An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold
|
|
- Clara Norris
- 5 years ago
- Views:
Transcription
1 Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty of Techncal Educaton Ho Ch Mnh Cty, HCM Cty, Vetnam Emal: thethen8@gmal.com Thuong Le Ten Ho Ch Mnh Cty Unversty of Technology, HCM Cty, Vetnam Emal: thuongle@hcmut.edu.vn qualty. But ths method s dsadvantage s that t cannot effectvely resst low-pass flterng attacks such as medan flterng and Gaussan flterng. The authors n [3] proposed the method based on sgnfcant dfference quantzaton technque; that s, every seven-wavelet coeffcents n 3-level DWT sub-band was grouped as a block and the watermark bt s embedded by quantzng the dfference between two largest coeffcents. Based on nsgnfcant coeffcents of a wavelet tree, the authors proposed the method that mproved the qualty of the watermarked mage, but the qualty of recovery watermark was decreased. An ntellgent watermarkng method based on partcle swarm optmzaton (PSO) n [5] s the mproved method n [3]. Ths method has been resolved the conflct between mperceptblty and robustness of watermarkng by selectng randomly coeffcents to make up a block to avod the watermark beng detected and the strength of embeddng watermark among dfferent blocks s adaptve by PSO method to balance the robustness and perceptual transparency. By scalng the magntude of the sgnfcant dfference between the two largest wavelet coeffcents n a wavelet tree, the authors [6] mproved the robustness of the watermarkng. However, extracted watermark cannot ensure the qualty under JPEG compresson. Embeddng the nformaton nto the sgnfcant wavelet coeffcent n those dynamc blocks wth strong edges accordng to a "Bnary Algorthm" was proposed n research [7]. Snce the change to the blocks wth strong edge strengths s less vsble to human eyes. The threshold n extracton process was lmted by the demanded sze of the watermark. The authors n [8] used wavelet packet decomposton technque for both the orgnal mage and the watermark by embeddng watermark nto low-frequency sub-band and comparng the correlaton between recovery and orgnal watermark to decde the exstence of watermark. The authors n [9] suggested a method that usng statstcal characterstcs of coeffcents to quantze. Ths method used two quantzaton algorthm for two phases of watermarkng system. Usng the same method, the Abstract In ths research, we ntroduce an effcent blnd watermarkng method for gray mage based on wavelet tree quantzaton usng adaptve threshold n extracton process. Based on dfference value between two largest coeffcents, each scrambled bnary watermark bt s embedded nto each block whch created by four LH3 coeffcents and one LH4 coeffcent. In extracton process, we compare dfference value n each block to adaptve threshold to recover watermark bt. The qualty of extracted watermark depends on the threshold whch s determned by the Weghted Wthn-Class Varance algorthm. Performance of proposed method s represented through expermental results under varous attacks such as, Hstogram Equalzaton, Croppng, Low-pass Flterng, Gaussan nose, Salt & Pepper nose and JPEG compresson. Index Terms blnd watermarkng, 3-level DWT, sgnfcant dfference, adaptve threshold, wthn-class varance I. INTRODUCTION Due to the advantage of the Internet, people can arbtrarly and access or dstrbute dgtal products. Hence, the dgtal watermarkng technque has been used n multmeda products to protect copyrght and authentcate mage... Ths technque embeds nformaton nto the dgtal contents so that the vewer cannot see any nformaton. However, there are many problems n the watermarkng system: the watermark has to ensure not degradng the qualty of the cover mage and beng perceptually nvsble for human eyes; the watermark must be robust to resst dfferent attacks and the watermarkng system s blndness. Several wavelet tree-based watermarkng methods are proposed based on the qualfed sgnfcant wavelet tree (QSWT) [,, 4, 5, and 6]. In [], the authors embedded watermark n each of two sub-bands of wavelet tree. The authors n [] mproved the method n [] by usng four trees to represent two watermark bts to enhance vsual Manuscrpt receved February, 3; revsed May, 3. do:.7/jeee
2 Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 authors n [] embedded watermark by modfyng the center coeffcent n each block and the value of ths coeffcent depend on the watermark bt and the mean of four cross neghbor coeffcents. Another way to group was represented n []: LH3 and HL3 sub-band are dvded nto equal four sectons. Each block was grouped by one coeffcent n each secton. Before that, the basc method s proposed n [] embeddng each watermark bt by comparng the dfference of two largest sgnfcant coeffcents n each wavelet tree to the average value. The maxmum coeffcent was modfed based on value of watermark bt. In [3], the authors embedded each pxel of watermark nto the wavelet coeffcent of mddle and low frequency of a block n the cover mage. However, the proposed method s non-blnd watermarkng system; that s, usng orgnal mage for extracton process. Addtons, the authors n [4] used a re-watermarkng approach employng blnd, quantzaton-based and robust technque to embed multple fngerprntng. They nvestgated two extensons to a wavelet coeffcent-tree based embeddng technque that turn out to mprove detecton performance. In ths research, an effcent blnd watermarkng method for mage based on the sgnfcant dfference of wavelet coeffcents s developed from [3]. Due to the mportance of determnng threshold value n extracton process, ths value could be determned based on the probablty densty functon (pdf) of blocks along dfference values nstead of proposed algorthm n [3]. By computng the weghed wthn-class varance [5], we separate pdf plot nto two parts and the dfference value chosen as threshold has mnmum varance. Smulaton results under dfferent attack cases demonstrate method's performance through PSNR of embedded mage and NC of extracted watermark. We have sze of HL3 after decomposng s when usng mage. There are watermark bts are embedded nto blocks, whch are grouped based on wavelet tree as Fg. ; that s, one coeffcent of HL4 and four coeffcents of the same orentaton n the same locaton n HL3 are grouped as a block. Each wavelet tree conssts of coeffcents for a wavelet tree constructed at each node from HL4 to HL3. Each 4-level sub-band, we have 4 coeffcents whch s the maxmum number of watermark can be embedded. However, due to watermark wth sze, we only need 5 blocks n embedded and extracton algorthm. For embeddng process, we modfy the maxmum coeffcent by the fxed quantty, called quantzaton value, based on the sgnfcant dfference of two largest coeffcents n each block and value of watermark bt. Ths value s the mean of all sgnfcant dfference values of all mage used. For one mage, we can fnd ths value as follows: N (max sec ) N () where N: number of blocks, max and sec are two th largest coeffcents n have: block. For many mages, we T m j....() m j where m: number of mages. The mages are consdered n smulaton nclude Lena, Baboon, Pepper, Goldhll and Salboat. The value of each mage and average of them s represented n TABLE I. The quantzaton value used n ths paper s the mean of all above mages. II. THE PROPOSED METHOD TABLE I. QUANTIZATION VALUE OF EACH IMAGE A. The ng Method ng model s represented n Fg.. The watermark after scramblng wth securty key wll be hd nto the host mage. We decompose ths mage at 4-level DWT to four sub-bands. Based on the wavelet tree technque, three are three super wavelet trees: HH3-HH3HH-HH s easly elmnated when usng the JPEG lossy compresson. HL4-HL3-HL-HL s sutable to embed the watermark n ths paper to satsfy extractng watermark under dfferent attacks nstead of LH sub-band famly. To lmt computng capacty, we only choose HL4 and HL3 for embeddng process. Lena ℰ 5 Baboon Pepper Goldhll Salboat T=Average 58 4 B. The Embeddng Process Comparng sgnfcant dfference to threshold to extract watermark bt Coeffcent of the HL LH3 LH HL3 HH3 LH HL HH Extracted HL HH Extracted Fgure. Embeddng watermark based on wavelet tree quantzaton + Embeddng Algorthm Host + Key Channel + Extracton Algorthm The watermark mage used to embed nto the host gray mage has sze 5 bts wth value or. After scramblng watermark wth securty number, each bt wll be embedded nto each block, respectvely. Each block have fve coeffcents (4 HL3 coeffcents + HL4 coeffcent) s created after decomposng Scambleb bt Attacks Fgure. ng model. 99
3 Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 gray mage. In each block, we seek two values: the largest coeffcent and sec - the second largest coeffcent sgnfcant and (max sec ). For th dfference value. Wthout attacks, we can determne the threshold value to extract watermark exactly. However, the change of pdf s very lght under some attacks, such as, hstogram equalzaton, Gaussan flter; otherwse, some attacks affect pdf extreme serously, such as average flter. In these cases, we cannot extract correctly encoded watermark; t can be explaned that the watermark bt are embedded, sgnfcant dfferences wll be ; however under varous attacks, they are larger than value. max - dfference bt of watermark, we perform the embeddng algorthm as the followng steps for block: Wth watermark bt : max where max ;f ( T ) max ;f ( T ) (3) T Sgnfcant dfference () Modfed sgnfcant () Weghted wthnof each block dfference value class varance Compute average Seek the value mnmum value Wth watermark bt : max max / sec sec / Fgure 5. The flowchart for determnng threshold The qualty of embedded mage depend on value T n the case we use same watermark. The detaled of embeddng process can be showed n Fg blocks 3-level DWT HL3 subband Embeddng Algorthm In ths paper, we proposed an algorthm to determne adaptve threshold based on computng the weghed wthn-class varance. In more detal, we fnd the threshold that gets mnmzed the weghted wthn-class varance, or ths turn out to be the same as maxmzng the between-class varance. However, we need to modfy sgnfcant dfference of the blocks whch have. Ths preprocess does not affect the qualty of recovery watermark because these blocks wll extract exactly snce threshold value s always less than. The proposed algorthm for determnng threshold s showed n Fg. 5. The process () n Fg. 5 can be performed as follows: HL4 subband pseudo-random sequence È 4-level DWT Host Bnary watermark Scramble HL3 subband IDWT 4 blocks Restructure Fgure 3. The flowchart of embeddng process. C. The Extracton Process bt embedded nto each block can be recovered based on comparng sgnfcant dfference to threshold - denoted as. After embeddng, dfference n each block of cover mage wll be or larger than as (3) and (4). In wth non-attack case, watermark s extracted exactly when the threshold n the range ( y ). However, ths value can be changed n dfferent attack cases; that s, extracted bt s nstead of. When fnd out the threshold, we can extracted as below equaton: bt ;f ( d ) ;f ( d ) d ;f ( d ) ;f ( d ) d w (d ) W (d ) (d ) W (d ) (d ).(7) where class probabltes estmated: and d W (d ) p() (5) W (d ) max ( d ) p() =d+ Attack Type: Rotaton And the class means are gven by:.4 d.8 ( d ) PDF p( ) W (d ).. 3 Sgnfcant Dfference are (8) Non-attack. (6) The detaled process () n Fg. 5 can be calculated as:.5. PDF Determne adaptve threshold y Average value ℰ (4) 4 Fgure 4. Probablty densty functon 3 Sgnfcant Dfference x ( n) (d ) 4 of sgnfcant dfference max ( d ) d p() W (d ) of cover mage Fnally, the ndvdual class varances are: We can consder the probablty densty functon x(n) of sgnfcant dfference n Fg. 4. The functon (d ) ( (d )) x(n) represents the number of block havng the same d p() W (d ) (9) ()
4 Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 max( d ) ( d) ( ( d)) d p () W( d) These calculaton steps were done through the range of d max d and pck out the value that value [, ( )] mnmzed ( d) W sgnfcant dfference value whch has. The adaptve threshold s the ( mn). If W there are many values, the threshold wll be the mean of them: mean d d mn () ( / W ( ) ) After determnng adaptve threshold, we use (5) to extract watermark. III. EXPERIMENTAL RESULT We use the peak sgnal-to-nose rato PSNR to evaluate the qualty between embedded mage and orgnal mage. Ths formula s defned as follows: PSNR 55 log ( ) MSE () where MSE s computed as below equaton: M N MSE I j I j M N j (, ) (, ) (3) where M and N are heght and wdth of the mage, are the grey value respectvely. I(, j ) and I (, j) located at coordnate (, j ) of the orgnal mage and embedded mage. After extractng, estmaton for qualty of extracted watermark s compared to the orgnal watermark s express accordng the normalzed correlaton NC value: m n NC w(, j) w(, j) m n (4) j where s the watermark of sze. w(, j ) and w (, j) are the values located at coordnate (, j ) of orgnal watermark and extracted watermark. Value of w(, j ) s set f t s a watermark bt, otherwse, t s set - and smlar to w (, j). So the value of w(, j) w(, j) s ether or -. If number of bt extracted correctly s larger than 5%, the NC value s postve; otherwse, t s negatve. A. Wth Non-Attack In below the smulaton, the gray-mages used as cover and watermark s the mages have sze (5 5) bnary mage wth sze (6 3). Addtons, we apply the Haar wavelets to decompose and reconstruct to cover mage. Smulaton result of embeddng process showed n TABLE.II, all cover mages n ths smulaton get good nvsblty (PSNR larger than 4dB). In the non-attack case, the watermark mage s extracted from the cover mage accordng usng proposed determnng threshold algorthm. Table. II shows the qualty of recovered watermark wth NC= for all mages. TABLE II. RESULT OF EMBEDDED IMAGE AND RECOVERY WATERMARK Lena Baboon Pepper Goldhll Salboat Orgnal PSNR MSE..... B. Wth Geometrc Attacks Under varous attacks, we only use mage Lena for smulaton. There are some geometrc attack types are consdered n ths smulaton, such as, croppng, scalng, rotaton and Gaussan nose. For the croppng attack, pxel of mage s dropped at the center of embedded mage and they are replaced by gray value pxels. In the scalng case, the host mage s scaled to and then scale one more tme to orgnal sze. For two last attack types, the cover mage s rotated by small degree and added Gaussan nose wth many dfferent varances. The result of watermarkng under geometrc attacks s showed n Table. III. Wth the larger value T, the robustness of watermark wll be ncreased but the nvsblty of host mage wll be reduced. There s a tradeoff between the robustness of watermark and the transparency of host mage. TABLE III. Attack Type Croppng PSNR.67 NC NC OF EXTRACTED WATERMARK UNDER GEOMETRIC ATTACKS.64 Scalng C. Wth Non-Geometrc Attacks TABLE IV. Attack Type Hstogram Equalzaton PSNR 9. NC.88 Rotaton.5 Gaussan Nose NC OF EXTRACTED WATERMARK UNDER NON- GEOMETRIC ATTACKS Gaussan Flter Medan Flter (3 3) Average Flter (3 3) Sharpenng There are some non-geometrc attacks: Hstogram Equalzaton, Gaussan flter, Medan flter, Average flter, sharpenng. Based on the experment result represented n Table. IV, the proposed method has a good resstance to many non-geometrc attacks.
5 Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 D. Wth JPEG Compresson TABLE.V showed the smulaton result n JPEG lossy compresson wth qualty factor from to 6. When we compress the mage wth qualty factor %, although the sze on dsk of mage s very small, NC value of watermark s always greater than.57 and NC= for 6%. E. Comparng to The Other Methods TABLE V. Qualty Factor % PSNR NC NC OF EXTRACTED WATERMARK UNDER JPEG COMPRESSION % 3% 4% 5% 6% We compare our proposed method wth some recently publshed papers: Ln et al [3], Wang et al [5], Run et al [6]. In our method, the expermental result s far better than the lsted method, especally for JPEG lossy compresson, scalng, rotaton, low-pass flter, hstogram equalzaton. Only croppng and sharpenng, the proposed method s not good. Comparson s represented n TABLE.VI. TABLE VI. Attack Type Croppng ¼ Scalng Rotaton.5 Rotaton.3 Gaussan flter Hstogram Equalzaton Sharpenng Medan flter (3 3) Medan flter (5 5) Average flter (3 3) Average flter (5 5) JPEG (QF=) JPEG (QF=) JPEG (QF=3) JPEG (QF=4) JPEG (QF=5) COMPARING PROPOSED METHOD TO THE OTHER METHODS Ln et al [3] (PSNR=44.5dB) IV. Wang et al [5] (PSNR=45.9dB) CONCLUSION Run et al [6] (PSNR=4.98dB) Proposed (PSNR=43.dB) In ths research, we propose an effcent blnd watermarkng for dgtal mage when usng the adaptve threshold algorthm n extracton process. Ths threshold s gven based on computng weghted -wthn class varance through consderng probablty densty functon of sgnfcant dfference. The proposed method s consdered n smulaton under dfferent attack types. The proposed method n ths paper has good mperceptblty through PSNR peek sgnal-to-nose rato parameter (PSNR>4dB) and effectvely resst many attacks, such as, Gaussan flter, Medan flter, Average flter (NC - Normalzed Correlaton of extracted watermark larger than.95) and JPEG compresson (NC=.87 for QF=3%). However, ths method s weakly at some geometrc attacks: croppng, Gaussan nose. REFERENCES [] M. Hsel, D. Tseng, and Y. Huang, Hdng dgtal watermarks usng multresoluton wavelet transform, IEEE Trans. Ind. Electron, vol. 48, pp , Oct.. [] B. K. Len and W. Ln, A watermarkng method based on maxmum dstance wavelet tree quantzaton, n Proc. 9th Conf. Computer Vson, Graphcs and Processng, pp , 6. [3] W. H. Ln, S. J. Horng, T. W. Kao, P. Fan, C. L. Lee, and Y. Pan, An effcent watermarkng method based on sgnfcant dfference of wavelet coeffcent quantzaton, IEEE Transactons on multmeda, pp , Aug. 8. [4] W. H. Ln, Y. Rau, and S. J. Horng, A wavelet-tree-based watermarkng method usng dstance vector of bnary cluster, Expert Systems wth Applcatons, pp , 9. [5] Y. R. Wang, W. H. Ln, and L. Yang, An ntellgent watermarkng method based on partcle swarm optmzaton, Expert Systems wth Applcatons 38, pp ,. [6] R. S. Run, S. J. Horng, W. H. Ln, T. W. Kao, P. Fan, and M. K. Khan, An effcent wavelet-tree-based watermarkng method, Expert Systems wth Applcatons, pp ,. [7] M. Keyvanpour and F. M. Bayat, Bnd mage watermarkng method based on chaotc key and dynamc coeffcent quantzaton n the dwt doman, Mathematcal and Computer Modellng (), do:.6/j.mcm [8] A. Dng and S. Dong, Algorthm of Dgtal Based on Decomposton of Wavelet Packet, Sxth Internatonal Confer-ence on Internet Computng for Scence and Engneerng, pp ,. [9] K. Byun, S. Lee, and H. Km, A watermarkng method usng quant-zaton and statstcal characterstcs of wavelet transform, PDCAT 5. Sxth Internatonal Conference on Parallel and Dstrbuted Com-putng, Applcatons and Technologes, pp , Dec. 5. [] L. Fan and T. Gao, A Novel Blnd Robust ng SchemeBased on Statstc Characterstc of Wavelet Doman Coeffcents, n Proc. Internatonal Conference on Sgnal Processng Systems, pp. 5, May 9. [] M. Hajzadeh, M. S. Helfroush, and M. J. Dehghan, A Novel Blnd ng Method Based on Dstance Vector of Sgnfcant Wavelet Coeffcents, 6th Iranan Machne Vson and Process-ng (MVIP), pp. 6, Oct.. [] P. Lu and Z. Dng, A Blnd ng Scheme Based on Wavelet Tree Quantzaton, Second Internatonal Symposum on Electronc Commerce and Securty, vol., pp. 8, May 9. [3] J. Huang and C. Yang, Dgtal ng Algorthm Usng multresoluton Wavelet Transform, 4 IEEE Internatonal Conference on Systems, Man and Cybernetcs, vol. 3, pp , Oct. 4. [4] J. H. Uhl, C. Kodl, and A. Uhl, Multple Blnd Re-watermarkng wth Quantzaton-Based Embeddng, n Proc. 8th IEEE Internatonal Conference on Processng, pp ,. [5] Y. Qao, Q. Hu, G. Qan, S. Luo, and W. L.Nownsk, Thresholdng based on varance and ntensty contrast, The journal of the pattern recognton socety, vol. Pattern Recognton 4, pp , 7. Thuong Le Ten was born and grew up n Sagon, now s Ho Ch Mnh Cty Vetnam. He got Bachelor Degree n Engneerng from the Unversty of Technology, Vetnam n -98, snce then he has been wth the Electroncs & Telecommuncatons Department, Ho Ch Mnh Cty Unversty of Technology. He spent 3 years n the Federal Republc of Germany as a vstng scholar at the Ruhr Unversty of Bochum from 989 untl 99. He receved the Ph.D. n Telecommuncatons from the Unversty of Tasmana, Australa n 998. He served as Deputy Department Head for many years and has been the Telecommuncatons Department Head snce 998. He has also apponted for the second poston as the Drector of Center for Overseas Studes snce 998. Hs areas of specalzaton ncludes: Communcaton Systems, Sgnal Processng and Electronc Crcuts.
6 Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 Then Huynh The was born n Bentre provnce, Vetnam n 988. He receved the B.E degrees from the Unversty of Techncal Educaton Ho Ch Mnh Cty (HCMUTE), HCM Cty, Vetnam n. He s currently pursung the M.E degree at Faculty of Electrcal & Electroncs Engneerng, HMCUTE. Hs research nterests are sgnal processng, dgtal watermarkng, and hdng nformaton. 3
Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme
Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract
More informationTamper Localization in Wavelet Domain Using Semi- Fragile Watermarking
Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract
More informationA New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution
9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the
More informationChaotic Filter Bank for Computer Cryptography
Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College
More informationRejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan
More informationCONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES
he Internatonal Journal of Multmeda & Its Applcatons (IJMA) Vol.3, No.1, February 211 CONOURLE RANSFORM BASED WAERMARKING FOR COLOUR IMAGES Dnesh Kumar 1 and Vjay Kumar 2 1 Department of Computer Scence
More informationSide-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding
Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu
More informationIMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING
U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel
More informationA Novel and Secure technique for image. Steganography using DWT
Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton
More informationSteganography in JPEG2000 Compressed Images
824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed
More informationPRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht
68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly
More informationA New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs
Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,
More informationResearch of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b
2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng
More informationNATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985
NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT
More informationANNUAL OF NAVIGATION 11/2006
ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton
More informationSpread Spectrum based M-ary Modulated Robust Image Watermarking
54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationEfficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques
The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department
More informationFast Code Detection Using High Speed Time Delay Neural Networks
Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department
More informationRobust Block Selection for Watermarking Video Streams
Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng
More informationComparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate
Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com
More informationCalculation of the received voltage due to the radiation from multiple co-frequency sources
Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons
More informationA High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode
A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute
More informationA Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network
Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute
More informationResearch on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating
, pp. 337-344 http://dx.do.org/10.1457/jht.014.7.6.9 Research on Peak-detecton Algorthm for Hgh-precson Demodulaton System of Fber ragg Gratng Peng Wang 1, *, Xu Han 1, Smn Guan 1, Hong Zhao and Mngle
More informationMulti-focus Image Fusion Using Spatial Frequency and Genetic Algorithm
0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,
More informationWavelet and Neural Network Approach to Demand Forecasting based on Whole and Electric Sub-Control Center Area
Internatonal Journal of Soft Computng and Engneerng (IJSCE) ISSN: 2231-2307, Volume-1, Issue-6, January 2012 Wavelet and Neural Networ Approach to Demand Forecastng based on Whole and Electrc Sub-Control
More informationHigh Speed, Low Power And Area Efficient Carry-Select Adder
Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs
More informationTo: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel
To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,
More informationA Robust Feature Extraction Algorithm for Audio Fingerprinting
A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry
More informationImproved Error Detection in the JPEG2000 Codec
Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence
More informationThe Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System
Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng
More informationA Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method
A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,
More informationRecognition of Low-Resolution Face Images using Sparse Coding of Local Features
Recognton of Low-Resoluton Face Images usng Sparse Codng of Local Features M. Saad Shakeel and Kn-Man-Lam Centre for Sgnal Processng, Department of Electronc and Informaton Engneerng he Hong Kong Polytechnc
More informationPhasor Representation of Sinusoidal Signals
Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e
More informationTopology Control for C-RAN Architecture Based on Complex Network
Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton
More informationPerformance Analysis of the Weighted Window CFAR Algorithms
Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,
More informationEvaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator
Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research
More informationFPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm
IACSIT Internatonal Journal of Engneerng and Technology, Vol. 7, No. 3, June 25 FPGA Implementaton of Ultrasonc S-Scan Coordnate Converson Based on Radx-4 CORDIC Algorthm Ruobo Ln, Guxong Lu, and Wenmng
More informationREMOVAL OF ELECTRODE MOTION ARTIFACT IN ECG SIGNALS USING WAVELET BASED THRESHOLD METHODS WITH GREY INCIDENCE DEGREE
Removal of Electrode Moton Artfact n Ecg Sgnals Usng Wavelet Based Threshold Methods wth Grey Incdence Degree REMOVAL OF ELECTRODE MOTION ARTIFACT IN ECG SIGNALS USING WAVELET BASED THRESHOLD METHODS WITH
More informationDynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University
Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout
More information熊本大学学術リポジトリ. Kumamoto University Repositor
熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng
More informationMEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM
Journal of Theoretcal and Appled Informaton Technology 2005-2015 JATIT & LLS. All rghts reserved. ISSN: 1992-8645 www.jatt.org E-ISSN: 1817-3195 MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET
More informationROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION
7th European Sgnal Processng Conference (EUSIPCO 9 Glasgow, Scotland, August 4-8, 9 ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION Babta Majh, G. Panda and B.
More informationA MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS
A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr
More informationA NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems
0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of
More informationA study of turbo codes for multilevel modulations in Gaussian and mobile channels
A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,
More informationNew Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.
Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable
More informationNOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION
NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona
More informationOptimizing a System of Threshold-based Sensors with Application to Biosurveillance
Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?
More informationCentralized approach for multi-node localization and identification
Centralzed approach for mult-node localzaton and dentfcaton Ola A. Hasan Electrcal Engneerng Department Unversty of Basrah Basrah, Iraq Lolastar91@gmal.com Ramzy S. Al Electrcal Engneerng Department Unversty
More informationTh P5 13 Elastic Envelope Inversion SUMMARY. J.R. Luo* (Xi'an Jiaotong University), R.S. Wu (UC Santa Cruz) & J.H. Gao (Xi'an Jiaotong University)
-4 June 5 IFEMA Madrd h P5 3 Elastc Envelope Inverson J.R. Luo* (X'an Jaotong Unversty), R.S. Wu (UC Santa Cruz) & J.H. Gao (X'an Jaotong Unversty) SUMMARY We developed the elastc envelope nverson method.
More informationWideband Spectrum Sensing by Compressed Measurements
Wdeband Spectrum Sensng by Compressed Measurements Davood Mardan Najafabad Department of Electrcal Engneerng Yazd Unversty Emal: d.mardan@stu.yazdun.ac.r Al A. Tadaon Department of Electrcal Engneerng
More informationApproximating User Distributions in WCDMA Networks Using 2-D Gaussian
CCCT 05: INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS, AND CONTROL TECHNOLOGIES 1 Approxmatng User Dstrbutons n CDMA Networks Usng 2-D Gaussan Son NGUYEN and Robert AKL Department of Computer
More informationRelevance of Energy Efficiency Gain in Massive MIMO Wireless Network
Relevance of Energy Effcency Gan n Massve MIMO Wreless Network Ahmed Alzahran, Vjey Thayananthan, Muhammad Shuab Quresh Computer Scence Department, Faculty of Computng and Informaton Technology Kng Abdulazz
More informationantenna antenna (4.139)
.6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,
More informationReview: Our Approach 2. CSC310 Information Theory
CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages
More informationMTBF PREDICTION REPORT
MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0
More informationPROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN
PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN Crstan V. SERDEAN 1, Martn TOMLINSON 1, Graham J. WADE 2 and Adran M. AMBROZE 1 1 Unversty of Plymouth, Unted Kngdom and 2 The
More informationImprovement of Buck Converter Performance Using Artificial Bee Colony Optimized-PID Controller
Journal of Automaton and Control Engneerng Vol. 3, No. 4, August 2015 Improvement of Buck Converter Performance Usng Artfcal Bee Colony Optmzed-PID Controller Yusuf Sonmez1, Ozcan Ayyldz1, H. Tolga Kahraman2,
More informationIndex Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance.
ANALYTICAL COMPARISON OF THE PERFORMANCE OF ADAPTIVE MODULATION AND CODING IN WIRELESS NETWORK UNDER RAYLEIGH FADING 723 Sab Y.M. BANDIRI, Rafael M.S. BRAGA and Danlo H. SPADOTI Federal Unversty of Itajubá
More informationIEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES
IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department
More informationParameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation
1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected
More informationDigital Transmission
Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal
More informationPassive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)
Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN
Internatonal Journal of Scentfc & Engneerng Research, Volume 4, Issue, November-203 ISSN 2229-558 33 COMPARATIVE STUDY OF HUFFMAN CODING, SBAC AND CABAC USED IN VARIOUS VIDEO CODING STANDARS AND THEIR
More informationBLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS
BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln
More informationA Novel Cost Effective Demosaicing Approach
56 IEEE Transactons on Consumer Electroncs, Vol. 5, No., FEBRUARY 4 A Novel Cost Effectve Demosacng Approach R. Lukac, K.N. Platanots, D. Hatznakos, and M. Aleksc Abstract A unque color nterpolaton approach
More information3D Particle Position Measurement via the Defocusing Concept
Internatonal Journal of Advanced Scence and Technology Vol. 24, November,, 2 3D Partcle Poston Measurement va the Defocusng Concept Xaol Bao, Muguo L State Key Laboratory of Coastal and Offshore Engneerng,
More informationDistributed Adaptive Channel Allocation in Multi-Radio Wireless Sensor Networks
Journal of Communcatons Vol., No., November 26 Dstrbuted Adaptve Channel Allocaton n Mult-Rado Wreless Sensor Networks We Peng, Dongyan Chen, Wenhu Sun, and Guqng Zhang2,3 School of Control Scence and
More informationOn the Feasibility of Receive Collaboration in Wireless Sensor Networks
On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,
More informationOVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS
OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS Ferdnan Snaga #, Elathamby Ambkarajah # and Andrew P. Bradley* # School of Electrcal Engneerng and Telecommuncatons
More informationDISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT
DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department
More informationSpace Time Equalization-space time codes System Model for STCM
Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal
More informationResource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks
Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty
More informationAn Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network
Progress In Electromagnetcs Research M, Vol. 70, 135 143, 2018 An Alternaton Dffuson LMS Estmaton Strategy over Wreless Sensor Network Ln L * and Donghu L Abstract Ths paper presents a dstrbuted estmaton
More informationAdaptive Modulation for Multiple Antenna Channels
Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,
More informationGeneralized Multiple ROI Prioritization in JPEG2000 for Natural Images
Ompraash Rajanar et al, / (IJCSIT) Internatonal Journal of Computer Scence and Informaton Technologes, Vol. 6 (), 015, 1636-164 Generalzed Multple ROI Prortzaton n JPEG000 for Natural Images Ompraash Rajanar
More informationSECURE multimedia data transmission across Internet can. A Channel-Dependent Statistical Watermark Detector for Color Images
Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TMM.8.85447, IEEE Transactons
More informationProposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking
Proposed pproach for Improvng Bluetooth Netorks Securty through SVD udo Watermarkng M.. M. El-Bendary,. Haggag Dept. of Electroncs echnology, Faculty of Industral Educaton, Helan Unversty. Caro, Egypt.
More informationRange-Based Localization in Wireless Networks Using Density-Based Outlier Detection
Wreless Sensor Network, 010,, 807-814 do:10.436/wsn.010.11097 Publshed Onlne November 010 (http://www.scrp.org/journal/wsn) Range-Based Localzaton n Wreless Networks Usng Densty-Based Outler Detecton Abstract
More informationThe Application of Interpolation Algorithms in OFDM Channel Estimation
The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School
More informationTHEORY OF YARN STRUCTURE by Prof. Bohuslav Neckář, Textile Department, IIT Delhi, New Delhi. Compression of fibrous assemblies
THEORY OF YARN STRUCTURE by Prof. Bohuslav Neckář, Textle Department, IIT Delh, New Delh. Compresson of fbrous assembles Q1) What was the dea of fbre-to-fbre contact accordng to van Wyk? A1) Accordng to
More informationPerformance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme
Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,
More informationThe Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks
Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. The Impact of Spectrum Sensng Frequency and Pacet- Loadng
More informationGenerator of Time Series of Rain Attenuation: Results of Parameter Extraction
32 M. GRÁBNER U.-. FIEBIG V. KVIERA GENERATOR OF TIME SERIES OF RAIN ATTENUATION: RESULTS... Generator of Tme Seres of Ran Attenuaton: Results of Parameter Extracton Martn GRÁBNER 1 Uwe-arsten FIEBIG 2
More informationNetwork Application Engineering Laboratories Ltd., Japan
A Study of Pedestran Observaton System wth Ultrasonc Dstance Sensor Shohe MINOMI, Hrosh YAMAMOTO, Katsuch NAKAMURA, Katsuyuk YAMAZAKI Nagaoka Unversty of Technology, Japan e-mal:mnom@stn.nagaokaut.ac.jp
More informationINSTANTANEOUS TORQUE CONTROL OF MICROSTEPPING BIPOLAR PWM DRIVE OF TWO-PHASE STEPPING MOTOR
The 5 th PSU-UNS Internatonal Conference on Engneerng and 537 Technology (ICET-211), Phuket, May 2-3, 211 Prnce of Songkla Unversty, Faculty of Engneerng Hat Ya, Songkhla, Thaland 9112 INSTANTANEOUS TORQUE
More informationLearning Ensembles of Convolutional Neural Networks
Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)
More informationApplication of Intelligent Voltage Control System to Korean Power Systems
Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon
More informationControl of Chaos in Positive Output Luo Converter by means of Time Delay Feedback
Control of Chaos n Postve Output Luo Converter by means of Tme Delay Feedback Nagulapat nkran.ped@gmal.com Abstract Faster development n Dc to Dc converter technques are undergong very drastc changes due
More informationA Heuristic Speech De-noising with the aid of Dual Tree Complex Wavelet Transform using Teaching-Learning Based Optimization
ISSN (Prnt) : 39-863 ISSN (Onlne) : 975-44 D. Yugandhar et al. / Internatonal Journal of Engneerng and Technology (IJET) A Heurstc Speech De-nosng wth the ad of Dual Tree Complex Wavelet Transform usng
More informationPriority based Dynamic Multiple Robot Path Planning
2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna
More informationMulti-Level Halftoning by IGS Quantization
Journal of Sgnal and Informaton Processng, 2013, 4, 351-358 Publshed Onlne ovember 2013 (http://www.scrp.org/journal/jsp) http://dx.do.org/10.4236/jsp.2013.44044 351 Mult-Level Halftonng by IGS Quantzaton
More informationPerformance Analysis of Power Line Communication Using DS-CDMA Technique with Adaptive Laguerre Filters
Internatonal Conference on Informaton and Electroncs Engneerng IPCSIT vol.6 ( ( IACSIT Press, Sngapore Performance Analyss of Power Lne Communcaton Usng DS-CDMA Technque wth Adaptve Laguerre Flters S.
More informationSPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES
Jun L SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L Laval Unversty, Canada COPL, Physcs department Jl@phy.ulaval.ca KEY WORDS: Image Fuson, Evaluaton, Spatal Qualty, Blur Parameter,
More informationEnhancement for Φ-OTDR Performance by Using Narrow Linewidth Light Source and Signal Processing
PHOTONIC SENSORS / Vol. 6, No. 1, 016: 58 6 Enhancement for Φ-OTDR Performance by Usng Narrow Lnewdth Lght Source and Sgnal Processng Meng ZHANG 1, Song WANG *, Yuanwe ZHENG 1, Yao YANG 1, Xngje SA 1,
More informationAn Algorithm Forecasting Time Series Using Wavelet
IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 04 ISSN (Prnt): 94-084 ISSN (Onlne): 94-0784 www.ijcsi.org 0 An Algorthm Forecastng Tme Seres Usng Wavelet Kas Ismal Ibraheem,Eman
More informationDevelopment of Neural Networks for Noise Reduction
The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 00 89 Development of Neural Networks for Nose Reducton Lubna Badr Faculty of Engneerng, Phladelpha Unversty, Jordan Abstract:
More informationHIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY
Internatonal Journal of Electrcal, Electroncs and Computer Systems, (IJEECS) HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY 1 Supryo Srman, 2 Dptendu Ku. Kundu, 3 Saradndu Panda,
More information