavelet coeffcents permuted th a random key to embed the authentcaton atermark, protectng the scheme aganst local attacks. The embeddng of the authentcaton atermark n the Wavelet doman also assures a better detecton resoluton than block-based methods. Another desred property of an authentcaton scheme s the ablty to recover the orgnal content of the detected tampered regons. Only a small percentage of the exstng algorthms are able to do ths, because t comes th a trade-off: the use of a second atermark, the recovery atermark, an approxmaton of the orgnal mage th hgh payload, results n further degradaton of the mage qualty [10-1]. Dfferent recovery schemes try to reduce the payload of ths atermark usng compresson. In [13], Chamla et al. use a hghly compressed verson of the orgnal mage as a recovery atermark, obtaned by applyng the DCT to the second level Wavelet approxmaton subband, and embed ths atermark n some mddle frequency Wavelet coeffcents. Ths approach s fragle to any knd of mage processng operaton and also to large content alterng modfcatons and s not able to recover the dgest mage. A recovery scheme th better results s proposed n [14], here the dgest mage s compressed usng arthmetc codng and protected by applyng a Bose-Chaudhur- Hocquenghem (BCH) error correctng code. Ths atermark s embedded n the mddle sub-band detal Wavelet coeffcents usng a Least Sgnfcant Bt (LSB) approach. The error correcton code ncreases the atermark payload and degrades the mage qualty and, even f t s able to correct some errors produced by salt&pepper nose n the extracted arthmetc code, the LSB method s qute fragle to any modfcatons. Most of the exstng recovery schemes use ether a fragle recovery atermark (hghly compressed verson of the orgnal mage) [13], [15, 16], or a fragle embeddng strategy, lke LSB embeddng [4], [9], [14], [17]. Because the recovery strategy must be as robust as possble to any knd of modfcaton of the mage, these methods do not produce satsfactory results. The recovery algorthm proposed n ths paper acheves not only good robustness to common sgnal processng operatons, but also to large malcous tamperng of the mage.

3 Image authentcaton and recovery usng avelet-based dual atermarkng 01 The paper s organzed as follos: n Sectons and 3 the proposed mage authentcaton and recovery scheme s presented, ncludng the block dagrams of the atermark embedder and decoder and the detaled steps of the algorthm. Secton 4 contans the expermental results and performances of the proposed scheme n terms of mage qualty, detecton, localzaton and recovery capablty and robustness to common mage processng operatons. Conclusons are gven n Secton 5.. The proposed dual atermark encodng scheme The block dagram of the embeddng scheme, gven n Fgure 1, conssts of to man blocks, for generatng and embeddng the to dfferent atermarks, the authentcaton and recovery atermark. These procedures are descrbed n the follong..1. Generaton and embeddng of the authentcaton atermark The authentcaton atermark generaton and embeddng procedure s presented n the loer half on Fgure 1 and s descrbed n the follong: A to level b-dmensonal Dscrete Wavelet Transform (D-DWT) s used to transform the orgnal, grayscale mage n the Wavelet doman. The detal Wavelet coeffcents of the LH, HL and HH Wavelet sub-bands of the second Wavelet decomposton are selected for embeddng the authentcaton atermark. By selectng hgher resoluton sub-bands for atermark embeddng the algorthm acheves a better localzaton of ntentonal tamperng. LL LH HL HH HL 1 LH 1 HH 1 Generaton and embeddng of the recovery atermark LL LH 1 HL 1 HH 1 Select n sgnfcant bts Key based permutaton Key based permutaton Redundant embeddng usng QIM LH C C m Key based Coeffcent Compute Modfy HL permutaton groupng mean mean HH g Authentcaton K 1 K 1 atermark Generaton and embeddng of the authentcaton atermark K d 1 Fg. 1. The proposed atermark embeddng scheme d at m K Inverse permutaton Inverse permutaton K 1 IDWT Watermarked mage

4 0 Radu Ovdu Preda, Ioana Marcu, Amela Cobanu Vector C contanng the Wavelet coeffcents of the three sub-bands s randomly permuted th the use of a secret key K 1 nto a vector C. Ths permutaton ensures the separaton of coeffcents from the same spatal locaton. C Is dvded nto groups of g coeffcents, here g controls the atermark capacty of the scheme. A bt of the authentcaton atermark ll be embedded n every group of g coeffcents. The use of a smaller group sze ll have a bgger atermark payload and thus a hgher degradaton of the mage qualty as an effect, but, on the other hand, t ll not decrease the detecton resoluton. The authentcaton atermark s a bnary random sequence, generated based on a secret key K 1 and has the same length as the number of coeffcent groups. The eghted mean m of a group of permuted avelet coeffcents s calculated accordng to (1): d j m = ( 1) c( j) (1) j= 1 here c ( j ) s the jth coeffcent of group I and ( 1) j s the eghtng factor used to make the scheme more reslent aganst common mage processng. Such unntentonal alteratons usually change the entre mage content and do not modfy the eghted mean. To embed a atermark bt n a group of coeffcents, the eghted mean s quantzed to the nearest even or odd quantzaton level accordng to the value of the correspondng atermark bt, usng (). mod ( ) m Q Q f m Q = m =, () m Q Q+ Q f mod ( m Q ) here m s the atermarked mean, mod s the remander after dvson by and. s the nteger part operator. The eghted mean m of every group of coeffcents s changed to the atermarked mean m by modfyng the Wavelet coeffcent c,max ( j ) of the hghest magntude. The random permutaton ensures that every group has at least one coeffcent th hgh magntude. Coeffcent c ( ),max j s modfed usng (3): j c,max ( j) = c,max ( j) + ( 1) sgn( c,max( j)) ( m m), (3) th c ( ),max j beng the atermarked coeffcent and m

5 Image authentcaton and recovery usng avelet-based dual atermarkng 03 1, f x 0 sgn( x) = (4) 1, f x > 0 The Wavelet coeffcents are shuffled back to ther orgnal poston usng the nverse permutaton th the same secret key K 1, obtanng the ne atermarked sub-bands LH, HL and HH... Generaton and embeddng of the recovery atermark The generaton and embeddng of the recovery atermark are performed n the upper part of Fgure 1. The follong steps are performed: The LL approxmaton sub-band, s used as the recovery atermark, also called the dgest mage. It s a reduced verson of the orgnal mage. To further reduce the atermark payload, only the frst n most sgnfcant bts of every avelet coeffcent from LL are used for embeddng. Let 1 denote the bnary atermark vector of length l at, gven n (5), here M N s the resoluton of the mage. lat = nmn /16 (5) To ncrease the securty of the algorthm the vector 1 s shuffled usng a random permutaton based on the secret key K, obtanng the permuted bnary atermark. The detal Wavelet coeffcents of the LH1, HL1and HH1 sub-bands are used for embeddng the recovery atermark. For securty reasons, they are shuffled usng a thrd key K 3, obtanng the vector d of shuffled coeffcents of sze l coef : lcoef = 3 MN /4 (6) Each bt of the recovery atermark s redundantly embedded nto every coeffcent of a group of h coeffcents of vector d, here h s obtaned usng (7): h = lcoef / lat = 1/ n (7) A atermark bt s embedded nto a Wavelet coeffcent usng a Quantzaton Index Modulaton approach, as shon n (8), here d at s the vector of atermarked coeffcents. dj ( ) Q dat ( j) = Q+ ( ), = 1, lat, j = 1, h Q (8) After the entre atermark has been embedded, an nverse permutaton of the atermarked coeffcents s done, ensurng that a atermark bt s spread n the entre mage. Let LH1, HL 1 and HH 1 denote the avelet sub-bands contanng the recovery atermark.

6 04 Radu Ovdu Preda, Ioana Marcu, Amela Cobanu To obtan the atermarked mage, the Inverse D-IDWT s appled to tmes, frst on the coeffcents of the, LL LH, HL and HH sub-bands, obtanng the approxmaton sub-band LL 1, and the second tme on the coeffcents of the LL1, LH1, HL 1 and HH 1 sub-bands. 3. The proposed atermark retreval scheme A block dagram of the atermark decoder s gven n Fgure. The upper part of the fgure contans the mage recovery system and the bottom part contans the blocks to authentcate the mage and localze possble ntentonal tamperng. 3.. Retreval of the authentcaton atermark and mage authentcaton The extracton process of the authentcaton atermark and the steps for mage authentcaton are descrbed n the follong: Frst, the test mage undergoes a D-DWT decomposton. The LH, HL and HH Wavelet sub-bands are used to extract the authentcaton atermark. Wth the use of the secret key K 1, the same random permutaton from the encoder sde s performed on the vector of atermarked avelet coeffcents. The eghted mean m of every group of g coeffcents s calculated usng (1). Retreval of the recovery atermark LL LH HL HH LH 1 LH 1 HL 1 HH 1 Key based permutaton Watermark extracton usng QIM Decson functon Inverse permutaton Zero paddng HL 1 HH 1 K Recovered mage Blnear nterpolaton Medan flterng LL K 1 g LH HL HH Key based permutaton Coeffcent groupng Compute mean Watermark extracton Extracted atermark K 1 Authentcaton and tamperng localzaton Image authentcaton Morphology operatons Flterng Inverse permutaton Possbly tampered groups Watermark comparson Fg.. The proposed atermark decoder and mage authentcaton scheme Locally generated atermark

7 Image authentcaton and recovery usng avelet-based dual atermarkng 05 From every mean a atermark bt s extracted usng (9). m = round mod Q (9) Usng the secret key K 1, the orgnal atermark s locally generated and compared to the extracted one. If they match, the mage s declared as authentc. If not, the follong steps ll determne the authentcty and the locaton of possble tamperng. If a bt of the extracted atermark does not match the orgnal one, all coeffcents of group are consdered as potentally tampered. After permutng all coeffcents back to ther orgnal poston usng the secret key K 1, the potentally tampered coeffcents should be spread all over the second level detal Wavelet sub-bands. A hgh densty of potentally tampered coeffcents should ndcate that the correspondng regon has been tampered th. Authentc regons, on the other hand, should only contan solated flagged coeffcents, dstrbuted lke random nose. These coeffcents are false postves and should be consdered as authentc. As a result, the sub-bands LH, HL and HH ll contan flagged and nonflagged coeffcents. Let A be the bnary authentcaton matrx of sze ( M /) ( N /), the same sze as any of the three sub-bands. If there s a potentally tampered coeffcent at poston ( x, y ) n any of the three sub-bands, A( x, y) ll be set to 1. To remove the solated 1 bts from A, the authentcaton matrx ll be fltered usng both a nose removal flter and successve mathematcal morphology operatons th a dsk of a radus of one pxel as the structural element. The authentcaton matrx should no contan only regons of clustered flagged postons and should correctly ndcate the tampered locatons. To locate the regons that have actually been tampered th, the flagged postons n matrx A are mapped back to the spatal doman. Every poston n authentcaton matrx A of sze ( M /) ( N /) ndcates an actual regon of sze 4 4pxels n the mage, hch s the maxmum detecton resoluton of ths scheme. The quantzaton step sze Q, the flter sze and the sze of the structural element used for the arthmetc morphology operatons can be modfed to mprove the senstvty of the tamperng detecton.

8 06 Radu Ovdu Preda, Ioana Marcu, Amela Cobanu 3.. Retreval of the recovery atermark Frst, the three detal Wavelet sub-bands LH 1, HL 1 and HH 1 of the frst Wavelet decomposton are selected. A random permutaton th key K 3 of these coeffcents s performed on the selected Wavelet coeffcents, obtanng a vector d of shuffled coeffcents. From every coeffcent of vector d, a atermark bt s extracted accordng to (10), here h() s the extracted bt. d ( ) h( ) = round mod, = 1, lcoef Q (10) The vector h s dvded nto groups of h coeffcents. The atermark bt ( j) correspondng to the group j s obtaned by majorty votng, as n (11): hj h 0, f h( k) k= h( j 1) + 1 ( j) =, j = 1, lat. (11) hj h 1, f h( k) > k= h( j 1) + 1 The nverse permutaton th key K of vector s performed, obtanng. The bnary sequence s dvded nto groups of n bts and every group s padded th 8 n zeroes. Every group of 8 bts represents an extracted Wavelet coeffcent of the dgest mage (LL sub-band). After reorderng the coeffcents, the recovered mage LL of resoluton M N /16s obtaned. To remove the error pxels that could appear n LL because of ntentonal tamperng of the mage, a medan flter of sze 3x3 can be appled. Fnally, the recovered dgest mage s obtaned by blnear nterpolaton of the mproved verson of LL. The securty of the authentcaton and recovery system s ensured by three secret keys used to control the generaton of the authentcaton atermark and the random permutatons of Wavelet coeffcents. There can be dstnct keys for these three operatons or a sngle key. An attacker has to kno the secret key(s) n order to generate the correct coeffcent permutaton or a duplcate of the orgnal authentcaton atermark. Unlke most block-based methods, here the authentcaton of a block depends only on the content of the block tself, the proposed scheme s rendered mmune to the VQ attack by selectng the coeffcents of a group randomly from all over the Wavelet sub-bands.

9 Image authentcaton and recovery usng avelet-based dual atermarkng Expermental results We have used 100 mages of resoluton pxels to test the algorthm n terms of qualty of the atermarked mages, detecton and localzaton capablty of the tamperng, qualty of the recovered mages and robustness to common mage processng operatons. In Table 1 the mage qualty and decodng results of the proposed method are shon for dfferent quantzaton step szes Q and dfferent group szes g, here PSNR s the mean Peak Sgnal to Nose Rato for 100 test mages and BER s the mean decodng Bt Error Rate of the extracted authentcaton atermark, compared to the orgnal one. The borthogonal 4.4 Wavelet famly has been used, but t can be replaced th any other avelet famly, th mnmal mpact on the resultng mage qualty and detecton results. The PSNR has good values, above 40 db, except for Q=1, here the mean PSNR drops to 37 db. For every combnaton of parameters the authentcaton atermark can be extracted successfully thout any errors. Next, e have tested the capacty of the proposed approach to detect ntentonal tamperng of the mage and recover the tampered regons. For ths purpose, e have replaced a regon of dfferent szes of the atermarked mage th a regon of the same sze from another mage. Ths as done for every mage n the database. The szes of the tampered blocks ere 16 16, 3 3, 64 64, and19 19 pxels. After the tamperng, the authentcaton atermark s extracted from the tampered mage and the authentcaton algorthm returns the postons of the tampered regons. One of the major contrbutons of ths proposed technque s the capablty to repar the tampered regons. When a tampered regon s detected, the recovery algorthm ll recover the content of ths regon. These unauthentc parts of the mage are replaced th the correspondng regons of the recovered dgest mage. Mean PSNR and BER values Q d PSNR BER 4 46,99 0% ,51 0% 1 47,70 0% 4 40,95 0% ,47 0% 1 41,66 0% 4 37,41 0% ,9 0% 1 38,11 0% Table 1

10 08 Radu Ovdu Preda, Ioana Marcu, Amela Cobanu To measure the mage qualty of the reconstructed mages, e have calculated the mean PSNR values of these mages compared to the orgnal ones. The results are shon n Table, here all PSNR values are mean values for 100 mages. Table also contans the false negatve rate (FNR), the percentage of tampered mages declared as authentc. We can see, that for small tamperng and some embeddng parameters, lke g=4 and Q=1 e get a small percentage of false negatves, but for most parameters, ths percentage s zero. Fg. 3 shos to examples of mage authentcaton and restoraton. The frst mage s the popular Lena grayscale mage of sze51 51 pxels and the second mage s another test mage of resoluton pxels. Fg. 3a shos the atermarked mages usng a quantzaton step sze of Q=8 and a group sze of g=4. After embeddng the atermarked, the Lena mage has been modfed by replacng a regon of pxels th another regon of the same sze from the same mage (Fg. 3b, left mage). The second mage has been modfed by replacng the face of the oman n the top left regon th another oman s face and by removng the beer can and extendng the background (Fg. 3b, rght mage). In Fg. 3c the results of the authentcaton process are presented, here the hte regons denote the detected unauthentc part of the mages. The reconstructed mages are shon n Fg. 3d. We can see that the proposed algorthm s senstve to malcous manpulatons. It s able to correctly detect the tampered regon of the mage and to recover the mssng nformaton th acceptable qualty. Table Mean PSNR values of the recovered mages and false negatve rate for dfferent tamperng Sze of the tampered regon Q g PSNR FNR PSNR FNR PSNR FNR PSNR FNR PSNR FNR (db) (%) (db) (%) (db) (%) (db) (%) (db) (%) 4 44,18 0,00 41,79 0,00 38,74 0,00 33,7 0,00 9,31 0, ,31 0,00 4,1 0,00 38,6 0,00 31,49 0,00 3,13 0, ,08 0,00 41,9 0,00 38,56 0,00 3,49 0,00 3,13 0, ,73 10,00 38,57 3,33 37,04 0,00 3,77 0,00 9,03 0, ,8 0,00 39,0 0,00 37,7 0,00 3,04 0,00 3,1 0, ,45 0,00 39,18 0,00 37,08 0,00 6,89 0,00 3,14 0, ,55 13,33 35,98 3,33 34,97 0,00 31,45 0,00 8,30 0, ,6 10,00 36,51 0,00 34,84 0,00 31,6 0,00 3,74 0, ,45 10,00 36,61 0,00 35,13 0,00 7,87 0,00 3,19 0,00

11 Image authentcaton and recovery usng avelet-based dual atermarkng 09 (a) (b) (c) (d) Fg. 3. (a) atermarked mages for g=4 and Q=8, (b) tampered mages, (b) authentcated mages, (d) reconstructed mages Next e have tested the robustness of the proposed technque to mld mage processng operatons. The authentcaton atermark s a sem-fragle

12 10 Radu Ovdu Preda, Ioana Marcu, Amela Cobanu atermark, hch should be robust to common sgnal processng operatons that preserve the mage content, hle stll beng able to detect content alterng modfcaton n the mage. To demonstrate ths property, to scenaros have been used. Frst, the orgnal mages have been atermarked usng the best choce for the embeddng parameters (g=4, Q=8) and ere modfed usng the follong mage processng operatons: brghtenng/darkenng (lumnance of 40); addton of Gaussan nose of mean 0 and varance ; addton of salt&pepper nose, here 0.1% of the mage pxels ere modfed; JPEG compresson th a qualty factor of 85. Then, the modfed mages have been authentcated and the false postve rate (FPR) has been expermentally determned for the database of 100 test mages. The FPR s the percentage of authentc mages that have been declared as unauthentc. Table 3 shos the results for g=4 and Q=8, here all PSNR values n the table are mean values of the atermarked mages after applyng the mage processng operatons. For the second scenaro, the mages have been atermarked, modfed by replacng a regon of 64x64 pxels and fnally, an mage processng operaton has been appled. Then, the mages have been authentcated, the recovery atermark has been extracted and the orgnal content of the unauthentc regons has been reconstructed. The PSNR values from Table 3 are mean values for the reconstructed mages, compared to the orgnal ones. We have also expermentally determned the false negatve rates, hch are also gven n Table. The algorthm as able to successfully detect every content alterng modfcaton (FPR=0), but a small percentage of authentc mages, that have been affected by Gaussan nose, salt&pepper nose and JPEG compresson have been falsely declared as unauthentc. The proposed method has also been compared to to other approaches. Table 4 gves a summary of ths comparson. The man advantages of ths method, compared to the other technques, are the good mage qualty, the good detecton resoluton of 4x4 pxels for a small payload of the authentcaton atermark and the robustness to common mage processng operatons. Table 3 Robustness of the proposed scheme to common mage processng operatons Brghtenng Gaussan nose Salt&pepper nose JPEG Compresson No tamp. 64x64 No tamp. 64x64 No tamp. 64x64 No tamp. 64x64 PSNR (db) FPR PSNR FNR (%) (db) (%) PSNR (db) FPR (%) PSNR (db) FNR (%) PSNR (db) FPR (%) PSNR (db) FNR (%) PSNR (db) FPR (%) PSNR (db) 40,95 0,00 1,6 0,00 40,95 6,67 30,86 0,00 40, ,5 0,00 40,95 6,67 4,45 0,00 FNR (%)

13 Image authentcaton and recovery usng avelet-based dual atermarkng 11 Technque Image qualty for average parameters Comparson to other technques Detecton resoluton Robustness to common mage processng Table 4 Image recovery possble after removng [13] 36,65 db 4x4 Yes (only authentcaton atermark) Up to 5% of orgnal [14] 39,88 db 8x8 Only to salt&pepper nose Up to 10% of orgnal Proposed 39,73 db 4x4 Yes (both authentcaton and recovery atermarks) Up to 0% of orgnal 5. Conclusons In ths paper a novel Wavelet-based mage authentcaton and recovery scheme usng to atermarks has been proposed. The algorthm s blnd, semfragle, s able to detect and locate malcous tamperng n dgtal mages and recover a good estmate of the orgnal content even f the atermarked mage has been tampered th to a degree of 0%. The proposed method acheves hgh tamperng detecton resoluton and hgh mage qualty compared to other state of the art technques. The atermarkng scheme s protected aganst local attacks, lke the Vector Quantzaton attack, by randomzng the poston of Wavelet coeffcents used for embeddng th the use of a prvate key. The embedded authentcaton and recovery atermarks are also reslent aganst mld common mage processng operatons, lke brghtenng, addton of Gaussan and salt&pepper nose, and JPEG compresson, hle stll beng able to detect ntentonal tamperng th good accuracy. Acknoledgement Ths ork has been funded by the Sectoral Operatonal Programme Human Resources Development of the Mnstry of European Funds through the Fnancal Agreements POSDRU/159/1.5/S/ and POSDRU/159/1.5/S/ R E F E R E N C E S [1] H. M. Al-Otum, Sem-fragle atermarkng for grayscale mage authentcaton and tamper detecton based on an adjusted expanded-bt multscale quantzaton-based technque, Journal of Vsual Communcaton and Image Representaton, vol. 5, ssue 5, pp , 014. [] R. O. Preda, Sem-fragle atermarkng for mage authentcaton th senstve tamper localzaton n the avelet doman, Measurement, vol. 46, ssue 1, pp , 013.

14 1 Radu Ovdu Preda, Ioana Marcu, Amela Cobanu [3] S. Bravo-Soloro, L. Gan, A. K. Nand, and M. F. Aburdene, Secure prvate fragle atermarkng scheme th mproved tamperng localsaton accuracy, Informaton Securty, IET, vol. 4, pp , 010. [4] H. Kuo-Mng, C. Tng-Wen, S. Wen-Ka, and K. Cha-Nan, Automatc mage authentcaton and recovery usng multple atermarks, 01 8th Internatonal Conference on Informaton Scence and Dgtal Content Technology (ICIDT), pp , 01. [5] K. We-Chn, C. Te-Chh, W. Hsn-Lung, and C. Jen-Chun, A Fragle Watermarkng Scheme for Image Authentcaton th Tamper Detecton and Localzaton, Fourth Internatonal Conference on Genetc and Evolutonary Computng (ICGEC), pp , 010. [6] A. T. S. Ho, Z. Xunzhan, S. Jun, and P. Marzlano, Fragle Watermarkng Based on Encodng of the Zeroes of the Z-Transform, IEEE Transactons on Informaton Forenscs and Securty, vol. 3, pp , 008. [7] C. Qn, C.-C. Chang, and P.-Y. Chen, Self-embeddng fragle atermarkng th restoraton capablty based on adaptve bt allocaton mechansm, Sgnal Processng, vol. 9, pp , 01. [8] H. He, J. Zhang, and F. Chen, Adjacent-block based statstcal detecton method for selfembeddng atermarkng technques, Sgnal Processng, vol. 89, ssue 8, pp , 009. [9] A. M. Hassan, A. Al-Hamad, B. Mchaels, Y. M. Y. Hasan, and M. A. A. Wahab, Secure Self-Recovery Image Authentcaton Usng Randomly-Szed Blocks, 010 0th Internatonal Conference on Pattern Recognton (ICPR), pp , 010. [10] S. D. Ln, J. H. Ln, and C. Y. Chen, A ROI-based sem-fragle atermarkng for mage tamper detecton and recovery, Internatonal Journal of Innovatve Computng, Informaton and Control, vol. 7, pp , 011. [11] P. Korus, J. Balas, and A. Dzech, Toards Practcal Self-Embeddng for JPEG- Compressed Dgtal Images, Multmeda, IEEE Transactons on, vol. 17, pp , 015. [1] S. Agreste and L. Pucco, Wavelet-based atermarkng algorthms: theory, applcatons and crtcal aspects, Internatonal Journal of Computer Mathematcs, vol. 88, pp , 011. [13] R. Chamla, A. Khan, and I. Usman, Dual Watermarkng Method for Secure Image Authentcaton and Recovery, IEEE 13th Internatonal Multtopc Conference, INMIC 009, pp. 1-4, Dec [14] J. A. Mendoza-Norega, B. M. Kurkosk, M. Nakano-Mytake and H. Perez-Mean, Image Authentcaton and Recovery Usng BCH Error-Correctng Codes, Internatonal Journal of Computers, vol. 5, no. 1, pp. 6-33, 011. [15] X. Wang, D. Zhang, and X. Guo, Authentcaton and recovery of mages usng standard devaton, Journal of Electronc Imagng, vol. (3), 03301, 013. [16] R. Ullah, A. Khan, and A. S. Malk, Dual-purpose sem-fragle atermark: Authentcaton and recovery of dgtal mages, Computers and Electrcal Engneerng, vol. 39, pp , 013. [17] S. Som, S. Palt, K. Dey, D. Sarkar, J. Sarkar, and K. Sarkar, A DWT-based Dgtal Watermarkng Scheme for Image Tamper Detecton, Localzaton, and Restoraton, n Appled Computaton and Securty Systems. vol. 305, pp , 015.

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract

More information

Robust Block Selection for Watermarking Video Streams

Robust Block Selection for Watermarking Video Streams Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng

More information

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES he Internatonal Journal of Multmeda & Its Applcatons (IJMA) Vol.3, No.1, February 211 CONOURLE RANSFORM BASED WAERMARKING FOR COLOUR IMAGES Dnesh Kumar 1 and Vjay Kumar 2 1 Department of Computer Scence

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

A Novel and Secure technique for image. Steganography using DWT

A Novel and Secure technique for image. Steganography using DWT Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution 9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm 0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,

More information

Improved Error Detection in the JPEG2000 Codec

Improved Error Detection in the JPEG2000 Codec Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

A Novel DCT-based Approach for Secure Color Image Watermarking

A Novel DCT-based Approach for Secure Color Image Watermarking A Novel DCT-based Aroach for Secure Color Image Watermarkng Narges Ahmd Amrkabr Unversty of Technology n_ahmd@ce.aut.ac.r Reza Safabakhsh Amrkabr Unversty of Technology safa@ce.aut.ac.r Abstract In ths

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features Recognton of Low-Resoluton Face Images usng Sparse Codng of Local Features M. Saad Shakeel and Kn-Man-Lam Centre for Sgnal Processng, Department of Electronc and Informaton Engneerng he Hong Kong Polytechnc

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

Performance Comparison of Product Codes and Cubic Product Codes using FRBS for Robust Watermarking

Performance Comparison of Product Codes and Cubic Product Codes using FRBS for Robust Watermarking Internatonal Journal of Computer Informaton Systems and Industral Management Applcatons. ISSN 250-7988 Volume 8 (206) pp. 057-066 MIR Labs, www.mrlabs.net/jcsm/ndex.html Performance Comparson of Product

More information

A Robust Feature Extraction Algorithm for Audio Fingerprinting

A Robust Feature Extraction Algorithm for Audio Fingerprinting A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry

More information

The Application of Interpolation Algorithms in OFDM Channel Estimation

The Application of Interpolation Algorithms in OFDM Channel Estimation The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School

More information

Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking

Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking Proposed pproach for Improvng Bluetooth Netorks Securty through SVD udo Watermarkng M.. M. El-Bendary,. Haggag Dept. of Electroncs echnology, Faculty of Industral Educaton, Helan Unversty. Caro, Egypt.

More information

MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM

MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM Journal of Theoretcal and Appled Informaton Technology 2005-2015 JATIT & LLS. All rghts reserved. ISSN: 1992-8645 www.jatt.org E-ISSN: 1817-3195 MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications

LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications Dhaa Unv. J. Sc. 60(1): 31-36, 2012 (January) LSPIHT Algorthm for ECG Data Compresson and Transmsson for Telemedcne Applcatons Tahmna Zebn, Eramul Faroo, Syeda Znath Aman and Shahda Rafque Department of

More information

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,

More information

PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN

PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN Crstan V. SERDEAN 1, Martn TOMLINSON 1, Graham J. WADE 2 and Adran M. AMBROZE 1 1 Unversty of Plymouth, Unted Kngdom and 2 The

More information

Error Probability of RS Code Over Wireless Channel

Error Probability of RS Code Over Wireless Channel Internatonal Journal of Electroncs Engneerng, 3 (), 11, pp. 99 33 Serals Publcatons, ISS : 973-7383 Error Probablty of RS Code Over Wreless Channel Mohammad Aftab Alam Khan 1 & Mehwash Farooq 1 1 Department

More information

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery 017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang

More information

29. Network Functions for Circuits Containing Op Amps

29. Network Functions for Circuits Containing Op Amps 9. Network Functons for Crcuts Contanng Op Amps Introducton Each of the crcuts n ths problem set contans at least one op amp. Also each crcut s represented by a gven network functon. These problems can

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Pulse Extraction for Radar Emitter Location

Pulse Extraction for Radar Emitter Location 00 Conference on Informaton Scences and Systems, The Johns opkns Unversty, March 3, 00 Pulse Extracton for Radar Emtter Locaton Mark L. Fowler, Zhen Zhou, and Anupama Shvaprasad Department of Electrcal

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 8 Vol II IMECS 8, 9- March, 8, Hong ong Estmaton of Crtcal Performance and Optmzaton of Scalable Jont Source/ Coder (SJSCC)

More information

Hierarchical Generalized Cantor Set Modulation

Hierarchical Generalized Cantor Set Modulation 8th Internatonal Symposum on Wreless Communcaton Systems, Aachen Herarchcal Generalzed Cantor Set Modulaton Smon Görtzen, Lars Schefler, Anke Schmenk Informaton Theory and Systematc Desgn of Communcaton

More information

Performance Analysis of the Weighted Window CFAR Algorithms

Performance Analysis of the Weighted Window CFAR Algorithms Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,

More information

Phasor Representation of Sinusoidal Signals

Phasor Representation of Sinusoidal Signals Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS Ferdnan Snaga #, Elathamby Ambkarajah # and Andrew P. Bradley* # School of Electrcal Engneerng and Telecommuncatons

More information

DTIC DTIC. 9o o FILE COPY NATIONAL COMMUNICATIONS SYSTEM TECHNICAL INFORMATION BULLETIN 87-8 PULSE CODE MODULATION FOR GROUP 4 FACSIMILE

DTIC DTIC. 9o o FILE COPY NATIONAL COMMUNICATIONS SYSTEM TECHNICAL INFORMATION BULLETIN 87-8 PULSE CODE MODULATION FOR GROUP 4 FACSIMILE DTC FLE COPY NCS TB 87-8 NATONAL COMMUNCATONS SYSTEM q. nm TECHNCAL NFORMATON BULLETN 87-8 N NTRANSFORM CODNG AND DFFERENTAL Qz PULSE CODE MODULATON FOR GROUP 4 FACSMLE DTC ELECTE JUL 10]1! l AUGUST 1987

More information

Multicarrier Modulation

Multicarrier Modulation Multcarrer Modulaton Wha Sook Jeon Moble Computng & Communcatons Lab Contents Concept of multcarrer modulaton Data transmsson over multple carrers Multcarrer modulaton wth overlappng Chap. subchannels

More information

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain. Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

FFT Spectrum Analyzer

FFT Spectrum Analyzer THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------

More information

Diversion of Constant Crossover Rate DE\BBO to Variable Crossover Rate DE\BBO\L

Diversion of Constant Crossover Rate DE\BBO to Variable Crossover Rate DE\BBO\L , pp. 207-220 http://dx.do.org/10.14257/jht.2016.9.1.18 Dverson of Constant Crossover Rate DE\BBO to Varable Crossover Rate DE\BBO\L Ekta 1, Mandeep Kaur 2 1 Department of Computer Scence, GNDU, RC, Jalandhar

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Graph Method for Solving Switched Capacitors Circuits

Graph Method for Solving Switched Capacitors Circuits Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586

More information

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:4, No:, 200 A Hgh-Speed Multplcaton Algorthm Usng Modfed Partal Product educton Tree P Asadee

More information

Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images

Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images Ompraash Rajanar et al, / (IJCSIT) Internatonal Journal of Computer Scence and Informaton Technologes, Vol. 6 (), 015, 1636-164 Generalzed Multple ROI Prortzaton n JPEG000 for Natural Images Ompraash Rajanar

More information

@IJMTER-2015, All rights Reserved 383

@IJMTER-2015, All rights Reserved 383 SIL of a Safety Fuzzy Logc Controller 1oo usng Fault Tree Analyss (FAT and realablty Block agram (RB r.-ing Mohammed Bsss 1, Fatma Ezzahra Nadr, Prof. Amam Benassa 3 1,,3 Faculty of Scence and Technology,

More information

SC-FDMA and OFDMA: An Efficient Wireless Image Transmission Schemes

SC-FDMA and OFDMA: An Efficient Wireless Image Transmission Schemes Journal of Control and Systems Engneerng 016, Vol. 4 Iss. 1, PP. 74-83 Frst onlne: 8 July 016 SC-FDMA and OFDMA: An Effcent Wreless Image Transmsson Schemes Fasal S. Al-Kamal 1, Abdullah A. Qasem, Samah

More information

Robust Filter Design based on Generalized Maximum-Likelihood Estimation

Robust Filter Design based on Generalized Maximum-Likelihood Estimation Robust Flter Desgn based on Generalzed Maxmum-Lkelhood Estmaton STEFA LEISCHER, ROBERT KLISKI, HOLGER HUTZELMA, RUDI KORR Fraunhofer Insttute for Communcaton Systems Hansastr. 3, 8686 Munch GERMAY Abstract:

More information

Multiscale PCA based Quality Controlled Denoising of Multichannel ECG Signals

Multiscale PCA based Quality Controlled Denoising of Multichannel ECG Signals Multscale PCA based Qualty Controlled enosng of Multchannel ECG Sgnals L. N. Sharma, S. anadapat, and A. Mahanta Abstract Multscale Prncpal Component Analyss (MSPCA) s appled for qualty controlled denosng

More information

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems Hardware Desgn of Flter anased arrowband/deband Interference Canceler for Overlad TDMA/CDMA Systems Toyoau Ktano Kaunor Hayash Htosh Masutan and Shnsue Hara Graduate School of Engneerng Osaa Unversty YamadaOa

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

A Heuristic Speech De-noising with the aid of Dual Tree Complex Wavelet Transform using Teaching-Learning Based Optimization

A Heuristic Speech De-noising with the aid of Dual Tree Complex Wavelet Transform using Teaching-Learning Based Optimization ISSN (Prnt) : 39-863 ISSN (Onlne) : 975-44 D. Yugandhar et al. / Internatonal Journal of Engneerng and Technology (IJET) A Heurstc Speech De-nosng wth the ad of Dual Tree Complex Wavelet Transform usng

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM Azura Abdullah, Muhammad Sobrun Jaml Jamal, Khazuran Abdullah, Ahmad Fadzl Ismal and An Lza Asnaw Department of

More information

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame Ensemble Evoluton of Checkers Players wth Knowledge of Openng, Mddle and Endgame Kyung-Joong Km and Sung-Bae Cho Department of Computer Scence, Yonse Unversty 134 Shnchon-dong, Sudaemoon-ku, Seoul 120-749

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN Internatonal Journal of Scentfc & Engneerng Research, Volume 4, Issue, November-203 ISSN 2229-558 33 COMPARATIVE STUDY OF HUFFMAN CODING, SBAC AND CABAC USED IN VARIOUS VIDEO CODING STANDARS AND THEIR

More information

1.0 INTRODUCTION 2.0 CELLULAR POSITIONING WITH DATABASE CORRELATION

1.0 INTRODUCTION 2.0 CELLULAR POSITIONING WITH DATABASE CORRELATION An Improved Cellular postonng technque based on Database Correlaton B D S Lakmal 1, S A D Das 2 Department of Electronc & Telecommuncaton Engneerng, Unversty of Moratuwa. { 1 shashka, 2 dleeka}@ent.mrt.ac.lk

More information

DISTRIBUTED video coding (DVC) [1] [4] is an attractive

DISTRIBUTED video coding (DVC) [1] [4] is an attractive 1040 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 6, JUNE 2013 Dstrbuted Wreless Vsual Communcaton Wth Power Dstorton Optmzaton Xaopeng Fan, Member, IEEE, Feng Wu, Fellow,

More information

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng

More information

Double-lock for image encryption with virtual optical wavelength

Double-lock for image encryption with virtual optical wavelength Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca

More information

Motion Vector Recovery for Real-Time H.264 Video Streams

Motion Vector Recovery for Real-Time H.264 Video Streams Internatonal J. of Recent Trends n Engneerng and Technology, Vol., No., May 2 Moton Vector Recovery for Real-Tme H.264 Vdeo Streams Kavsh Seth, Tummala Rajesh, V. Kamakot 2, and S. Srnvasan Dept. of Electrcal

More information

An Algorithm Forecasting Time Series Using Wavelet

An Algorithm Forecasting Time Series Using Wavelet IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 04 ISSN (Prnt): 94-084 ISSN (Onlne): 94-0784 www.ijcsi.org 0 An Algorthm Forecastng Tme Seres Usng Wavelet Kas Ismal Ibraheem,Eman

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Markov Chain Monte Carlo Detection for Underwater Acoustic Channels

Markov Chain Monte Carlo Detection for Underwater Acoustic Channels Markov Chan Monte Carlo Detecton for Underwater Acoustc Channels Hong Wan, Rong-Rong Chen, Jun Won Cho, Andrew Snger, James Presg, and Behrouz Farhang-Boroujeny Dept. of ECE, Unversty of Utah Dept. of

More information

Genetic Algorithm for Sensor Scheduling with Adjustable Sensing Range

Genetic Algorithm for Sensor Scheduling with Adjustable Sensing Range Genetc Algorthm for Sensor Schedulng wth Adjustable Sensng Range D.Arvudanamb #, G.Sreekanth *, S.Balaj # # Department of Mathematcs, Anna Unversty Chenna, Inda arvu@annaunv.edu skbalaj8@gmal.com * Department

More information

Wideband Spectrum Sensing by Compressed Measurements

Wideband Spectrum Sensing by Compressed Measurements Wdeband Spectrum Sensng by Compressed Measurements Davood Mardan Najafabad Department of Electrcal Engneerng Yazd Unversty Emal: d.mardan@stu.yazdun.ac.r Al A. Tadaon Department of Electrcal Engneerng

More information

IIR Filters Using Stochastic Arithmetic

IIR Filters Using Stochastic Arithmetic IIR Flters Usng Stochastc Arthmetc Naman Saraf, Ka Bazargan, avd J Llja, and Marc Redel epartment of Electrcal and Computer Engneerng Unversty of Mnnesota, Twn Ctes Mnneapols, MN, USA {saraf012, ka, llja,

More information

aperture David Makovoz, 30/01/2006 Version 1.0 Table of Contents

aperture David Makovoz, 30/01/2006 Version 1.0 Table of Contents aperture 1 aperture Davd Makovoz, 30/01/2006 Verson 1.0 Table of Contents aperture... 1 1 Overvew... 2 1.1 Input Image Requrements... 2 2 aperture... 2 2.1 Input... 2 2.2 Processng... 4 2.3 Output Table...

More information

Range-Based Localization in Wireless Networks Using Density-Based Outlier Detection

Range-Based Localization in Wireless Networks Using Density-Based Outlier Detection Wreless Sensor Network, 010,, 807-814 do:10.436/wsn.010.11097 Publshed Onlne November 010 (http://www.scrp.org/journal/wsn) Range-Based Localzaton n Wreless Networks Usng Densty-Based Outler Detecton Abstract

More information

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance.

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance. ANALYTICAL COMPARISON OF THE PERFORMANCE OF ADAPTIVE MODULATION AND CODING IN WIRELESS NETWORK UNDER RAYLEIGH FADING 723 Sab Y.M. BANDIRI, Rafael M.S. BRAGA and Danlo H. SPADOTI Federal Unversty of Itajubá

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

Approximating User Distributions in WCDMA Networks Using 2-D Gaussian

Approximating User Distributions in WCDMA Networks Using 2-D Gaussian CCCT 05: INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS, AND CONTROL TECHNOLOGIES 1 Approxmatng User Dstrbutons n CDMA Networks Usng 2-D Gaussan Son NGUYEN and Robert AKL Department of Computer

More information

Multiple Error Correction Using Reduced Precision Redundancy Technique

Multiple Error Correction Using Reduced Precision Redundancy Technique Multple Error Correcton Usng Reduced Precson Redundancy Technque Chthra V 1, Nthka Bhas 2, Janeera D A 3 1,2,3 ECE Department, Dhanalakshm Srnvasan College of Engneerng,Combatore, Tamlnadu, Inda Abstract

More information

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance palette of problems Davd Rock and Mary K. Porter 1. If n represents an nteger, whch of the followng expressons yelds the greatest value? n,, n, n, n n. A 60-watt lghtbulb s used for 95 hours before t burns

More information

Multi-transmitter aperture synthesis with Zernike based aberration correction

Multi-transmitter aperture synthesis with Zernike based aberration correction Mult-transmtter aperture synthess wth Zerne based aberraton correcton Bahadr Guntur,, Davd J Rabb, 2 and Douglas F Jameson 2 Lousana State Unversty, Dept of Electrcal & Computer Engneerng, Baton Rouge,

More information