Detection of LSB Matching Steganography using the Envelope of Histogram
|
|
- Amie Franklin
- 5 years ago
- Views:
Transcription
1 646 JOURNAL OF COMPUTERS, VOL. 4, NO. 7, JULY 29 Detetion of LSB Mathing Steganography using the Envelope of Histogram Jun Zhang Shool of Information Siene Guangdong University of Business Studies,Guangzhou,P.R. China Yuping Hu and Zhibin Yuan Department of Software Enginerring Guangdong University of Business Studies,Guangzhou,P.R. China Abstrat As well-known, it is hard to detet LSB mathing steganography when over images are sans of photographs, whih usually have high-frequeny noise. This paper proposes a novel steganalysis method for this issue by making use of the following two fats: One is the loal maxima of an image histogram derease and the loal minima inrease after LSB mathing steganography. As a result, the area between upper envelope and lower envelope of the histogram of a stego image will be smaller than that of a over image. The other is LSB mathing embedding in the spatial domain of an image orresponds to low-pass filtering of the histogram. So, there are some differenes in the high order statistial moments of high frequenies of the histogram. Based on these fats, this paper onstruts a novel feature vetor to distinguish between stego and over images. Experimental results show the proposed sheme has better performane than some state-of-the-art steganalyzers in the literature. Index Terms Steganalysis, LSB mathing, Image I. INTRODUCTION Steganography has reeived onsiderable interest during the last few years, espeially after anedotal reports alleged that this tehnology was used by terrorist. Steganography seeks to provide a overt ommuniation hannel between two parties. It is ommonly framed as the prisoners problem [1-2]: Two prisoners, Alie and Bob, are permitted to ommuniate between one another, while under the surveillane of a Warden. The Warden, Eve, is free to examine all transmitted ontents between Alie and Bob and must deide whether suh transmissions inlude a overt message. If there is a overt message, then the ommuniation between the prisoners will be prevented. The ontent that doesn t ontain the overt message is referred to as the over ontent, whih might be an image, video, audio or text. Otherwise it is referred to as the stego ontent. The goal of Alie and Bob is to develop steganographi algorithms so that a overt message is undetetable by Eve. Nowadays, a wide variety of steganographi algorithms have been proposed. They an be ategorized in two groups: Spatial domain tehniques like least signifiant bit (LSB replaement, LSB mathing [3], Pixel Value Differening [4] and Stohasti Modulation [5]; Transform domain tehniques like Outguess [6], F5 [7], Pathwork [8]. In the other side, steganalysis attempts to defeat the goal of steganography. It aims to expose the presene of the hidden message, equivalently, to disriminate the stego ontent from the over ontent. Steganalysis are ommonly ategorized as either targeted or blind. Targeted steganalysis seeks to detet the use of a known steganographi algorithm. It an reveal the overt message or even estimate the embedding ratio with the knowledge of the steganographi algorithm [9-14]. Blind steganalysis seeks to detet a range of steganographi algorithms, possibly inluding previously unknown algorithms. Blind steganalysis first extrat some features from ontents, or more speifially, images, then selet or design a lassifier, and train the lassifier using the features extrated from training image sets, and lastly, lassify the features for an identifying given images [15-22]. Usually, it is likely that steganalysis methods that target a speifi embedding sheme an give more aurate and reliable results than blind steganalysis ones. However, blind approahes are more pratial beause of their flexibility and ability to be quikly adjusted to new or ompletely unknown steganographi methods. Perhaps surprisingly, detetion of LSB mathing steganography has proved onsiderably more diffiult than for LSB replaement. LSB replaement method simply replaes the LSB bitplane of a over image with the orresponding bits of a hidden message. This an be done for all pixels in the image or only for a pseudorandomly hosen portion, when the embedding rate is less than one, i.e. the length of the hidden message is less than the number of pixels in the image. Currently, a number of papers have reported very suessful steganalysis of LSB replaement [9-1]. This suess is redited to the fat that LSB replaement is inherently asymmetri, i.e. an even valued pixel will either retain its value or be inremented 29 ACADEMY PUBLISHER
2 JOURNAL OF COMPUTERS, VOL. 4, NO. 7, JULY by one. However, it will never be deremented. The onverse is true for odd-valued pixels. Rather than simple replae the LSB with the desired message bit, LSB mathing sheme randomly inrements or derements the orresponding pixel value when the desired message bit is different from the LSB. Due to remove the asymmetry of odd and even pixels, detetion of LSB mathing is known to be muh more diffiult than deteting LSB replaement. There are some detetors for LSB mathing steganography in the literature. Unfortunately, their performanes are often low when over images have highfrequeny noise, suh as high resolution sans of photographs. This paper addresses this issue. Setion II first reviews three state-of-the-art steganalyzers used to detet LSB mathing steganography, whih are algorithms of Harmsen et al. [23],Ker [24] and Goljan et al.[25]. They an be roughly onsidered as sharing a ommon arhiteture, namely (i feature extration in some domain and (ii Fisher Linear Disriminant (FLD analysis to obtain a 2-lass lassifier. Setion III examines the effet of LSB mathing steganography on the intensity histogram. We show that the loal maxima of the histogram of images will derease and the loal minima will inrease after LSB mathing embedding. This property an be used to define a feature to detet LSB mathing steganography. The feature is the area between upper envelope and lower envelope of the histogram. Moreover, sine LSB mathing embedding in the spatial domain of an image orresponds to low-pass filtering of the histogram, there must be some differenes in the high order statistial moments of high frequenies of the histogram. Aording to these fats, we onstrut a novel feature vetor to distinguish between stego and over images. Setion IV explains the details of the proposed steganalyzer. In setion V, we give experimental results and ompare the performane with the three state-of-theart steganalyzers. The paper is onluded in Setion VI. II. RELATED WORK Steganalysis an be modeled as a lassify problem as shown in Fig.1. Input a test image, extrat some features X form it, then a lassify funtion F is used to identify it. If F(X is more than a threshold T then the test image belongs to over lass otherwise it belongs to stego lass. The performane of steganalysis depends on two fators: one is whih features of images are seleted. The other is whih lassify funtions are used. The latter is well studied in the fields of pattern reognize and mahine learning, whih usually a test image extrated features: X No lassifier: F Y=F(X>T? Yes Figure 1. The ommon arhiteture of steganalyzer stego imag over image is Fisher Linear Disriminant(FLD, Support Vetor Mahine (SVM or Neural Network (NN. The former is the key issue in steganalysis. That means: a steganalyzer must find out some features of images that are sensitive to embedding modifiations so that it an distinguish between over and stego images. In this setion, we will briefly review the three state-of-the-art steganalyzers for LSB mathing steganography and fous on how to selet features in these methods. A. Center of Mass of the Histogram Charateristi Funtion One of the first steganalyzers was proposed by Harmsen and Pearlman [23]. They model LSB mathing steganography as independent additive noise. Due to the fat that noise adding in the spatial domain orresponds to low-pass filtering of the histogram, the histogram of stego images has less power in high frequenies than the histogram of over images. So, the enter of mass of the Histogram Charateristi Funtion H, whih is obtained by Fourier transform of the histogram h, will derease after LSB mathing embedding. Then, it was used as a feature for distinguishing between over and stego images. This sheme is alled a Histogram Charateristi Funtion steganalysis (HCF. The enter of mass of HCF is alulated as follows: C ( H 127 i= = 127 i H i= H ( i ( i This tehnique has quite good performane for deteting LSB mathing steganography in RGB olor images. However, it performs very poorly in graysale images indeed. B. Center of mass of the Adjaeny Histogram Charateristi Funtion Ker suggested that HCF sheme has bad performane in graysale images sine it is a lak of sparsity in the histogram [24]. He then proposed to use a twodimensional adjaeny histogram, expressing how often eah pixel intensity is observed horizontally next to eah other. Beause adjaent pixels tend to have lose intensities, this histogram is sparse off the diagonal. He showed that LSB mathing steganography also redues to low-pass filtering the adjaeny histogram and defined a enter of mass of the adjaeny histogram harateristi funtion as follows: ( H 127 ( i + H i= (1 i= C = (2 127 H 29 ACADEMY PUBLISHER
3 648 JOURNAL OF COMPUTERS, VOL. 4, NO. 7, JULY 29 In addition, to redue the variability of this feature aross images, Ker reommended omputing the same enter of mass using a downsampled version of the image. For disussing next, the former is referred to as AD-HCF and the latter is referred to as CAD-HCF. C. Wavelet Absolute Moment Holotyak and Fridrih [18] desribed a blind steganalysis approah based on lassifying higher-order statistial features derived from an estimation of the stego signal in the wavelet domain. Goljan [25] presented an improved version of Holotyak s method by using absolute moments of the noise residual. The proposed approah is flexible and enable reliable detetion of presene of seret messages embedded using a wide range of steganographi methods that inlude LSB mathing, LSB replaement, Stohasti Modulation, and others. This steganalyzer is referred to as WAM. The algorithm of WAM is desribed as follows: Step 1: Input a test image I Step 2: I is transformed by disrete wavelet transforms (DWT. The results inlude 4 subimages, whih are denoted as LL, LH, HL, HH Step 3: The three high frequeny subimages are denoised by wavelet filter, and the results are denoted as ' ' ' LH, HL, HH respetively. Step 4: Compute the residual subimages: Δ LH = LH LH ' ' ', ΔHL = HL HL, ΔHH = HH HH Step 5: Calulate high-order absolute moments of the residual subimages: Δ ( i LH mean Δ LH, ( i HL mean Δ HL Δ ( i, i=1 9. HH mean Δ HH Δ, Finally, they use all these 27 data as a feature vetor to distinguish between over and stego images. WAM steganalysis performs very well for over images that were previously ompressed using JPEG, but its auray is very low in over images sanned from photographs. ( p LSB is the least signifiant bit of p. The pixels of a over image are seleted (pseudo randomly using a shared stego key for embedding. Rather than simply replaing the LSB with the desired message bit (LSB replaement sheme, the orresponding pixel value is randomly inremented or deremented in LSB mathing steganography. However, if pixels are and 255, we fore them to be 1 and 244, respetively. So, without the asymmetry of LSB replaement, it is muh more diffiult to detet the LSB mathing steganography than LSB replaement. p ps = p p + 1 if b LSB( p if b = LSB( p 1 if b LSB( p & r > (3 & r < B. Effets of LSB Mathing steganography on Histogram The histogram of the over image is alulated by using following formula: h ( n = { p = n} (4 Where n is graysale level in the range 255. The histogram stands for the number of pixels with graysale level n. Assume that a maximal-length hidden message (1 bit per pixel of the over image is embedded and message bit b is also an i.i.d. random variable with uniform distribution on {,1}. We now disuss the effets on histogram of the over image by LSB mathing steganography. Let us begin with an example of LSB mathing steganography. Fig.2 shows a over image, whih is the photography of artwork with size Fig.3 shows the histogram of the over image and stego image in whih message bits are embedded by LSB mathing method. As we an see the histogram of the stego image is more smooth than that of the over image. III. ANALYSIS FOR LSB MATCHING STEGANOGRAPHY A. LSB mathing steganography We assume that images are graysale ones, whih means their pixels will be in the range 255. The pixels at loation of over image and stego image are denoted as p and p s, respetively. In LSB mathing steganography, one message bit is embedded at pixel by applying the following formula (3. p Where r is an i.i.d. random variable with uniform distribution on 1, + 1, b is the message bit, and { } Figure 2. The over image 29 ACADEMY PUBLISHER
4 JOURNAL OF COMPUTERS, VOL. 4, NO. 7, JULY Moreover, the loal maximums beome smaller and the loal minimums beome larger. This is true by following theoretial analysis indeed. h( Definition 1. In a histogram funtion, is a loal maximum point if the two inequalities h( n h( n 1 and h ( n h( n + 1 are true and one of inequalities is strit. h( Definition 2. In a histogram funtion, is a loal minimum point if the two inequalities h( n h( n 1 and h ( n h( n + 1 are true and one of inequalities is strit. Lemma 1. If n is a loal maximum point of histogram then hs ( n < h ( n. Here, the h ( and h s ( stand for histograms of the over and stego image, respetively Figure 3. The top one is the histogram of the over image shown in Fig.2 and the bootom is that of the stego image n n Proof. We assume r, message bit b and LSB( p in formula (3 are random variables with uniform distribution independently. Then, a pixel p s of the stego image is obtained by following probability: P ( p s = p + 1 = P( ( b LSB ( p ( r = 1 = P( b LSB ( p P( r = 1 = 1 / 2 1 / 2 = 1 / 4 Similarly, P ( p s = p 1 = 1/ 4 and P ( p s = p = 1/ 2. Denote the number of pixels that their graysale level are from n up to n + 1, and n down to n 1 after LSB embedding as Δ( n n + 1 and Δ( n n 1, respetively. Then, Δ ( n n + 1 = h( n P( ps = p + 1 = h( n / 4. Similarly, Δ ( n n 1 = h( n / 4. So, h s ( n = h ( n Δ( n n + 1 Δ( n n 1 + Δ( n 1 n + Δ( n + 1 n = h ( n h ( n /4 h ( n /4 + h ( n 1 /4 + h ( n + = h ( n ( h ( n h ( n 1 + ( h ( n h ( n + 1 /4 < h ( n Symmetrially, we an dedue the following lemma 2. 1 /4 Lemma 2. If n is a loal minimum point of histogram then hs ( n > h ( n. The lemmas show the fat that after LSB mathing the loal maxima of an image histogram derease and the loal minima inrease. So, we an expet the area between the upper envelope and lower envelope of the histogram of the over image will be larger than that of the histogram of the stego image. As a result, we use it as one of features to distinguish between over and stego images. The area an be alulated by the following proedure: Identify all the loal extrema, then onnet them by a ubi spline line to form the upper envelope u (. Repeat the proedure for the loal minima to produe the lower envelope l (, as shown in Fig.3. The area is defined as the absolute of the differene between the upper envelope and lower envelope.that is, 255 n= ( n l( n S = u (5 Fig.3 learly shows the area of the histogram of the over image is larger than that of the stego image. Their areas are and 41288, respetively. Furthermore, we demonstrate this fat mentioned above by a set of images, whih ontains 1 never ompression 29 ACADEMY PUBLISHER
5 65 JOURNAL OF COMPUTERS, VOL. 4, NO. 7, JULY 29 9 x Figure 4. The aeras of envelope of histogram of over and stego images. The symbols and o stand for S of over images and of Ss stego images, respetively. images like Fig.2. The results are shown in Fig.4, in whih the symbols and o stand for of over images and S s of stego images, respetively. As we an see, almost lager than S s are. So we an use the area of envelope of histogram as a disriminator to separate over images from stego images. Finally, we investigate another feature for steganlaysis. LSB mathing sheme an be modeled as independent additive noise, it leads to low pass filtering on the intensity histogram. As a result, the histogram of the stego image has less power in high frequenies than the histogram of the over image [23]. We gain the high frequenies of the histogram by disrete wavelet transform shown in Fig.5. The top one is the high frequeny oeffiients of the histogram of the over image and the bottom is that of the stego image. As we an see, there are some differenes in the high order statistial moments of high frequenies of the histograms. For example, the standard deviations of the top and bottom one are , 5.55, respetively. That means the standard deviation of histogram of the stego image is smaller than that of the over image. This is almost true for eah image aording to our experiments. So, we an use the standard deviation as another feature to distinguish between stego and over images. Combined with the feature mentioned above, we an expet to improve auray of detetion. S IV. STEGANALYSIS ALGORITHM S As disussed above, we present two features for steganalysis. Moreover, we introdue another feature based on the loal extremum of histogram in our previous work [26]. Making use of these three features, we propose the following steganalysis algorithm. Step 1. Given a test image, alulate the histogram of the image by formula (4. Step 2. Compute all loal maximums and minimums of Figure 5. The top one is the high frequeny oeffiients of histogram of the over image and the bootom is that of the stego image the histogram. Step 3. Work out the area between the upper envelope and lower envelope of the histogram by formula (5, denoted as. f 1 Step 4. Transform the histogram by DWT, and then alulate the high order statistial moments of the high frequenies. In our experiments we just selet the standard deviation, denoted as. f 2 Step 5. Calulate the sum of absolute differenes between eah loal extremum n and its neighbors in the histogram. That is, f 3 ( h( n h( n 1 + h( n h( n 1 = + n f f 2 3 Step 6. Combine 1, and to form the threedimensional feature vetor. Then, the Fisher linear f (6 29 ACADEMY PUBLISHER
6 JOURNAL OF COMPUTERS, VOL. 4, NO. 7, JULY disriminator (FLD is introdued to lassify over and stego images. The FLD is a simple lassifiation method whih finds an optimal linear projetion of the features. Advantages of the FLD method inlude reasonably fast training, very fast use, and no training parameters to selet. In the FLD, the feature spae is projeted on a onedimensional spae, where various deision rules an be applied for determining the lassifiation thresholds. Finally, we use reeiver operating harateristi urves (ROC to evaluate the performane of our method and ompare it with other methods. ROC an show how the false positives and true positives vary as the detetion threshold is adjusted [27]. V. EXPERIMENTAL RESULTS It is an established fat nowadays that detetion of LSB mathing steganography is signifiantly more diffiult for never ompressed images, graysale images, and sans of photographs, and notably easier for images that were previously proessed using JPEG or for olor images. So our tests will fous on the following dataset, whih inludes never ompressed saned images. The dataset is derived from the Corel Image Database, whih inludes 2 olor images sanned from photographs of artworks. The original images are 24-bit, pixels, never ompressed and they usually have high level of noise. In our experiments, we rop the original olor images into pixels and overt them to graysales. Here, ropping was preferred over resizing, in order to avoid introduing artifats due to resampling with interpolation. For this dataset, the following proedure was performed for the steganalyzer to alulate its ROC [28]: 1 Apply LSB embedding steganography with embedding rate p to all images in the dataset D to obtain the dateset of stego images D ; 2 Separate both dataset into a training set { D ( I, D ( I } and a test set { D ( I, D ( I }, where I ' is a subset of the image indexes and I is its omplement. The size of the training set was set to be equal to 5% of the dataset size; 3 For the steganalyzer under test, ompute the assoiated feature vetor for all images in the training set and perform FLD analysis to obtained the trained projetion vetor v ; 4 For the steganalyzer under test, ompute the assoiated feature vetor for all images in the test set, and projet the feature vetor onto v ; 5 Compare the resulting salar values to a threshold τ and reord the probabilities of false positives and true positives for different values of the threshold in order to obtain the Reeiver Operating Charateristi urve of the steganalyzer. Firstly, we evaluate the performane of our method under embedding rate p =.3, p =. 5, p =. 7 and Probability of detetion p=1 p=.7.1 p=.5 p= Probability of false positive Figure 6. ROCs for the proposed method with various embedding rate Probability of detetion HCF AD-HCF CAD-HCF WAM Our method Probability of false positive Figure 7. ROCs for the five steganalyzers under embedding rate.5. p = 1. The experimental results are shown in Fig.6. As we an see, when the embedding rate inreases the performane will improve. For example, at false positive rate 5% the detetion rates are 9%, 98%, 1% and 1% for the embedding rates.3,.5,.7 and 1. Then, fixing the embedding rate p =.5 we ompare our method with the Histogram Charateristi Funtion steganalysis (HCF [23], the adjaeny HCF-COM version (AD-HCF and the alibrated adjaeny HCF- COM version (CAD-HCF of Ker s method [24], and Goljan s method (WAM [25]. Fig.7 shows the ROCs for the five steganalyzers. We an see: (1 The performane of our method is the best one. For example, at false positive rate 3% the detetion rates of our method, HCF,AD-HCF, CAD-HCF and WAM are 96%,86%, 87%, 73%, 32%,respetively. (2 WAM method has the worst detetion rates for this sanned image set. This is due to the fat that the high level of noise of sanned images interferes with the additive stego signal. So it appears to be very diffiult for 29 ACADEMY PUBLISHER
7 652 JOURNAL OF COMPUTERS, VOL. 4, NO. 7, JULY 29 WAM method to distinguish between the stego signal and noise naturally present in images. (3 The performane of AD-HCF is almost the same as that of HCF in this dataset. (4 The alibrated detetor (CAD-HCF performs worse than the standard detetor ( AD-HCF. That means the alibration tehnique fails when a hidden message only 5% of the maximum is embedded. VI. CONCLUSION The detetion of LSB mathing steganography remains unresolved, espeially for the unompressed graysale images with high level of noise, suh as sans of photographs. In this paper, we present a novel steganalysis sheme for this issue. By analyzing the embedding algorithm of LSB mathing steganography, we prove the fat that the loal maximum of histogram of a over image derease and loal minimum inrease after message bits are embedded. Moreover, due to the fat that the histogram of the stego image has less power in high frequenies than that of the histogram of the over image, there are some differenes in the high order statistial moments of high frequenies. Based on these fats, we onstrut a new feature vetor and use the FLD to distinguish between the over and stego images. The experimental results show the proposed sheme is superior to the HCF and WAM methods in the dataset of sans of photographs. It is well-known that the performane of urrent state-ofthe-art steganalyzers for detetion of LSB mathing steganography is highly sensitive to the datasets from different soures. No detetors have yet proven universally reliable. Further work is needed to understand this variability and to haraterize it for partiular algorithms, and also to develop a hybrid method that ombines all advantages of the related methods. ACKNOWLEDGMENT This work was supported by National Natural Siene Foundation of China under Grant No , Guangdong Natural Siene Foundation (N: and Natural Siene Foundation of Department of Eduation of Guangdong Provine (N:5Z13 REFERENCES [1] G. J. Simmons, The prisoners problem and the subliminal hannel, in Advanes in Cryptology: Proeedings of CRYPTO 83. Plenum Pub Corp, pp , 1984 [2] I. J. Cox, Ton Kalker, Georg Pakura and Mahia Sheel, Information transmission and steganography, Leture Notes in Computer Siene, vol. 371, pp.15-29, 25 [3] Q. Liu, A. Sung, J. Xu, and B. Ribeiro, Image omplexity and feature extration for steganalysis of LSB, in ICPR6, pp. II:267 27, 26 [4] N. Wu and M. Hwang, Data hiding: urrent status and key issues, International Journal of Network Seurity, vol. 4, no. 1, pp. 1 9, 27 [5] J. Fidih and M. Goljan, Digital image steganography using stohasti modulation, SPIE Eletroni Imaging, pp , 23 [6] N. Provos, Defending against statistial steganalysis, Usenix Seurity Symp., pp , 21 [7] A. Westfeld, F5 - a steganographi algorithm,, Springer- Verlag Berlin Hd, pp , 21 [8] R. Anderson and F. Petiolas, On the limits of steganography, IEEE Journal of Seleted Areas in Comuniation, pp , 1998 [9] J. Fridrih, M. Goljan, R. Du, Reliable detetion of LSB steganography in olor and graysale images, in: Proeedings of ACM Workshop Multimedia Seurity, pp. 27 3, 21 [1] S. Dumitresu, X. Wu, Z. Wang, Detetion of LSB steganography via sample pair analysis, IEEE Trans. Signal Proess, 51 (7, pp , 23 [11] T. Zhang, X.J. Ping, A new approah to reliable detetion of LSB steganography in natural image, Signal Proess. 83 (1, pp ,23 [12] J. Fridrih, Feature-based steganalysis for JPEG images and its impliations for future design of steganographi shemes, in: Proeedings of sixth Information Hiding Workshop, Leture Notes in Computer Siene, vol. 32, pp , 24 [13] J. Fridrih, M. Goljan, D. Hogea, Steganalysis of JPEG images: breaking the F5 algorithm, in: Proeedings of fifth International Workshop on Information Hiding, Leture Notes in Computer Siene, vol. 2578, Springer, Berlin, pp , 22. [14] Andrew D. Ker, Quantitive evaluation of pairs and RS steganalysis., Pro.SPIE Seurity, Steganography,Watermarking Multimedia Contents, vol.536, E. J. Delp III and P. W. Wong, Eds., pp , 24 [15] I. Avibas, N. Memon, B. Sankur, Steganalysis of watermarking tehniques using image quality metris, in: Proeedings of the SPIE, Seurity and Watermarking of Multimedia Contents II, vol. 4314, pp , 2 [16] H. Farid, Deteting hidden messages using higher-order statistial models, in: Proeedings of IEEE International Conferene on Image proessing, vol. 2, pp , 22 [17] S. Lyu, H. Farid, Steganalysis using olor wavelet statistis and onelass support vetor mahines, in: Proeedings of the SPIE, Seurity, Steganography, and Watermarking of Multimedia Contents VI, vol. 536, pp , 24 [18] T. Holotyak, J. Fridrih, S. Voloshynovskiy:, Blind Statistial Steganalysis of Additive Steganography Using Wavelet Higher Order Statistis, The 9th IFIP TC-6 TC- 11 Conferene on Communiations and Multimedia Seurity. Leture Notes in Computer Siene, vol. 3677, pp ,25 [19] J. Fridrih, David Soukal, Miroslav Goljan, Maximum likelihood estimation of length of seret message embedded using steganography in spatial domain, Pro.SPIE,5681,pp ,25 [2] Y.Q. Shi, G.R. Xuan, C.Y. Yang et al., Effetive steganalysis based on statistial moments of wavelet harateristi funtion, in: Proeedings of IEEE International Conferene on Information Tehnology: Coding and Computing, pp , 25 [21] G.R. Xuan, Y.Q. Shi, J.J. Gao et al., Steganalysis based on multiple features formed by statistial moments of wavelet harateristi funtions, in: Proeedings of seventh International Information Hiding Workshop, 29 ACADEMY PUBLISHER
8 JOURNAL OF COMPUTERS, VOL. 4, NO. 7, JULY Leture Notes in Computer Siene, vol. 3727, Springer, Berlin, pp , 25 [22] Y. Wang, P. Moulin, Optimized feature extration for learning-based image steganalysis, IEEE Trans. Inf. Forensis Seur. 2 (1,pp ,27 [23] J. Harmsen, W. Pearlman, Higher-order statistial steganalysis of palette images, Pro. SPIE Seurity Watermarking Multimedia Contents, vol. 52, E. J. Delp III and P.W.Wong, Eds., pp , 23 [24] Andrew D. Ker, Steganalysis of LSB Mathing in Graysale Images, IEEE Signal Proessing Letters, Vol. 12, No. 6, pp , 25 [25] M. Goljan, J. Fridrih, and T. Holotyak, New blind steganalysis and its impliations, in Seurity, Steganography, and Watermarking of Multimedia Contents VIII, ser. Proeedings of SPIE, vol. 672, pp.1 13, 26 [26] Jun Zhang, I. J. Cox, G. Doerr, Steganalysis for LSB mathing in images with high-frequeny noise, Pro. IEEE Workshop on Multimedia Signal Proessing, pp , 27 [27] R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classifiation, 2nd ed. Wiley-Intersiene, 21 [28] G. Canelli, G. Doerr, M. Barni, and I. J. Cox, A omparative study of ±1 steganalyzers, Pro. IEEE International Workshop on Multimedia Signal Proessing, pp , 28 Jun Zhang was born in Sihuan, China in He reeived his Ph.D degree in omputer siene from Huazhong Universityof Siene & Tehnology, China in 23 and his M.S. degree in Mathematis from Lanzhou University in He had been a visiting postdotoral Researher in University College London, UK under Prof. Ingemar Cox s supervision. Now, he is the retor of Information Siene Shool, Guangdong University of Business Studies. His researh interest is information seurity suh as data hiding, watermarking and privay protetion. In this field, He has published more than 3 papers. Moreover he had been in harge of some projets sponsored by National Natural Siene Foundation of China and Guangdong Natural Siene Foundation. He served as many workshop hairs, advisory ommittee or program ommittee member of various international IEEE. Yuping Hu was born in He reeived his B.S. degree in elestial survey from Chinese Aademy of Siene, China, in 1996 and his Ph.D. degree in omputer siene from Huazhong University of Siene and Tehnology, Wuhan, China in 25. He is urrently pursuing the postdotoral researh in omputer appliations from Central South University, Changsha, China. Dr.Hu is a professor in the Shool of Information siene, Guangdong University of Business Studies, Guangzhou, China. His urrent researh interests inlude digital watermarking, image proessing, multimedia and network seurity. Zhibin Yuan was born in He reeived his Ph.D degree in omputer siene from Huazhong University of Siene & Tehnology, China in 27 and his M.S. degree in omputer siene from Huazhong University of Siene & Tehnology in 21. Dr.Yuan is a Leturer in the Shool of Information siene, Guangdong University of Business Studies, Guangzhou, China. His urrent researh interests inlude formal methods, model heking, and privay protetion. 29 ACADEMY PUBLISHER
Location Fingerprint Positioning Based on Interval-valued Data FCM Algorithm
Available online at www.sienediret.om Physis Proedia 5 (01 ) 1939 1946 01 International Conferene on Solid State Devies and Materials Siene Loation Fingerprint Positioning Based on Interval-valued Data
More informationCHAPTER 3 BER EVALUATION OF IEEE COMPLIANT WSN
CHAPTER 3 EVALUATIO OF IEEE 8.5.4 COMPLIAT WS 3. OVERVIEW Appliations of Wireless Sensor etworks (WSs) require long system lifetime, and effiient energy usage ([75], [76], [7]). Moreover, appliations an
More informationPrediction Method for Channel Quality Indicator in LEO mobile Satellite Communications
Predition Method for Channel Quality Indiator in LEO mobile Satellite Communiations Yadan Zheng *, Mingke Dong *, Wei Zheng *, Ye Jin *, Jianjun Wu * * Institution of Advaned Communiations, Peking University,
More informationPower Budgeted Packet Scheduling for Wireless Multimedia
Power Budgeted Paket Sheduling for Wireless Multimedia Praveen Bommannavar Management Siene and Engineering Stanford University Stanford, CA 94305 USA bommanna@stanford.edu Niholas Bambos Eletrial Engineering
More informationEffect of Pulse Shaping on Autocorrelation Function of Barker and Frank Phase Codes
Columbia International Publishing Journal of Advaned Eletrial and Computer Engineering Researh Artile Effet of Pulse Shaping on Autoorrelation Funtion of Barker and Frank Phase Codes Praveen Ranganath
More informationA Robust Image Restoration by Using Dark channel Removal Method
Volume 6, Issue 3, Marh 2017, ISSN: 2278 1323 A Robust Image Restoration by Using Dark hannel Removal Method Ankit Jain 1 (MTeh. sholar), Prof. Mahima Jain 2 Department Of Computer Siene And Engineering,
More informationObjectives. Presentation Outline. Digital Modulation Lecture 04
Digital Modulation Leture 04 Filters Digital Modulation Tehniques Rihard Harris Objetives To be able to disuss the purpose of filtering and determine the properties of well known filters. You will be able
More informationPerformance Study on Multimedia Fingerprinting Employing Traceability Codes
Performane Study on Multimedia Fingerprinting Employing Traeability Codes Shan He and Min Wu University of Maryland, College Park, U.S.A. Abstrat. Digital fingerprinting is a tool to protet multimedia
More informationA 24 GHz Band FM-CW Radar System for Detecting Closed Multiple Targets with Small Displacement
A 24 GHz Band FM-CW Radar System for Deteting Closed Multiple Targets with Small Displaement Kazuhiro Yamaguhi, Mitsumasa Saito, Takuya Akiyama, Tomohiro Kobayashi and Hideaki Matsue Tokyo University of
More informationEDGE AND LAPLACE BASED RESTORATION OF HAZY IMAGES
www.ijrar.om INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 EDGE AND LAPLACE BASED RESTORATION OF HAZY IMAGES 1 Priya Singh Patel, 2 Prof. Manisha Rathore Abstrat:
More informationACTIVE VIBRATION CONTROL OF AN INTERMEDIATE MASS: VIBRATION ISOLATION IN SHIPS
ACTIVE VIBRATION CONTROL OF AN INTERMEDIATE MASS: VIBRATION ISOLATION IN SHIPS Xun Li, Ben S. Cazzolato and Colin H. Hansen Shool of Mehanial Engineering, University of Adelaide Adelaide SA 5005, Australia.
More informationEFFICIENT IIR NOTCH FILTER DESIGN VIA MULTIRATE FILTERING TARGETED AT HARMONIC DISTURBANCE REJECTION
EFFICIENT IIR NOTCH FILTER DESIGN VIA MULTIRATE FILTERING TARGETED AT HARMONIC DISTURBANCE REJECTION Control Systems Tehnology group Tehnishe Universiteit Eindhoven Eindhoven, The Netherlands Dennis Bruijnen,
More informationPerformance of Random Contention PRMA: A Protocol for Fixed Wireless Access
Int. J. Communiations, Network and System Sienes, 2011, 4, 417-423 doi:10.4236/ijns.2011.47049 Published Online July 2011 (http://www.sirp.org/journal/ijns) Performane of Random Contention PRMA: A Protool
More informationConsiderations and Challenges in Real Time Locating Systems Design
Considerations and Challenges in Real Time Loating Systems Design Dr. Brian Gaffney DeaWave Ltd. Email: brian.gaffney@deawave.om Abstrat Real Time Loating Systems (RTLS) are a ombination of hardware and
More informationRADAR TARGET RECOGNITION BASED ON PARAMETERIZED HIGH RESOLUTION RANGE PROFILES
RADAR TARGET RECOGNITION BASED ON PARAMETERIZED HIGH RESOLUTION RANGE PROFILES XUEJUN LIAO and ZHENG BAO Key Lab. For Radar Signal Proessing Xidian University, Xi an 710071, P. R. China E-mail : xjliao@rsp.xidian.edu.n
More informationDESIGN AND PERFORMANCE ANALYSIS OF BAND PASS IIR FILTER FOR SONAR APPLICATION
International Journal of Emerging Tehnologies and Engineering (IJETE) ISSN: 238 8 ICRTIET-21 Conferene Proeeding, 3 th -31 st August 21 11 DESIGN AND PERFORMANCE ANALYSIS OF BAND PASS IIR FILTER FOR SONAR
More informationA Dual-Threshold ATI-SAR Approach for Detecting Slow Moving Targets
A Dual-Threshold ATI-SAR Approah for Deteting Slow Moving Targets Yuhong Zhang, Ph. D., Stiefvater Consultants Abdelhak Hajjari, Ph. D. Researh Assoiates for Defense Conversion In. Kyungjung Kim, Ph. D.,
More informationKey-Words: - Software defined radio, Walsh Hadamard codes, Lattice filter, Matched filter, Autoregressive model, Gauss-Markov process.
G Suhitra, M L Valarmathi A Novel method of Walsh-Hadamard Code Generation using Reonfigurable Lattie filter and its appliation in DS-CDMA system GSUCHITRA, MLVALARMATHI Department of ECE, Department of
More informationDispersion and Dispersion Slope Compensation of an Optical Delay Line Filter (DLF) based on Mach-Zehnder Interferometers
Dispersion and Dispersion Slope Compensation of an Optial Delay Line Filter (DLF) based on Mah-Zehnder Interferometers P.Pavithra 1, K.Karthika 2 1,2 Department of Eletronis and Communiation Engineering,
More informationDigitally Demodulating Binary Phase Shift Keyed Data Signals
Digitally Demodulating Binary Phase Shift Keyed Signals Cornelis J. Kikkert, Craig Blakburn Eletrial and Computer Engineering James Cook University Townsville, Qld, Australia, 4811. E-mail: Keith.Kikkert@ju.edu.au,
More informationA Study on The Performance of Multiple-beam Antenna Satellite Receiving System Dezhi Li, Bo Zeng, Qun Wu*
16 nd International Conferene on Mehanial, Eletroni and Information Tehnology Engineering (ICMITE 16) ISBN: 978-1-6595-34-3 A Study on The Performane of Multiple-beam Antenna Satellite Reeiving System
More informationIntroduction to Analog And Digital Communications
Introdution to Analog And Digital Communiations Seond Edition Simon Haykin, Mihael Moher Chapter 9 Noise in Analog Communiations 9.1 Noise in Communiation Systems 9. Signal-to-Noise Ratios 9.3 Band-Pass
More informationResearch on Blanket Jamming to Beidou Navigation Signals Based on BOC Modulation
Int. J. Communiations, Network and System Sienes, 6, 9, 35-44 Published Online May 6 in SiRes. http://www.sirp.org/ournal/ins http://dx.doi.org/.436/ins.6.95 Researh on Blanket Jamming to Beidou Navigation
More informationDesign Modification of Rogowski Coil for Current Measurement in Low Frequency
Design Modifiation of Rogowski Coil for Current Measurement in Low Frequeny M. Rezaee* and H. Heydari* Abstrat: The priniple objet of this paper is to offer a modified design of Rogowski oil based on its
More informationVision-based Quality Inspection for Components with Small Diameter and Deep Hole
Vision-based Quality Inspetion for Components with Small Diameter and Deep Hole Shool of Computer and Control Engineering University of Chinese Aademy of Sienes Beijing 100049, China Xinyi Gong, Hu Su,
More informationAn Adaptive Distance-Based Location Update Algorithm for PCS Networks
An Adaptive Distane-Based Loation Update Algorithm for PCS Networks Abstrat - In this paper, we propose a stohasti model to ompute the optimal update boundary for the distane-based loation update algorithm.
More information2011 IEEE. Reprinted, with permission, from David Dorrell, Design and comparison of 11 kv multilevel voltage source converters for local grid based
2 IEEE. Reprinted, with permission, from David Dorrell, Design and omparison of k multilevel voltage soure onverters for loal grid based renewable energy systems. IECON 2-37th Annual Conferene on IEEE
More informationVoltage Sag Classification with Consideration of Phase Shift
First IEEE International Conferene on Energy Internet Voltage Sag Classifiation with Consideration of Phase Shift Pengfei Wei, onghai Xu State Key Laoratory of Alternate Eletrial Power System with Renewale
More informationCharacterization of the dielectric properties of various fiberglass/epoxy composite layups
Charaterization of the dieletri properties of various fiberglass/epoxy omposite layups Marotte, Laurissa (University of Kansas); Arnold, Emily Center for Remote Sensing of Ie Sheets, University of Kansas
More informationEKT358 Communication Systems
EKT358 Communiation Systems Chapter 2 Amplitude Modulation Topis Covered in Chapter 2 2-1: AM Conepts 2-2: Modulation Index and Perentage of Modulation 2-3: Sidebands and the Frequeny Domain 2-4: Single-Sideband
More informationWavelet Denoising and Speech Enhancement
1 Wavelet Denoising and Speeh Enhanement V. Balakrishnan, Nash Borges, Luke Parhment Abstrat It has reently been shown that by taking advantage of the sparseness of natural signals in the wavelet domain,
More informationFully Joint Diversity Combining, Adaptive Modulation, and Power Control
Fully Joint Diversity Combining, Adaptive Modulation, and Power Control Zied Bouida, Khalid A. Qaraqe, and Mohamed-Slim Alouini Dept. of Eletrial and Computer Eng. Texas A&M University at Qatar Eduation
More informationIEEE TRANSACTIONS ON ELECTRON DEVICES, VOL. 51, NO. 2, FEBRUARY
IEEE TRANSACTIONS ON ELECTRON DEVICES, VOL. 51, NO. 2, FEBRUARY 2004 195 A Global Interonnet Optimization Sheme for Nanometer Sale VLSI With Impliations for Lateny, Bandwidth, and Power Dissipation Man
More informationFeature Reduction and Payload Location with WAM Steganalysis
Feature Reduction and Payload Location with WAM Steganalysis Andrew Ker & Ivans Lubenko Oxford University Computing Laboratory contact: adk @ comlab.ox.ac.uk SPIE/IS&T Electronic Imaging, San Jose, CA
More informationA Zero-Error Source Coding Solution to the Russian Cards Problem
A Zero-Error Soure Coding Solution to the Russian Cards Problem ESTEBAN LANDERRECHE Institute of Logi, Language and Computation January 24, 2017 Abstrat In the Russian Cards problem, Alie wants to ommuniate
More informationLayered Space-Time Codes for Wireless Communications Using Multiple Transmit Antennas
Layered Spae-Time Codes for Wireless Communiations Using Multiple Transmit Antennas Da-shan Shiu and Joseph M. Kahn University of California at Bereley Abstrat Multiple-antenna systems provide very high
More informationSINGLE UNDERWATER IMAGE RESTORATION BY BLUE-GREEN CHANNELS DEHAZING AND RED CHANNEL CORRECTION
SINGLE UNDERWATER IMAGE RESTORATION BY BLUE-GREEN CHANNELS DEHAZING AND RED CHANNEL CORRECTION Chongyi Li 1, Jihang Guo 1, Yanwei Pang 1, Shanji Chen, Jian Wang 1,3 1 Tianjin University, Shool of Eletroni
More informationAn Improved Doppler Frequency Offset Estimation Algorithm of OFDM System under High-speed Movement Environment
JOURAL OF COMPUTERS, VOL. 8, O. 2, DECEMBER 23 39 An Improved Doppler Frequeny Offset Estimation Algorithm of OFDM System under High-speed Movement Environment Yunlv Hong Department of Eletroni Engineering,
More informationAbstract. 1. Introduction. 2. Fading
An Interative Simulation for Flat Fading P.Marihamy*, J.Senthilkumar and V.Vijayarangan ECE Dept., National Engineering College Kovilpatti -68 503, India. * Nizwa College of Tehnology, Sultanate of Oman
More informationConsidering Capacitive Component in the Current of the CSCT Compensator
Proeedings of the World Congress on Engineering and Computer Siene 8 WCECS 8, Otober - 4, 8, San Franiso, SA Considering Capaitive Component in the Current of the CSCT Compensator Mohammad Tavakoli Bina,
More informationLimitations and Capabilities of the Slanted Spectrogram Analysis Tool for SAR-Based Detection of Multiple Vibrating Targets
Limitations and Capabilities of the Slanted Spetrogram Analysis Tool for SAR-Based Detetion of Multiple Vibrating Targets Adebello Jelili, Balu Santhanam, and Majeed Hayat Department of Eletrial and Computer
More informationFace Recognition Using Kernel PrincipalComponent Analysis
Advanes in Vision Computing: An International Journal (AVC Vol., No., Marh 4 Fae Reognition Using Kernel PrinipalComponent Analysis Jayanthi and Dr. Ai S Assistant Professor,Department of Computer Appliations,
More informationCo-Siting Criteria for Wind Turbine Generators and Transmitter Antennas
CONFTELE '99 ISBN 972-98115-0-4 Pro. CONFTELE 1999 - II Conf. de Teleomuniações, Sesimbra, Portugal, 466-470, Abr 1999 1 Co-Siting Criteria for Wind Turbine Generators and Transmitter Antennas Carlos Salema,
More informationModule 5 Carrier Modulation. Version 2 ECE IIT, Kharagpur
Module 5 Carrier Modulation Version ECE II, Kharagpur Lesson 5 Quaternary Phase Shift Keying (QPSK) Modulation Version ECE II, Kharagpur After reading this lesson, you will learn about Quaternary Phase
More informationDESIGN AND CHARACTERIZATION OF UNIFORM FIELD EDDY CURRENT PROBES*
DESIGN AND CHARACTERIZATION OF UNIFORM FIELD EDDY CURRENT PROBES* INTRODUCTION P. J. Shull, 1 T. E. Capobiano, 2 and J. C. Moulder1 1Frature and Deformation Division 2Eletromagneti Tehnology Division National
More informationResampling and the Detection of LSB Matching in Colour Bitmaps
Resampling and the Detection of LSB Matching in Colour Bitmaps Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory SPIE EI 05 17 January 2005
More informationApplication of TEM horn antenna in radiating NEMP simulator
Journal of Physis: Conferene Series Appliation of TEM horn antenna in radiating NEMP simulator To ite this artile: Yun Wang et al 013 J. Phys.: Conf. Ser. 418 010 View the artile online for updates and
More informationEE (082) Chapter IV: Angle Modulation Lecture 21 Dr. Wajih Abu-Al-Saud
EE 70- (08) Chapter IV: Angle Modulation Leture Dr. Wajih Abu-Al-Saud Effet of Non Linearity on AM and FM signals Sometimes, the modulated signal after transmission gets distorted due to non linearities
More informationTurbo-coded Multi-alphabet Binary CPM for Concatenated Continuous Phase Modulation
no symbol mapping is required, and also the inner ode an be ombined with the CPE in the trellis oded modulation sense [4]. Simulation shows that the use of non-binary outer enoder an give typially.3db
More informationOutdoor Image Enhancement:Increasing Visibility Under Extreme Haze and Lighting Condition
Outdoor Image Enhanement:Inreasing Visibility Under Extreme Haze and Lighting Condition Deepak Kumar Naik Dept. of Eletronis & Teleommuniation C. V. Raman Polytehni Bhubaneswar, India Deepak Kumar Rout
More informationChannel Modeling based on Interference Temperature in Underlay Cognitive Wireless Networks
Channel Modeling based on Interferene Temperature in Underlay Cognitive Wireless Networks *# Manuj Sharma, # Anirudha Sahoo # Dept. of Computer Siene & Engineering Indian Institute of Tehnology Bombay
More informationStudy of the Variance in the Histogram Test of ADCs
Study of the Variane in the Histogram Test of ADCs F. Corrêa Alegria and A. Cruz Serra Teleommuniations Institute and Department of Eletrial and Computer Engineering Instituto Superior Ténio, Tehnial University
More informationMicro-Piezoelectric Head Technology of Color Inkjet Printer
DPP2: International Conferene on Digital Prodution Printing and Industrial Appliations Miro-Piezoeletri Head Tehnology of Color Inkjet Printer Takao Mimura & Shinri Sakai SEIKO EPSON Corporation Shiojiri-shi,
More informationReliability measure for sound source localization
Reliability measure for sound soure loalization Hyejeong Jeon 1a), Seungil im 1, Lag-Yong im 1, Hee-Youn Lee 1, and Hyunsoo Yoon 2 1 Information Tehnology Laboratory, LG Eletronis Institute of Tehnology,
More informationAn Implementation of LSB Steganography Using DWT Technique
An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication
More informationSerial PN Acquisition Using Smart Antenna and Censored Mean Level CFAR Adaptive Thresholding for a DS/CDMA Mobile Communication
01 IEEE 14th International Conferene on High Performane Computing and Communiations Serial PN Aquisition Using Smart Antenna and Censored Mean Level CFAR Adaptive Thresholding for a DS/CDMA Mobile Communiation
More informationEffect of orientation and size of silicon single crystal to Electro-Ultrasonic Spectroscopy
Effet of orientation and size of silion single rystal to Eletro-Ultrasoni Spetrosopy Mingu KANG 1, Byeong-Eog JUN 1, Young H. KIM 1 1 Korea Siene Aademy of KAIST, Korea Phone: +8 51 606 19, Fax: +8 51
More information28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies
DEVELOPMENT OF SURFACE WAVE DISPERSION AND ATTENUATION MAPS AND IMPROVED METHODS FOR MEASURING SURFACE WAVES Jeffry L. Stevens, Jeffrey W. Given, G. Eli Baker and Heming Xu Siene Appliations International
More informationEE140 Introduction to Communication Systems Lecture 7
3/4/08 EE40 Introdution to Communiation Systems Leture 7 Instrutor: Prof. Xiliang Luo ShanghaiTeh University, Spring 08 Arhiteture of a (Digital) Communiation System Transmitter Soure A/D onverter Soure
More informationA Novel Small-Signal Knowledge-Based Neural Network Modeling Approach for Packaged Transistors
SR Journal o Eletrial and Eletronis Engineering (SR-JEEE) e-ssn: 78-676,p-SSN: -, Volume, ssue 5 Ver. (Sep. t. 8), PP 4-45 www.iosrjournals.org A Novel Small-Signal Knowledge-Based Neural Network Modeling
More informationStudy on the Effect of Object to Camera Distance on Polynomial Expansion Coefficients in Barrel Distortion Correction
Study on the Effet of Objet to Camera Distane on Polynomial Expansion Coeffiients in Barrel Distortion Corretion H. Tian, T. Srikanthan, K. Vijayan Asari, S. K. Lam Center for High Performane Embedded
More informationMetrol. Meas. Syst., Vol. XVIII (2011), No. 2, pp METROLOGY AND MEASUREMENT SYSTEMS. Index , ISSN
METROLOGY AND MEASUREMENT SYSTEMS Index 330930, ISSN 0860-8229 www.metrology.pg.gda.pl DAC TESTING USING MODULATED SIGNALS Pavel Fexa, Josef Vedral, Jakub Svatoš CTU Prague, Faulty of Eletrial Engineering
More informationTransmission Adaptation for Broadband Wireless MIMO-OFDM Systems with Limited Feedback
Transmission Adaptation for Broadband Wireless MIMO-OFDM Systems with Limited Feedba Harri Pennanen and Jouo Leinonen Centre for Wireless Communiations P.O. Box 4500, 90014 University of Oulu, Finland
More informationOptimization of Energy Detector Receivers for UWB Systems
) Optimization of Energy Detetor Reeivers for UWB Systems Mustafa E Şahin, İsmail Güvenç, and Hüseyin Arslan Eletrial Engineering Department, University of South Florida 4202 E Fowler Avenue, ENB-118,
More informationHierarchical Extreme-Voltage Stress Test of Analog CMOS ICs for Gate-Oxide Reliability Enhancement*
Hierarhial Extreme-Voltage Stress Test of Analog MOS Is for Gate-Oxide Reliability Enhanement* hin-long Wey Department of Eletrial Engineering National entral University hung-li, Taiwan lway@ee.nu.edu.tw
More informationDevelopment of FM-CW Radar System for Detecting Closed Multiple Targets and Its Application in Actual Scenes
XX by the authors; liensee RonPub, Lübek, Germany. This artile is an open aess artile distributed under the terms and onditions of the Creative Commons Attribution liense (http://reativeommons.org/lienses/by/3./).
More informationReprint from IASTED International Conference on Signal and Image Processing (SIP 99). Nassau, Bahamas, October, 1999.
Reprint from IASTED International Conferene on Signal and Image Proessing (SIP 99). Nassau, Bahamas, Otober, 1999. 1 Filter Networks Mats Andersson Johan Wiklund Hans Knutsson Computer Vision Laboratory,
More informationGenerating 4-Level and Multitone FSK Using a Quadrature Modulator
Generating 4-Level and Multitone FSK Using a Quadrature Modulator Page 1 of 9 Generating 4-Level and Multitone FSK Using a Quadrature Modulator by In a reent olumn (lik on the Arhives botton at the top
More informationAPPLICATION OF OFDM TECHNIQUE TO UNDERWATER ACOUSTIC DATA TRANSMISSION 1
PPLICTION OF OFDM TECHNIQUE TO UNDERWTER COUTIC DT TRNMIION 1 IWON KOCH K, HENRYK LOT Gdansk University of Tehnology 11/12, G. Narutowiza t., 80-233 Gda sk, Poland ia.kohanska@gmail.om; hlas@eti.pg.gda.pl
More informationA compact dual-band bandpass filter using triple-mode stub-loaded resonators and outer-folding open-loop resonators
Indian Journal of Engineering & Materials Sienes Vol. 24, February 2017, pp. 13-17 A ompat dual-band bandpass filter using triple-mode stub-loaded resonators and outer-folding open-loop resonators Ming-Qing
More informationPerformance of Two-Hop DS-CDMA Systems Using Amplify-and-Forward Protocol over Different Fading Channels
http://dx.doi.org/10.5755/j01.eee..1.14116 Performane of Two-Hop DS-CDMA Systems Using Amplify-and-Forward Protool over Different Fading Channels Nuri Kapuu 1 Mehmet Bilim 1 Ibrahim Develi 1 1 Department
More informationA New Broadband Microstrip-to-SIW Transition Using Parallel HMSIW
JOURNAL OF ELECTROMAGNETIC ENGINEERING AND SCIENCE, VOL. 12, NO. 2, 171~175, JUN. 2012 http://dx.doi.org/10.5515/jkiees.2012.12.2.171 ISSN 2234-8395 (Online) ISSN 2234-8409 (Print) A New Broadband Mirostrip-to-
More informationAFRL-RY-WP-TP
AFRL-RY-WP-P-009-307 A MODULAION BASED APPROACH O WIDEBAND- SAP (PREPRIN) Ke Yong Li, Unnirishna S. Pillai, Peter Zulh, and Mihael Callahan C & P ehnologies, In. OCOBER 007 Approved for publi release;
More informationSelection strategies for distributed beamforming optimization
EUROPEAN COOPERATION IN THE FIELD OF SCIENTIFIC AND TECHNICAL RESEARCH COST 2100 TD(10)11036 Ålborg, Denmark 2010/June/02-04 EURO-COST SOURCE: Institute of Communiation Networks and Computer Engineering
More informationNested Codes with Multiple Interpretations
Nested Codes with Multiple Interpretations Lei Xiao, Thomas E. Fuja, Jörg Kliewer, Daniel J. Costello, Jr. Department of Eletrial Engineering University of Notre Dame, Notre Dame, IN 46556, US Email: {lxiao,
More informationA Digitally Controlled Oscillator for ADPLL Application. Wu Xiulong, Wang Faniu, Lin Zhiting, and Chen Junning
pplied Mehanis and Materials Online: 22--29 ISSN: 662-7482, Vols. 229-23, pp 55-58 doi:.428/www.sientifi.net/mm.229-23.55 22 Trans Teh ubliations, Switzerland Digitally Controlled Osillator for DLL ppliation
More informationMultilevel PWM Waveform Decomposition and Phase-Shifted Carrier Technique
Multilevel PWM Waveform Deomposition and Phase-Shifted Carrier Tehnique R. Naderi* and A. Rahmati* Abstrat: Multilevel PWM waveforms an be deomposed into several multilevel PWM omponents. Phase-shifted
More informationThe Effect of Human Bodies on Path Loss Model in an Indoor LOS Environment
The Effet of Human odies on Path Loss Model in an Indoor LOS Environment Young-Hoon Kim and Seong-Cheol Kim Seoul Nation University INMC and SOEE Seoul, Korea e-mail: ebi0907@gmail.om, sim@maxwell.snu.a.r
More informationFigure 4.11: Double conversion FM receiver
74 4.8 FM Reeivers FM reeivers, like their AM ounterparts, are superheterodyne reeivers. Figure 4.11 shows a simplified blok diagram for a double onversion superheterodyne FM reeiver Figure 4.11: Double
More informationComparison of OFDM Radar and Chirp Sequence Radar
Comparison of OFDM Radar and Chirp Sequene Radar Johannes Fink, Friedrih K. Jondral Communiations Engineering Lab, Karlsruhe Institute of Tehnology Karlsruhe, GERMANY {Johannes.Fink, Friedrih.Jondral}@kit.edu
More information8A.6 SINGLE-SCAN RADAR REFRACTIVITY RETRIEVAL: THEORY AND SIMULATIONS
8A.6 SINGLE-SCAN RADAR REFRACTIVITY RETRIEVAL: THEORY AND SIMULATIONS B. L. Cheong 1, and R. D. Palmer 1,2 1 Atmospheri Radar Researh Center, The University of Oklahoma, Norman, U.S.A. 2 Shool of Meteorology,
More informationDetecting Moving Targets in SAR Via Keystoning and Phase Interferometry
5 The MITRE Corporation. All rights reserved. Approved for Publi Release; Distribution Unlimited. Deteting Moving Targets in SAR Via Keystoning and Phase Interferometry Dr. P. K. Sanyal, Dr. D. M. Zasada,
More informationDECENTRALIZED BEAMFORMING FOR MASSIVE MU-MIMO ON A GPU CLUSTER
DECENTRALIZED BEAMFORMING FOR MASSIVE MU-MIMO ON A GPU CLUSTER Kaipeng Li 1, Rishi Sharan 2, Yujun Chen 1, Joseph R. Cavallaro 1, Tom Goldstein 3, and Christoph Studer 2 1 Department of Eletrial and Computer
More informationDSP First Lab 05: FM Synthesis for Musical Instruments - Bells and Clarinets
DSP First Lab 05: FM Synthesis for Musial Instruments - Bells and Clarinets Pre-Lab and Warm-Up: You should read at least the Pre-Lab and Warm-up setions of this lab assignment and go over all exerises
More informationDemonstration of Measurement Derived Model-Based Adaptive Wide-Area Damping Controller on Hardware Testbed USA. China USA
2, rue d Artois, F-758 PARIS CIGRE US National Committee http : //www.igre.org 25 Grid of the Future Symposium Demonstration of Measurement Derived Model-Based Adaptive Wide-Area Damping Controller on
More informationAn Acquisition Method Using a Code-Orthogonalizing Filter in UWB-IR Multiple Access
6 IEEE Ninth International Symposium on Spread Spetrum Tehniques and Appliations An Aquisition Method Using a Code-Orthogonalizing Filter in UWB-IR Multiple Aess Shin ihi TACHIKAWA Nagaoka University of
More informationChapter 3 Amplitude Modulation. Wireless Information Transmission System Lab. Institute of Communications Engineering National Sun Yat-sen University
Chapter 3 Amplitude Modulation Wireless Information Transmission System Lab. Institute of Communiations Engineering National Sun Yat-sen University Outline 3.1 Introdution 3.2 Amplitude Modulation 3.3
More informationANALYSIS OF THE IONOSPHERIC INFLUENCE ON SIGNAL PROPAGATION AND TRACKING OF BINARY OFFSET CARRIER (BOC) SIGNALS FOR GALILEO AND GPS
ANALYSIS OF THE IONOSPHERIC INFLUENCE ON SIGNAL PROPAGATION AND TRACKING OF BINARY OFFSET CARRIER (BOC) SIGNALS FOR GALILEO AND GPS Thomas Pany (1), Bernd Eissfeller (2), Jón Winkel (3) (1) University
More informationTexas Instruments Analog Design Contest
Texas Instruments Analog Design Contest Oregon State University Group 23 DL Paul Filithkin, Kevin Kemper, Mohsen Nasroullahi 1. Written desription of the projet Imagine a situation where a roboti limb
More informationThe Implement of Hydraulic Control System for Large- Scale Railway Maintenance Equipment Based on PLC
Sensors & Transduers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.om The Implement of Hydrauli Control System for Large- Sale Railway Maintenane Equipment Based on PLC Junfu YU, * Hairui WANG
More informationInternational Journal of Advance Engineering and Research Development ANALYSIS AND DETECTION OF OIL SPILL IN OCEAN USING ASAR IMAGES
Sientifi Journal of Impat Fator (SJIF): 5.7 International Journal of Advane Engineering and Researh Development Volume 5, Issue 02, February -208 e-issn (O): 2348-4470 p-issn (P): 2348-6406 ANALYSIS AND
More informationTRANSISTORS: DYNAMIC CIRCUITS. Introduction
TRANSISTORS: DYNAMIC CIRCUITS Introdution The point of biasing a iruit orretly is that the iruit operate in a desirable fashion on signals that enter the iruit. These signals are perturbations about the
More informationImplementation of Direct Synthesis and Dahlin Control Algorithms on Data Driven Models of Heater System
Implementation of Diret Synthesis and Dahlin Control Algorithms on Data Driven Models of Heater System Mr. R. G. Datar Sanjay Ghodawat Group of Institutes, Atigre Mr. A. N. Shinde Sanjay Ghodawat Group
More informationAcoustic Transmissions for Wireless Communications and Power Supply in Biomedical Devices
roeedings of th International ongress on Aoustis, IA 1 3-7 August 1, Sydney, Australia Aousti Transmissions for Wireless ommuniations and ower Supply in Biomedial Devies Graham Wild and Steven Hinkley
More informationLink-Level Analysis of Downlink Handover Regions in UMTS
Link-Level Analysis of Downlink Handover Regions in UMTS Atta Ul Quddus, Xinjie Yang and Rahim Tafazolli, Member, IEEE Abstrat This paper investigates the downlink handover (soft/softer/hard) performane
More informationNotes on Dielectric Characterization in Waveguide
Notes on Dieletri Charaterization in Waveguide R.Nesti, V. Natale IRA-INAF Aretri Astrophysial Observatory 1. Theory Let's suppose we have to haraterize the eletromagneti properties of a dieletri material,
More informationJournal of Communications Vol. 12, No. 7, July 2017
Journal of ommuniations Vol., o. 7, July 7 Performane Analysis of FSO ommuniation Systems with Higher-Order Spatial Diversity Shemes Using BPSK- S over Log-ormal Atmospheri urbulene hannels Okikiade A.
More informationInterference mitigation by distributed beam forming optimization
English Interferene mitigation by distributed beam forming optimization Matthias Kashub, Christian M. Blankenhorn, Christian M. Mueller and Thomas Werthmann Abstrat Inter-ell interferene is a major issue
More informationA HF Frequency Prediction Method of Engineering Calculation in the Asia Pacific Region Chao LI, Yun-jiang LIU, Xiao-peng YANG and Feng WANG
8 nternational Conerene on Computer, Eletroni normation and Communiations (CEC 8 SBN: 978--9-7- A HF Frequeny Predition Method o Engineering Calulation in the Asia Paii Region Chao L, Yun-jiang LU, Xiao-peng
More informationAuthor(s)Unoki, Masashi; Miyauchi, Ryota; Tan
JAIST Reposi https://dspae.j Title Hearing From Sensory Proessing to Estimates of tuning of auditory filt simultaneous and forward nothed-noi Author(s)Unoki, Masashi; Miyauhi, Ryota; Tan Citation Issue
More information