Fuzzy Authentication Algorithm with Applications to Error Localization and Correction of Images

Size: px
Start display at page:

Download "Fuzzy Authentication Algorithm with Applications to Error Localization and Correction of Images"

Transcription

1 Obad Ur-Rehman, Natasa Zvc Fuzzy Authentcaton Algorthm wth Applcatons to Error Localzaton and Correcton of Images OBAID UR-REHMAN and NATASA ZIVIC Char for Data Communcatons Systems Unversty of Segen Hoelderlnstrasse 3, Segen, GERMANY {obadur-rehman, Abstract: - Images are normally protected usng standard messages authentcaton codes to protect them aganst tamperng and forgeres One problem wth ths approach s that when such mages are transmtted over a nosy medum, even a sngle bt error mght render the mage as un-authentc to the recever In ths paper, a nose tolerant data authentcaton algorthm s proposed The proposed algorthm can perform authentcaton n the presence of mnor errors but at the same tme dentfy forgeres n the data Ths algorthm s then extended by demonstratng ts applcatons n mage authentcaton The extended algorthm s called as fuzzy authentcaton algorthm It has the ablty to localze errors n an mage as well as correct the localzed errors usng error correctng codes The proposed algorthm rejects only the potentally erroneous / unauthentc parts of the mage and correct or authentcate the remanng parts f the number of errors s below a certan threshold Ths reduces the need for retransmsson of the complete mage and only a few parts mght be retransmtted f the applcaton demands Ths property s especally useful n real-tme communcatons It s better to obtan a part of the authentc mage, rather than havng no mage at all A securty analyss of the proposed algorthm s gven, and smulaton results are presented to demonstrate ts error localzaton and correcton capabltes Keywords: - Fuzzy Authentcaton; Image Authentcaton; Relablty Values; Soft Authentcaton; Content Based Authentcaton; Nose Tolerant Authentcaton Introducton Modern communcaton systems are typcally composed of compresson, channel codng and securty modules Whle compresson reduces the sze of transmtted data, channel codng ams to delver the data relably to the recever by usng addtonal party data The securty module provdes authentcty of the orgn, protecton aganst eavesdroppng and forgery attempts The goal of compresson s to elmnate redundancy, whereas the channel codng and securty modules add redundancy to the compressed data n order to acheve ther respectve goals Thus the solutons provded by these modules can often be conflctng An mproved coordnaton and nformaton sharng between these buldng blocks can acheve the desred ndvdual goals of the modules n a better manner In order to provde the above mentoned securty features, such as message authentcty, proof of orgn, ntegrty and protecton aganst forgeres, cryptographc methods are used Standard Message Authentcaton Code (MAC) s used to ensure the ntegrty and authentcty of a message MAC s computed on a message usng a shared secret key between the sender and the recever and s appended to the message Ths also helps n provng the authentcty of orgn of a message In standard applcatons of MAC, hard authentcaton s used, whch ensures that even a sngle bt modfcaton to the message s detected Some applcatons ncludng multmeda transmsson lke mage, voce and streamng audo, are generally nose tolerant [5] and have real-tme requrements In such applcatons, t mght be meanngful to retan the receved object (eg, an mage), wthout the need for a retransmsson, even f the hard authentcaton fals and a modest number of errors exst For ths category of applcatons, soft authentcaton algorthms have been proposed n the lterature, such as Approxmate Message Authentcaton Code (AMAC), Image Message Authentcaton Code (IMAC) and Nose Tolerant Message Authentcaton Code (NTMAC) [5-7] Some soft, as well as hard, authentcaton algorthms talored for multmeda transmsson have also been proposed [8-] Some parallel work on mage retreval based on mage content nstead of the mage pxel data ncludes [3-4] Such algorthms are called content based mage retreval algorthms Image encrypton based on mage content and regon of nterest selecton has been shown recently n [5] However, most of these algorthms work wth lttle or E-ISSN: Issue 7, Volume, July 03

2 Obad Ur-Rehman, Natasa Zvc n no co-ordnaton wth the other modules of a communcaton system Thus the receved mage could be rejected due to a sngle (addtonal) error beyond the allowed lmt In ths paper an algorthm for data authentcaton n the presence of nose s proposed Ths algorthm s named as Soft Input Decrypton (SID) and ts proposed varant as Threshold based Soft Input Decrypton (TSID) In a standard mage transmsson system, the mage s dvded nto non-overlappng (square) blocks, and for each block a dscrete cosne transform (DCT) s calculated, whch s followed by a quantzaton and entropy decoder Among all of the DCT components, the frst coeffcent plays the most mportant role and s called the DC coeffcent, whle the rest are called AC coeffcents It s well known that despte of dscardng a certan number of AC coeffcents, the mage can be reconstructed at the recever, usng the Inverse DCT, wthout much loss n the qualty The redundances whch are assumed to be dscarded are nter-pxel or psychologcal redundances and can be dscarded wthout any sgnfcant detectable vsual effects A soft authentcaton algorthm based on the coordnaton between the channel codng and message authentcaton modules s proposed n ths paper The proposed algorthm works on compressed mages usng the Dscrete Cosne Transform (DCT) and uses the TSID algorthm as well as the NTMAC [7] algorthm for the soft authentcaton and error localzaton as well as error correcton A certan number of errors below a predefned threshold are corrected, whle another permssble number of errors are tolerated by the proposed authentcaton algorthm DCT s used for the basc feature extracton and mage compresson The proposed algorthm s based on the NTMAC, wth addtonal error localzaton, correcton and soft authentcaton propertes Ths paper s organzed as follows; In Secton, the Soft Input Decrypton Algorthm s descrbed In Secton, the Soft Input Decrypton Algorthm wth Threshold s dscussed In Secton 4, the DCT s brefly revewed followed by the descrpton of the proposed algorthm The analyss of the proposed algorthm s gven n Secton 5 Smulaton results are presented n Secton 6, followed by the concluson n Secton 7 Soft Input Decrypton (SID) Algorthm SID algorthm s the bass for Jont Channel Codng and Cryptography concept [], [] Ths concept develops further the dea from [3], [4] on usng the soft output (Log Lkelhood Ratos or L- values) of the SISO (Soft Input Soft Output) channel decodng n order to try and correct the nput of cryptographc mechansms and therefore mprovng the results of decrypton The algorthm of Soft Input Decrypton (presented n Fg ) deals wth blocks of data where each block contans a message (as payload) to whch ts Cryptographc Check Value (CCV) s concatenated as a securty redundancy At the transmtter, the CCV s generated by passng the message through a cryptographc check functon and usng a secret key K shared wth the recever Message M and ts CCV are thereafter encoded by the channel encoder and transmtted over a nosy channel After performng channel decodng at the recever, the (SISO) channel decoder outputs the estmated message M, the estmated CCV and the L-values of all the bts of M and CCV These three elements are the nput to Soft Input Decrypton process whch can be brefly descrbed as follows: At frst, CCV = CCV(M = M ) s calculated by applyng the shared secret key K If CCV = CCV, the verfcaton result s successful / true and M s accepted as correct Fg Soft Input Decrypton Algorthm If the verfcaton result s un-successful / false, the L-values of the channel decoder are analyzed Some bts from M and CCV wth the lowest L -values are flpped / nverted There are dfferent strateges for choosng the bts to be nverted, but the smplest (and also effcent) way s to sort the L -values n ncreasng order and then to pck those bts from M and CCV whch correspond to sorted L -values After the bt nverson, whch results n M and CCV, the verfcaton process compares CCV and CCV(M ) for equalty If the verfcaton result s E-ISSN: Issue 7, Volume, July 03

3 Obad Ur-Rehman, Natasa Zvc false agan, another bt or combnaton of bts s nverted (correspondng to the bnary nterpretaton of N-bt counter ncremented by ) Ths teratve process contnues tll ether the verfcaton result s true or a threshold number of teratons have been performed The dea of nverson of the least relable bts orgnated from Chase decodng algorthms [3] n 97, whch were the generalzaton of the GMD (Generalzed Mnmum Dstance) algorthms from 966 [4] and mproved channel decodng These algorthms have been appled to a bnary (n, k) lnear block code and are referenced as LRP (Least Relablty Postons) algorthms The novelty of SID s the nverson of bts teratvely for data protected by cryptographc redundancy wth feedback between the decryptor and the channel decoder, snce t gves the possblty to check whether the nverson teraton was successful or not (through the process of verfcaton) It may happen that a par of M and CCV generated by the bt nverson passes the verfcaton although the message M s not equal to the orgnal message M The probablty of such an event s very small, whch wll also be taken n consderaton n the next Secton In smulatons, both message and CCV have the length of 60 bts CCV has been calculated usng RIPEMD60 wth a key K Smulatons have been performed usng a Convolutonal encoder of code rate r = / and constrant length m = as the smplest one, but used very often n theory and practce BPSK modulaton and an Addtve Whte Gaussan Nose (AWGN) channel are used together wth a SISO decoder based on the Maxmum A-Posteror (MAP) algorthm The MAP decoder was programmed n such a way, that t supports the output of L-values The presentaton of the results of the smulatons (Fg ) clearly shows obtaned benefts and potentals of SID algorthm In order to measure the mprovement, a parameter named the Cryptographc Check Error Rate (CCER) s defned as follows: number of ncorrect CCVs CCER =, () number of receved CCVs where an ncorrect cryptographc check value s each CCV whch ddn't pass the verfcaton Fg shows the mprovement of CCER wth Soft Input Decrypton for the cases that up to 8 of the lowest L -values (graph b) or up to the 6 lowest L values are used (graph c) Example: CCER of 0-3 at E b /N 0 ~ 6 db wthout Soft Input Decrypton s the same as for E b /N 0 ~ 4 db wth Soft Input Decrypton, or decreased from 0 - to 0-3 at E b /N 0 ~ 4 db Usng up to 6 of the lowest L -values a codng gan of 33 db can be reached, and CCER > 0 - wthout Soft Input Decrypton can be reduced down to CCER < 0-4 at E b /N 0 ~ 4 db Fg Results of Soft Input Decrypton usng up to 8 (b) and 6 (c) lowest L -values compared to results wthout Soft Input Decrypton (a) At ths pont, a few words need to be sad regardng the L-values and the type of channel decoder whch can be used together wth the SID The channel decoder s assumed to be SISO (Soft Input Soft Output) SISO s a concept of channel decodng, whch was orgnally used n teratve and Turbo codng, because the (soft) output s fed-back nternally Soft output of the channel decoder s used here as the soft nput for the cryptographc verfcaton process (called Soft Input Verfcaton) Soft output of the channel decoder s usually expressed as L-value of each output bt u, P( u = ) L ( u' ) = ln, () P( u = 0) L(u ) represents the relablty of the decson made by the channel decoder, e, f the sent bt u was a or 0 The sgn of the L-value shows the hard output of bt u ( or 0) and the magntude, e, L, s used as relablty value of the hard decson Example: f L s postve, the hard output s, otherwse t s 0 The hgher the L, the more relable s the hard decson and vce versa: a lower L means a less relable decson When the L-Value s equal to 0, the probablty of the correctness of the decson s 05 It s obvous that SID method greatly depends on the "qualty" of L-values, whch means that "better nformaton" on bt relablty wll gve better results E-ISSN: Issue 7, Volume, July 03

4 Obad Ur-Rehman, Natasa Zvc after SID The decoder whch produces L-values need not to be exclusvely of SISO type, but each L-value provded for each partcular bt must, n some way, represent ts relablty Such a requrement dsqualfes, for example, Vterb decodng snce then, the produced array of L-values gves the probabltes of the paths through trells and not bt relabltes From the other sde, there s MAP decoder (used n smulatons) whch nternally calculates probabltes of each bt value takng nto account the values of all other bts before and after a partcular bt Havng all these probabltes already obtaned by MAP, usng () t s easy to get L-values whch are sutable for the use wthn SID MAP s also a SISO decoder, whch, besdes the bt array from the output of lne decoder (e demodulator), as nput can take the soft nformaton on the probabltes of demodulated bts as well It s mportant because then MAP has the opportunty to be used as a part of dfferent more effcent (and more complex) decodng schemes wth feedback One of them s Turbo-decodng scheme where two MAP blocks are coupled over "crossed feedbacks", workng together n an teratve process In the above mentoned smulatons, the "pure MAP" wthout feedback s used, whch assumes that all the nput probabltes of demodulated bts (soft nput) have been preset on the value of 05 Havng n mnd the way on whch MAP nternally calculates bt probabltes, one can conclude that for better results, the length of nput bt array (n our case message M concatenated wth ts CCV) shouldn't be too small, snce each bt probablty (and the decson based on t) wll be calculated usng more neghborng bts On the other sde, the more dstant bts have smaller nfluence on the calculatons and also can add numercal nose, so t s expected that there s an optmal length of MAP nput array (whch s equal to the length of output array) The obtaned results are also affected by the qualty of L-values from the MAP decoder, whch as explaned, depends on the lengths of message and CCV After all, the resume s that message and CCV together should have an optmal length (or close to optmal) In such a case where the messages are too long (or a contnuous data stream s to be transmtted), they should be fragmented and for each fragment the CCV should be calculated, so that all together have more or less optmal length 3 Soft Input Decrypton Usng Threshold Although t seems that the SID method, especally n the scenaro wth a feedback, has exploted the whole soft nformaton avalable from the channel decoder but further mprovements of codng gan are stll possble Snce the decrypton of CCV s very senstve to errors, the verfcaton process need not to be so strct as t used to be Ths gves more space for the SID method, whch s now able to choose L- values more precsely by settng the verfcaton threshold Settng the threshold ncreases the probablty of the false verfcaton (collson), but even then t s extremely small The effcency of SID method depends on the obvous factors such as the lengths of the message and the CCV, the number of bts chosen for nverson and the E b /N 0 rato Some results of many smulatons for dfferent values of these parameters are presented n the prevous Secton as well as n [] Besdes the mentoned parameters, the qualty of L-values produced by channel decoder plays an mportant role, whch ndrectly affects the overall effcency of the process nvolvng SID Naturally, SID works better wth a smaller as compared to a bgger porton of data whch s to be corrected One way to decrease the data length used by SID s to exclude the bts of cryptographc check value from correcton wthn SID Namely, f the length of the message s m and the length of cryptographc check value s n, SID now consders only m nstead of m+n elements SID pcks N lowest L -values and nverts correspondng bts (only from decoded message M') n the teratve process of verfcaton The above proposed enhancement of SID method s possble snce the cryptographc check value satsfes the so called avalanche crteron whch assumes that wrong decoded (e, reconstructed) CCV has n average 50% of the bts wrong Ths means that f only one bt from the decoded message M s erroneous, around n/ bts n CCV wll be erroneous as well In other words, when a decoded message M s ncorrect, CCV(M ) must have many wrong bts, much more (e sgnfcantly more) than the decoded CCV' So n the case that CCV contans only a few ncorrect bts, e, when the Hammng dstance (HD) between CCV and CCV, e, HD(CCV', CCV") s small enough, t s obvous that M s correct (M equals orgnal M) and that the dfference between CCV and CCV exsts only because of the errors n CCV Hence, durng the verfcaton process wthn "Thresholded SID" (TSID), there s no need to check f all the bts from CCV are equal to the correspondng bts n CCV, but the crteron for successful verfcaton would be that d=hd(ccv', E-ISSN: Issue 7, Volume, July 03

5 Obad Ur-Rehman, Natasa Zvc CCV") s less than a threshold d max whch s to be determned In order to determne the approprate value for decson threshold d max, the statstcal dstrbuton of HD between CCV and CCV has to be found For gven BER after decoder (P e ) and the length of the message m, the probablty dstrbuton functon (pdf) over dfferent values of d can be expressed n the form of total probablty sum: pdf d) = P pdf ( d) + P pdf ( d), (3) ( M' correct M' ncorrect where P M'correct and P M' ncorrect are the probabltes that decoded message M does not contan or contans errors respectvely: P M correct P ( P ) m e ( P ) m ' =, (4) = M ' ncorrect e, (5) and pdf (d) and pdf (d) are condtonal probablty dstrbuton functons of the HD after M s correct or ncorrect In the case of successful verfcaton, Hammng dstance d = HD(CCV, CCV ) s expected to have a small value, smaller than the decson threshold d max (whch s to be found) Also, CCV wll be equal to the orgnal CCV (because M s equal to orgnal M), so d wll be equal to the number of errors n CCV only, and d max should be greater than the possbly largest number of errors n CCV Snce after channel decoder the remanng errors (f exst) are unformly dstrbuted only over the CCV (wth the length of n bts), the number of errors n CCV has a bnomal dstrbuton B(n,P e ), e, n d n d pdf ( d ) = Pe ( Pe ), 0 d n, (6) d wth mean value n P e and standard devaton σ = np e (-P e ) When the verfcaton s unsuccessful, HD(CCV, CCV ) s large (above the decson threshold d max ) as a consequence of the characterstcs of cryptographc check value Namely, when the message s wrongly decoded (M s ncorrect, e, M contans one or more errors) the number of errors n CCV s expected to be n/ due to the avalanche crteron In ths case, CCV can take any of n values (wth equal probablty) Defnton : Bt arrays A and B have length of n elements Each element a and b s ndependent from other bts and has equal probablty of takng the values 0 and, e, 0, p0 = / 0, p0 = / a = b = (7), p = /, p = / Defnton : Y k and N k are subsets of set S={,,,n} where: Y k has D elements, N k has n-d elements, Y k N k =S and Y k N k = Lema : The Hammng dstance d between arrays A and B: n d = HD( A, B) = a b (8) = has the Bnomal dstrbuton B(n, p=/) e, n pdf ( d) =, 0 d n, (9) n d Proof: The probablty that d takes a concrete value D s: P = { d = D} Y k, N k P = P = = D = { a = b, Y } P{ a b, N } n a b k k (0) where the summaton s appled on each subset par (Y k,n k ) The number of those pars n s: k max =, so we have, D P { d = D} n = D + n D = D = [ P{ a = b = } + P{ a = 0 b = 0} ] [ P{ a = b = 0} + P{ a = 0 b = } ] n = + D n =, n D = whch proves the Lema D + + n D = = () In the case of an unsuccessful verfcaton, CCV and CCV can be consdered as ndependent bt arrays A and B accordng to Defnton, and HD(CCV, CCV ) wll have the probablty dstrbuton functon as shown n Lema : + E-ISSN: Issue 7, Volume, July 03

6 Obad Ur-Rehman, Natasa Zvc n pdf ( d) =, 0 d n, () n d Equaton () can also be explaned n smpler way Namely, when the message s not verfed, the expected value of HD(CCV, CCV ) s equal to the expected value of HD between CCV and any other fxed array of bts of the same length If for smplcty, we choose an array of bts X = 000, the HD(CCV, X) wll also have Bnomal dstrbuton B(n,p), where p=/ snce every bt n CCV s expected to be 0 or wth equal probablty, so the pdf of HD(CCV, CCV ) can be wrtten as n () By combnng equatons (4), (5), (6) and () n (3), for the parameter values m=60, n=60 and P e =00, the probablty dstrbuton of d = HD(CCV, CCV ) wll have the shape as shown n Fg3 Two regons are clearly dstngushed: the left one for the case of successfully decoded message (e, M = M ) and the second when the decoded message M s wrong (e, M M ) It s obvous that the probablty dstrbuton over d s zero for a great range of values between these regons, whch means that the decson threshold d max n the process of verfcaton mght take any value from ths mddle area Fg 3 Probablty dstrbuton of d=hd(ccv, CCV ) The rate of acceptance of decoded and by flppng corrected messages wthn verfcaton process wll be greater f the d max s set to a greater value The lower lmt of the threshold (d max_low ) can be chosen n relaton to wanted acceptance rate of message, e, regardng the predefned probablty of message rejectng In columns 3, 5 and 7 of Table (see Appendx) the values of d max_,low are shown for dfferent lengths of cryptographc check value (n = 60, 8, 64) and message (m = 60, 9, 56) so that m+n = 30 and for dfferent BERs (dependng on E b /N 0 ) The crtera for choce of d max,low was that the probablty of message rejectng (when M s correct) s less than 0 -k, e, n P pdf( d) < 0 M ' corect d = d max_ low + k, () where P M'correct and pdf (d) are defned n (8) and (0), and the condton for message to be accepted as correct s, d = HD( CCV ', CCV") d (3) By settng the parameter k to an approprate value, wanted mnmal acceptance rate can be acheved and the matchng values of d max_low can be calculated from () and (3) The values of d max_low obtaned n ths way are shown n Table I, where each cell contans four dfferent values: for k = 4, 6, 0 and 5 respectvely On one hand, greater d max and hgher acceptance rate of messages means speedng up the verfcaton process, snce the expected number of bt-flppng teratons leadng to successful verfcaton s smaller Greater d max, on the other hand, wll ncrease the probablty of false verfcaton the event when the decryptor wrongly decdes that a decoded message M (or the corrected message M after a number of btflppng teratons) s correct Ths happens when CCV, whch acts as a random varable (snce calculated from wrong decoded message M and the secret key K), satsfes the condton (7) The probablty of false verfcaton becomes sgnfcant when the value of decson threshold d max s gettng closer to the regon on the rght sde n Fg3 Smlarly as by choosng the lower lmt, the upper lmt of the threshold (d max,hgh ) can be found wth regard to the probablty of false verfcaton whch can be tolerated Ths probablty can be also defned by the use of parameter k, whle d max,hgh wll be the maxmal nteger that satsfes the followng condton: max d max_ hgh k PM ncorect pdf( d) < 0 d = 0 ', (4) (n (3) and (5) are the defntons of P M'ncorrect and pdf (d)) Columns 4, 6 and 8 of Table contan values of d max,hgh calculated from (8) for k=4, 5, 0 and 0 respectvely There s a lot of values wthn range [d max,low +, d max,hgh ] whch could be taken as the threshold, for dfferent values of parameters E b /N 0, P e, m and n Both SID and TSID methods have been smulated wth the message and ts CCV / HMAC tag, both of length of 60 bts HMAC tag has been calculated E-ISSN: Issue 7, Volume, July 03

7 Obad Ur-Rehman, Natasa Zvc usng RIPEMID60 hash functon Smulatons have been performed usng a Convolutonal encoder of code rate r (= ½) and a constrant length m =, BPSK modulaton, AWGN channel and SISO decodng usng MAP algorthm The results of smulatons are expressed through Cryptographc Check Error Rate (CCER), already defned by (), as the rato between the number of ncorrect CCVs after (T)SID and the whole number of smulatons for gven set of parameters In both methods 6 bts wth smallest L -values were beng flpped, e, maxmally 6 trals of soft correcton (bt flppng) had been performed n each smulaton The value of decson threshold wthn TSID had been set to 0% of the CCV length d max = 3 Fg 4 Acheved codng gans of SID and SID wth threshold (TSID) The results are presented n Fg 4, showng the acheved codng gan n comparson to standard / convolutonal codng Usng orgnal SID method, more than 4 db of gan s acheved, whle TSID obtans addtonal db 4 Authentcaton Of Images Usng TSID And Nose Tolerant MACs (NTMACs) Based On The Dscrete Cosne Transform 4 Introducton In ths Secton the applcaton of TSID algorthm n combnaton wth the Nose Tolerant Message Authentcaton Code (NTMAC) s nvestgated n mage authentcaton For mages, the basc features are authentcated rather than authentcatng the mage tself For ths purpose, the Dscrete Cosne Transform s used to extract the block by block features and authentcate the mage block-wse Ths s also benefcal for the TSID algorthm, whch works well over small blocks of data as compared to bg ones 4 Dscrete Cosne Transform n Image Processng Dscrete Cosne Transform s one of the most wdely used technques n mage processng for basc feature extracton and compresson Its applcaton n mage processng was poneered n [6] Due to ts better reconstructon capablty, DCT s more sutable to mages than other relevant transforms, such as Dscrete Fourer Transform (DFT) DCT, lke other transforms, tres to elmnate the correlaton from mage data After de-correlaton, each transform coeffcent can be encoded ndependently wthout devtalzng the compresson effcency Many well known mage and vdeo compresson standards lke JPEG and MPEG-//4/H6x, are based on -D DCT The Dscrete cosne transform of a -D vector s defned as follows [6-8]: N N π (m + ) π (n + ) X ( l, k) = α( l) α( k) x( m, n) cos cos N m= 0 n= 0 N N where, /, = 0 α ( ) = (5), N It s clear from (5) that the frst coeffcent (DC) represents the average ntensty of the correspondng block and contans most of the energy and perceptual nformaton Also the nverse of -D DCT for l,k = 0,,, N- s defned as follows, N N π(m + ) π(n + ) x( l, k) = α ( l) α( k) X( m, n)cos cos (6) N m= 0 n= 0 N N Besdes the general characterstcs of DCT whch are defned for every Fourer-lke transform, other propertes of DCT lke de-correlaton, energy compactness, symmetry and separablty make t a convenent tool for mage processng purposes 43 Introducton and Defntons The algorthm ntroduced n ths paper s based on the DCT transform It protects the transmtted DCT components of an mage by NTMAC and performs soft authentcaton on receved (nosy) mages The algorthm s able to localze errors n the mages and to correct a certan number of them f they are below a E-ISSN: Issue 7, Volume, July 03

8 Obad Ur-Rehman, Natasa Zvc certan threshold The followng defnton s used n the descrpton of the proposed algorthm Defnton 3: Let H be the receved n-bt MAC for a transmtted message M Let M be the receved message, H be the MAC recalculated at the recever and let d be a small non-negatve nteger (d << n/); then (M, H ) s sad to be d-soft-verfed f HD(H, H ) d, where HD s the Hammng Dstance between H and H For the sake of smplcty, let s assume the mage to be transmtted s N N pxels Let m be the block sze such that m N, where both N and m are ntegers The sender dvdes the mage nto m m-pxel dsjont blocks (typcally m s equal to 8) Ths s followed by the calculaton of DCT for each block 44 Image Authentcatng and Correctng Weghted Nose Tolerant MAC (IAC- WNTMAC) IAC-WNTMAC acheves error localzaton usng the concept of weghts IAC-WNTMAC s based on NTMAC [7] and dentfes the locatons of potental erroneous blocks wth a hgh probablty The NTMAC algorthm [7] works by splttng a message / mage nto smaller components A MAC s calculated for each of the smaller components and truncated to obtan a sub-mac The sub-macs correspondng to these message components are concatenated to form the NTMAC The IAC- WNTMAC tag calculaton can ether operate rowwse or column-wse on the mage blocks It s assumed here that the tag calculaton s done rowwse A DCT matrx s obtaned for each block n the source mage Thus there are as many DCT matrces as the number of blocks n the source mage NTMAC s calculated based on the DC components of the DCT matrces taken row-wse There are N/m such DCT matrces n each row and therefore N/m DC components are used to get one NTMAC (aganst a row) The same step s repeated for all the rows, gvng N/m NTMACs Ths process s also repeated for the frst mnor dagonal after DC coeffcent (called as frst mnor dagonal for the sake of smplcty) of the DCT matrces, gvng another set of N/m NTMACs Ths produces a total of (N/m) MACs, e, N/m + N/m The usage of NTMAC mproves the error localzaton, whereas the usage of the NTMAC for the mnor dagonal ncreases the qualty of reconstructed mage at the recever as explaned next All of these N/m + N/m NTMAC tags are appended together to obtan IAC-WNTMAC tag for transmsson The mage I and ts IAC-WNTMAC tag are receved over a nosy channel The recever recalculates IAC-WNTMAC tag on I to get IAC- WNTMAC Now the receved IAC-WNTMAC tag s compared wth the recalculated IAC-WNTMAC tag Ths s done by comparng the correspondng sub- MACs If the sub-macs are d-soft-verfed accordng to the defnton gven above, then the DC component s accepted as authentc and the message block correspondng to the DC component s declared as authentc Otherwse, the block s marked as unauthentc / suspcous All the blocks marked as unauthentc / suspcous wll be tred for error correcton usng Chase lke teratve error correcton algorthm based on the bt relabltes calculated usng the MAP decoder at the recever Ths teratve error correcton s repeated for the frst mnor dagonal as well, so that they can be reconstructed to get a better qualty of the reconstructed mage However, the frst mnor dagonal has a lower weght than the DC component Lower weght means that the threshold for the maxmum number of teratons used for the recovery of the frst mnor dagonal s smaller than the threshold used for the recovery of the DC component, e, a varaton of the EC-WNTMAC [0] s used If T terdc s the teraton threshold used for the error correcton of DC components and T trfmd s the same used for the frst mnor dagonal, then the total number of teratons are gven by, T tr = T trdc + T trfmd (7) The pseudo-code of the IAC-WNTMAC tag generaton and verfcaton algorthms s gven below for an N N mage It can be easly extended to the general case where the mage s not square Also here weghts are assgned based on the DC and the frst mnor dagonal elements, whch can be easly extended to other mnor dagonals The notaton DC s self explanatory, whereas MD represents the Mnor Dagonal of the DCT matrx Algorthm: IAC-WNTMAC Tag Generaton Algorthm Inputs: Source Image (I) Image wdth / heght n pxels (N) Block length (m) Algorthm: blocks = spltimageintoblocks(i, N, m) for = to N/m E-ISSN: Issue 7, Volume, July 03

9 Obad Ur-Rehman, Natasa Zvc for j = to N/m DCT = blocks,j DC = DCT, submac DCj = calcsubmac(dc) submac MDj = calcsubmac(dct, DCT, ) end submac DC = submac DC submac DCN/m submac MD = submac MD submac MDN/m end NTMAC DC = submac DC submac DC submac DCN/m NTMAC MD = submac MD submac MD submac MDN/m Output: end end end Output: authentcmessageblocks B, B, BNb, B,Nb B,Nb BNb,Nb B,j = Image Block S,j = sub-mac of B,j P,j = Pxel n a B,j MSB(W, n) = Keep n-most Sgnfcant Bts of W WNTMAC = NTMAC DC + NTMAC MD S, S, S, SNb, S, SNb, S, S, S, S, S,Nb S,Nb S Nb,Nb S,Nb S,Nb NTMACDC NTMACDCNb NTMACMD NTMAC DC NTMAC MD B,j P, P,m SNb, SNb, S Nb,Nb NTMACMDNb Pseudo code for tag verfcaton at the recever: P, P,m Pm, Pm,m DCT submac,j = MSB(MAC(DC), n) submac,j = MSB(MAC(AC, AC,), n) Algorthm: IAC-WNTMAC Tag Verfcaton at the Recever DC AC, AC,m AC, AC,m ACm, ACm,m WNTMAC Calculate sub-macs on DC and frst mnor dagonal s AC components Inputs: Compress Receved Image (I ) Receved NTMAC Image wdth / heght (N) Block length (m) Block LLRs (blockllrs) Algorthm: I = decompressimage(i ) submac DC = makedcsubmacs(ntmac ) submac MD = makemdsubmacs(ntmac ) dc_llrs = blockllrstodcllrs(blockllrs) md_llrs = blockllrstomdllrs(blockllrs) blocks = makeblocks(i, W, H, m) for = to N/m for j= to N/m DCT = blocks,j DC = DCT, submac DC,j = calcsubmac(dc) submac MD,j = calcsubmac(dct, DCT, ) f( HD(subMAC DC,j, submac DC,j ) d ) performerrorcorrecton(dc, DC_LLRs,j ) end f( HD(subMAC MD,j, submac MD,j ) d ) performerrorcorrecton(dct, DCT,, MD_LLRs,j ) B, B, B Nb, DC AC, AC, AC,5 AC5, AC5,5 Compressed Block Fg 5 IAC-WNTMAC Transmtter B,j DC AC, 0 AC, DC AC, AC,m AC, AC,m LLRs from Channel Decoder Receved Image: I Receved WNTMAC (WNTMAC ): NTMAC DC + NTMAC MD AC m, AC m,m IDCT B,Nb B,Nb B Nb,Nb S, S, S, S Nb, S, Fg 6 IAC-WNTMAC Recever S Nb, S, S, S, submac,j = MSB(MAC(DC ), n) No Perform Iteratve Decodng for Soft Verfcaton of Block B,j S, S Nb, S Nb, S,j HD(subMAC,j, S,j) d max S, S, S Nb,N S, S, S Nb,Nb Yes Mark Block as Authentc NTMAC DC NTMAC DCNb NTMAC MD NTMAC MDN E-ISSN: Issue 7, Volume, July 03

10 Obad Ur-Rehman, Natasa Zvc 5 Analyss of the proposed Algorthm IAC-WNTMAC algorthm s a varant of WNTMAC gven n [0] Therefore the analyss of the IAC-WNTMAC algorthm s based on WNTMAC It s assumed that an deal n-bt MAC (n 56) algorthm s used for each row and each column of concatenated selected DCT elements of the blocks of an mage The total number of concatenated DC coeffcents s (N/m) of k-bt each Let the bt error rate of the channel be denoted as BER 5 Performance Study d-soft-verfcaton s successful, f the dfference between the receved MAC and the recalculated one s not greater than the threshold value Two types of errors can exst: false rejecton (correct mage s dscarded) and false acceptance (wrong mage s accepted) The probablty of a false rejecton of the whole mage (P FR ) depends on the polcy of the applcaton and the nature of the mage blocks False rejecton s not as bad as false acceptance, whch causes communcaton overhead and reduces the effcency and therefore the securty Therefore the probablty of false acceptance wll be dscussed False acceptance happens when there are error(s) n the receved mage I, but the receved and recalculated tag par s d-soft-verfed The probablty of false acceptance on the block level s: P FA k [ ( BER) ] d n ( Block) = BER ( BER) = 0 n (8) 5 Securty Consderatons The most mportant ntegrty threat aganst data s message substtuton and forgery It refers to any attempt for addng, removng and manpulatng objects nto data n order to fool the recever to accept the wrong message Ths threat n mage data can lead to mage tamperng The algorthms ntroduced n ths paper are based on the standard deal MAC, so the generc attacks on MACs are consdered as potental threats As n the gven approaches, the algorthms may tolerate a modest number of error(s) as a consequence of soft verfcaton The securty strength s decreased generally compared to hard authentcaton MAC schemes by allowng near collsons Ths drawback s compensated n both approaches In the frst one each DCT element s supported by two MACs nstead of one MAC and the attacker has to forge DCT elements n such a way that both row and column MACs become d-soft-verfed In the second algorthm, the attacker has even more dffcult task, the forgery attack requres forgery on protected DC and AC coeffcents so that IAC-WNTMAC authentcaton on both selected DC and AC coeffcents becomes successful A common approach for approxmatng the requred complexty (data/tme) for forgery attack on MACs s gven by a brthday paradox whch s based on fndng collsons In case of soft authentcaton, the attacker attempts to launch a nearcollson attack [9] Near-collson refers to any message par whose MACs dffer only n few bts from each other By extendng the brthday paradox to the ntroduced soft verfcaton scheme wth threshold d, t s expected to have a near collson (wth at most d-bt dfferences) wth the data complexty (C) of, C = d = 0 n (9) n In the presented algorthms, the mnmum MAC length used to protect row and columns of DC coeffcents s 56 bts The threshold value s set n such a way that the probablty of events lke false acceptance and false rejecton remans sgnfcantly low There are other expermental methods to fnd a convenent safe threshold zone through mage processng technques It can be easly concluded that the securty strength compensated by double length of the MAC s much larger than the requred securty strength of a standard MAC, for low threshold values The securty of the second approach s even hgher due to secret parttonng 6 Smulaton Results The smulaton results are presented for the proposed algorthm usng mage transmsson over AWGN channel wth BPSK modulaton The results are gven n the presence of rate /3 Turbo Codes The extrnsc Log Lkelhood Ratos (LLRs) produced by the decoder for Convolutonal Turbo Codes (CTC) are used for bt relabltes values The source mage s a grayscale mage of 8 8 pxels (each pxel of 8 bts) The mage s splt nto 8 8 pxel non-overlappng blocks, gvng a total of 6 6 blocks DCT for each of these blocks s calculated and the DC components of the DCT submatrces are protected usng the correspondng MACs E-ISSN: Issue 7, Volume, July 03

11 Obad Ur-Rehman, Natasa Zvc as explaned earler Each element n the DCT matrces requres octets If the orgnal mage s transmtted usng the standard MAC based protecton, then ether the whole mage wll be authentc or nonauthentc and so t wll ether be accepted or dscarded HMAC-SHA-56 s used as the MAC n the smulatons, thus n total bts of mage data plus 56 bts of MAC needs to be transmtted, whch s equal to 338 bts n total Usng IAC-WNTMAC, the number of data bts transmtted s calculated as follows Each WNTMAC tag s 56 bts long Thus, 56 bts for each of the DC components n the 6 rows as well as another 56 bts for the frst mnor dagonals for each row are used Thus 56 6 = 89 bts of WNTMAC tags are transmtted along the 6440 bts of the data Ths s equal to 53% of the whole data transmtted n the standard MAC tag based mage transmsson Each fgure shown n the followng sub-sectons s dvded nto fve consttuent sub-mages Frst, the source mage s shown followed by the receved mage In the next sub-mage, the suspcous block postons (dentfed through the proposed algorthms) are hghlghted n whte followed by these suspcous blocks hghlghted n the receved mage Fnally, the resultant mage s shown, whch s obtaned by applyng the proposed error correcton algorthm over the erroneous mage based on the localzed errors 6 Smulaton Results for IAC-WNTMAC Images protected usng IAC-WNTMACs have better error localzaton capabltes and so they can be reconstructed n a better manner as compared to the prevous algorthm The smulaton results are presented n Fg 7 6 Image Error Rate (IER) IER for both the algorthms s shown n Fg 8 at dfferent values of E b /N 0 The curves represent the IER n the presence of a standard MAC tag based protecton scheme and then n the presence of IAC- WNTMAC Fg 4 shows that IAC-WNTMAC acheves a codng gan of db at IER of 0-4 Its performance s due to dual error protecton and recovery usng weghted NTMAC 7 Concluson An algorthm for approxmate data authentcaton (SID) s presented frst Ths s extended further to TSID whch more effcently perform authentcaton by teratvely consderng only the data part n authentcaton and dong a threshold number of comparsons tll the match crtera s satsfed Both the algorthms fall nto the category of fuzzy authentcaton algorthms The applcaton of TSID together wth the NTMAC usng DCT s demonstrated n mage authentcaton Thus an algorthm for soft authentcaton, error localzaton and correcton of mages s presented Soft authentcaton s performed usng the standard MAC together wth the threshold value The man property of the algorthms s ts ablty of error localzaton and correcton wthout compromse of securty, whch s shown n the analyss Smulaton results showng the hgh error recovery as well as relatvely accurate error localzaton valdate the theoretcal analyss In future t would be nterestng to extend the proposed work by combnng t wth artfcal ntellgence based cooperatve learnng strateges, eg, the one proposed n [0] It s expected to get better content based mage retreval results usng such approaches Fg 7 IAC-WNTMAC at SNR 5 wth Turbo Codes of rate-/3 Fg 8 IER over AWGN channel wth BPSK modulaton usng Turbo codes of rate-/3 E-ISSN: Issue 7, Volume, July 03

12 Obad Ur-Rehman, Natasa Zvc References: [] N Zvc, Jont Channel Codng and Cryptography, Shaker Verlag, Aachen (008) [] C Ruland, N Zvc, Soft Input Decrypton, 4th Turbocode Conference, 6th Source and Channel Code Conference, VDE/IEEE, Munch, Apr 006 [3] D Chase, A Class of Algorthms for Decodng Block Codes wth Channel Measurement Informaton, IEEE Trans Inform Theory, IT- 8, pp 70-8, Jan 97 [4] G D Jr Forney, Generalzed Mnmum Dstance Decodng, IEEE Trans Inform Theory, IT-, pp 5-3, Apr 966 [5] R Gravemen, L Xe, and G R Arce, Approxmate mage message authentcaton codes, n Proc 4 th Annu Symp Advanced Telecommuncatons and Informaton Dstrbuton Research Program, College Park, MD, 000 [6] R Graveman and K Fu, Approxmate message authentcaton codes, n Proc 3 rd Annual Fed lab Symp Advanced Telecommuncatons / Informaton Dstrbuton, vol, College Park, MD, Feb 999 [7] C Boncelet, The NTMAC for authentcaton of nosy messages, IEEE Trans Info Forenscs and Securty, vol, no, pp 35-4, Mar 006 [8] D Onen, R Safav-Nan, P Nckolas and Y Desmedt, Uncondtonally secure approxmate message authentcaton, n Proc The Second Internatonal Workshop on Codng and Cryptology, Sprnger, 009 [9] R Ge, G R Arce and G D Crescenzo, Approxmate message authentcaton codes for N-ary alphabets, IEEE Transactons on Informaton Forenscs and Securty, vol, no, 006 [0] O Ur-Rehman, N Zvc, S Amr Hossen A E Tabatabae, C Ruland, Error Correctng and Weghted Nose Tolerant Message Authentcaton Codes, 5 th Int Conference on Sgnal Processng and Communcaton Systems (ICSPCS) / IEEE Conference, Hawa, USA, Dec 0 [] N Zvc, M Flanagan, On Jont Cryptographc Verfcaton and Channel Decodng va the Maxmum Lkelhood Crteron, IEEE Comm Letters, vol 6, no 5, pp 77-79, May 0 [] O Ur-Rehman, A Tabatabae, N Zvc, C Ruland, Soft Authentcaton and Correcton of Images, 9 th Internatonal ITG Conference on Systems, Communcatons and Codng (SCC 03), Jan 03, Munch, Germany [3] L Zhang, L X, B Zhou, Image Retreval Method Based on Entropy and Fractal Codng, WSEAS Transacton on Systems, ssue 4, vol 7, Apr 008 [4] C Avles-Cruz, A Ferreyra-Ramrez, J J Ocampo-Hdalgo, I Vazquez-Alvarez, Structured-Image Retreval nvarant to rotaton, scalng and translaton, WSEAS Transacton on Systems, ssue 8, vol 8, Aug 009 [5] N Doukas, Low Color-Depth Image Encrypton Scheme for use n COTS Smartphones, WSEAS Transacton on Systems, ssue 9, vol, Sep 0 [6] A Watson, Image compresson usng Dscret Cosne Transform, Mathematcal Journal, vol, no 4, pp 8-88, 994 [7] N Ahmed, T Natarajan, and K R Rao, Dscrete Cosne Transform, IEEE Trans Computers, vol C-3, pp 90-93, Jan 974 [8] P Yp, and K R Rao, Fast Decmaton-n- Tme Algorthms for a Famly of Dscrete Sne and Cosne Transforms, Crcuts, Systems and Sgnal Processng, Vol 3, pp , 984 [9] B Preneel, P C van Oorschot, MDx-MAC and buldng fast MACs, from hash functons, Proc CRYPTO 995, LNCS 963, Sprnger-Verlag, pp -4, 995 [0] F Ner, Cooperatve evolutve concept learnng: an emprcal study, WSEAS Transacton on Informaton Scence and Applcatons,WSEAS Press (Wsconsn, USA), ssue 5, vol, pp , May 005 E-ISSN: Issue 7, Volume, July 03

13 Obad Ur-Rehman, Natasa Zvc Appendx Table Upper and Lower Lmts of the Decson Threshold E b/n n = 60, m=60 n = 8, m=9 n = 64, m=56 0 P e d max_low d max_hgh d max_low d max_hgh d max_low d max_hgh [db] (k = 4, 6, 0, 5) (k = 4, 5, 0, 0) (k = 4, 6, 0, 5) (k = 4, 5, 0, 0) (k = 4, 6, 0, 5) (k = 4, 5, 0, 0) 0036, 5,, 9 56, 5, 40, 3 7,, 9, 5 4, 39, 8, 4 0, 6,, 7 6, 4, 7, , 3, 9, 5 56, 5, 40, 3 8,, 7, 4, 39, 8, 4 4, 7,, 6 6, 4, 7, ,, 6, 56, 5,40, 3 7, 0, 4, 9 4, 39, 8, 4 4, 7, 0, 4 6, 4, 7, , 8,, 6 56, 53, 40, 3 4, 7,, 5 43, 40, 8, 4 4, 5, 9, 7, 4, 7, , 7, 0, 4 57, 53, 40, 4 4, 6, 9, 3 43, 40, 9, 4 3, 5, 7, 0 7, 5, 7, , 5, 7, 0 58, 55, 4, 4 3, 5, 7, 0 44, 4, 9, 4, 4, 6, 8 8, 5, 8, , 3, 5, 8 6, 57, 4, 5, 3, 5, 7 46, 43, 30, 5, 3, 4, 6 9, 6, 8, , 3, 5, 7 6, 57, 43, 5, 3, 5, 7 47, 43, 3, 5,, 4, 6 9, 7, 8, , 3, 4, 6 63, 58, 43, 6,, 4, 6 48, 44, 3, 6,, 4, 5 0, 8, 9, - E-ISSN: Issue 7, Volume, July 03

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Bit-interleaved Rectangular Parity-Check Coded Modulation with Iterative Demodulation In a Two-Node Distributed Array

Bit-interleaved Rectangular Parity-Check Coded Modulation with Iterative Demodulation In a Two-Node Distributed Array Bt-nterleaved Rectangular Party-Check Coded Modulaton wth Iteratve Demodulaton In a Two-Node Dstrbuted Array Xn L, Tan F. Wong, and John M. Shea Wreless Informaton Networkng Group Department of Electrcal

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment Crcular Trells based Low Densty Party Check Codes A thess presented to the faculty of the Russ College of Engneerng and Technology of Oho Unversty In partal fulfllment of the requrements for the degree

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

Hierarchical Generalized Cantor Set Modulation

Hierarchical Generalized Cantor Set Modulation 8th Internatonal Symposum on Wreless Communcaton Systems, Aachen Herarchcal Generalzed Cantor Set Modulaton Smon Görtzen, Lars Schefler, Anke Schmenk Informaton Theory and Systematc Desgn of Communcaton

More information

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM Azura Abdullah, Muhammad Sobrun Jaml Jamal, Khazuran Abdullah, Ahmad Fadzl Ismal and An Lza Asnaw Department of

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Multicarrier Modulation

Multicarrier Modulation Multcarrer Modulaton Wha Sook Jeon Moble Computng & Communcatons Lab Contents Concept of multcarrer modulaton Data transmsson over multple carrers Multcarrer modulaton wth overlappng Chap. subchannels

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT UNIT TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT Structure. Introducton Obectves. Key Terms Used n Game Theory.3 The Maxmn-Mnmax Prncple.4 Summary.5 Solutons/Answers. INTRODUCTION In Game Theory, the word

More information

On the Feasibility of Receive Collaboration in Wireless Sensor Networks

On the Feasibility of Receive Collaboration in Wireless Sensor Networks On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

Graph Method for Solving Switched Capacitors Circuits

Graph Method for Solving Switched Capacitors Circuits Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance.

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance. ANALYTICAL COMPARISON OF THE PERFORMANCE OF ADAPTIVE MODULATION AND CODING IN WIRELESS NETWORK UNDER RAYLEIGH FADING 723 Sab Y.M. BANDIRI, Rafael M.S. BRAGA and Danlo H. SPADOTI Federal Unversty of Itajubá

More information

1 GSW Multipath Channel Models

1 GSW Multipath Channel Models In the general case, the moble rado channel s pretty unpleasant: there are a lot of echoes dstortng the receved sgnal, and the mpulse response keeps changng. Fortunately, there are some smplfyng assumptons

More information

DC-FREE TURBO CODING SCHEME FOR GPRS SYSTEM

DC-FREE TURBO CODING SCHEME FOR GPRS SYSTEM DC-FREE TURBO CODING SCHEME FOR GPRS SYSTEM Prof. Dr. M. Amr Mokhtar & Eng. A. Refaey-Ahmed Electrcal Engneerng Department, Alexandra Unversty, Egypt. ABSTRACT A useful tool n the desgn of relable dgtal

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance palette of problems Davd Rock and Mary K. Porter 1. If n represents an nteger, whch of the followng expressons yelds the greatest value? n,, n, n, n n. A 60-watt lghtbulb s used for 95 hours before t burns

More information

RC Filters TEP Related Topics Principle Equipment

RC Filters TEP Related Topics Principle Equipment RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

Weighted Penalty Model for Content Balancing in CATS

Weighted Penalty Model for Content Balancing in CATS Weghted Penalty Model for Content Balancng n CATS Chngwe Davd Shn Yuehme Chen Walter Denny Way Len Swanson Aprl 2009 Usng assessment and research to promote learnng WPM for CAT Content Balancng 2 Abstract

More information

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION Vncent A. Nguyen Peng-Jun Wan Ophr Freder Computer Scence Department Illnos Insttute of Technology Chcago, Illnos vnguyen@t.edu,

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. The Impact of Spectrum Sensng Frequency and Pacet- Loadng

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING Vaslos A. Srs Insttute of Computer Scence (ICS), FORTH and Department of Computer Scence, Unversty of Crete P.O. Box 385, GR 7 Heraklon, Crete,

More information

Improved Error Detection in the JPEG2000 Codec

Improved Error Detection in the JPEG2000 Codec Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence

More information

DISTRIBUTED video coding (DVC) [1] [4] is an attractive

DISTRIBUTED video coding (DVC) [1] [4] is an attractive 1040 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 6, JUNE 2013 Dstrbuted Wreless Vsual Communcaton Wth Power Dstorton Optmzaton Xaopeng Fan, Member, IEEE, Feng Wu, Fellow,

More information

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract

More information

DVB-T/H Digital Television Transmission and its Simulation over Ricean and Rayleigh Fading Channels

DVB-T/H Digital Television Transmission and its Simulation over Ricean and Rayleigh Fading Channels DVB-T/H Dgtal Televson Transmsson and ts Smulaton over Rcean and Raylegh Fadng Channels Ladslav Polák, Tomáš Kratochvl Department of Rado Electroncs, Brno Unversty of Technology, Purkyňova 118, 612 Brno,

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

Performance of Modified Iterative Decoding Algorithm for Multilevel Codes in Adaptive OFDM System

Performance of Modified Iterative Decoding Algorithm for Multilevel Codes in Adaptive OFDM System Internatonal Journal of Computer Informaton Systems and Industral Management Applcatons. ISSN 50-7988 Volume 6 (04) pp. - 0 MIR Labs, www.mrlabs.net/jcsm/ndex.html Performance of Modfed Iteratve Decodng

More information

arxiv: v1 [cs.it] 30 Sep 2008

arxiv: v1 [cs.it] 30 Sep 2008 A CODED BIT-LOADING LINEAR PRECODED DISCRETE MULTITONE SOLUTION FOR POWER LINE COMMUNICATION Fahad Syed Muhammmad*, Jean-Yves Baudas, Jean-Franços Hélard, and Mattheu Crussère Insttute of Electroncs and

More information

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel

More information

Beam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods

Beam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods Beam qualty measurements wth Shack-Hartmann wavefront sensor and M-sensor: comparson of two methods J.V.Sheldakova, A.V.Kudryashov, V.Y.Zavalova, T.Y.Cherezova* Moscow State Open Unversty, Adaptve Optcs

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

AIR FORCE INSTITUTE OF TECHNOLOGY

AIR FORCE INSTITUTE OF TECHNOLOGY MULTIPLE ACCESS INTERFERENCE CHARACTERIZATION FOR DIRECT-SEQUENCE SPREAD-SPECTRUM COMMUNICATIONS USING CHIP WAVEFORM SHAPING THESIS Matthew G. Glen, Captan, USAF AFIT/GE/ENG/04-10 DEPARTMENT OF THE AIR

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1 Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,

More information

Compressive Direction Finding Based on Amplitude Comparison

Compressive Direction Finding Based on Amplitude Comparison Compressve Drecton Fndng Based on Ampltude Comparson Rumng Yang, Ypeng Lu, Qun Wan and Wanln Yang Department of Electronc Engneerng Unversty of Electronc Scence and Technology of Chna Chengdu, Chna { shan99,

More information

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid Abstract Latency Inserton Method (LIM) for IR Drop Analyss n Power Grd Dmtr Klokotov, and José Schutt-Ané Wth the steadly growng number of transstors on a chp, and constantly tghtenng voltage budgets,

More information

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty

More information

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas Impact of Interference Model on Capacty n CDMA Cellular Networks Robert Akl, D.Sc. Asad Parvez Unversty of North Texas Outlne Introducton to CDMA networks Average nterference model Actual nterference model

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

Power System State Estimation Using Phasor Measurement Units

Power System State Estimation Using Phasor Measurement Units Unversty of Kentucky UKnowledge Theses and Dssertatons--Electrcal and Computer Engneerng Electrcal and Computer Engneerng 213 Power System State Estmaton Usng Phasor Measurement Unts Jaxong Chen Unversty

More information

Robust Image Transmission Performed by SPIHT and Turbo-Codes

Robust Image Transmission Performed by SPIHT and Turbo-Codes SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 5, No.2, November 2008, 353-360 Robust Image Transmsson Performed by SPIHT and Turbo-Codes Abdelmounam Moulay Lakhdar, Rachda Mélan 2, Malka Kandouc 2 Abstract:

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

Webinar Series TMIP VISION

Webinar Series TMIP VISION Webnar Seres TMIP VISION TMIP provdes techncal support and promotes knowledge and nformaton exchange n the transportaton plannng and modelng communty. DISCLAIMER The vews and opnons expressed durng ths

More information

A NEW TRANSMISSION STRATEGY FOR SCALABLE MULTIMEDIA DATA ON OFDM SYSTEMS

A NEW TRANSMISSION STRATEGY FOR SCALABLE MULTIMEDIA DATA ON OFDM SYSTEMS 15th European Sgnal Processng Conference (EUSIPCO 27), Poznan, Poland, September 3-7, 27, copyrght by EURASIP A NEW TRANSMISSION STRATEGY FOR SCALABLE MULTIMEDIA DATA ON OFDM SYSTEMS Heykel Houas, Cléo

More information

Phasor Representation of Sinusoidal Signals

Phasor Representation of Sinusoidal Signals Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e

More information

[Type text] [Type text] [Type text] Wenjing Yuan Luxun Art Academy of Yan an University Xi an, , (CHINA)

[Type text] [Type text] [Type text] Wenjing Yuan Luxun Art Academy of Yan an University Xi an, , (CHINA) [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 19 BoTechnology 2014 An Indan Journal FULL PAPER BTAIJ, 10(19, 2014 [10873-10877] Computer smulaton analyss on pano tmbre ABSTRACT Wenjng

More information

Pulse Extraction for Radar Emitter Location

Pulse Extraction for Radar Emitter Location 00 Conference on Informaton Scences and Systems, The Johns opkns Unversty, March 3, 00 Pulse Extracton for Radar Emtter Locaton Mark L. Fowler, Zhen Zhou, and Anupama Shvaprasad Department of Electrcal

More information