An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold

Size: px
Start display at page:

Download "An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold"

Transcription

1 Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty of Techncal Educaton Ho Ch Mnh Cty, HCM Cty, Vetnam Emal: thethen8@gmal.com Thuong Le Ten Ho Ch Mnh Cty Unversty of Technology, HCM Cty, Vetnam Emal: thuongle@hcmut.edu.vn qualty. But ths method s dsadvantage s that t cannot effectvely resst low-pass flterng attacks such as medan flterng and Gaussan flterng. The authors n [3] proposed the method based on sgnfcant dfference quantzaton technque; that s, every seven-wavelet coeffcents n 3-level DWT sub-band was grouped as a block and the watermark bt s embedded by quantzng the dfference between two largest coeffcents. Based on nsgnfcant coeffcents of a wavelet tree, the authors proposed the method that mproved the qualty of the watermarked mage, but the qualty of recovery watermark was decreased. An ntellgent watermarkng method based on partcle swarm optmzaton (PSO) n [5] s the mproved method n [3]. Ths method has been resolved the conflct between mperceptblty and robustness of watermarkng by selectng randomly coeffcents to make up a block to avod the watermark beng detected and the strength of embeddng watermark among dfferent blocks s adaptve by PSO method to balance the robustness and perceptual transparency. By scalng the magntude of the sgnfcant dfference between the two largest wavelet coeffcents n a wavelet tree, the authors [6] mproved the robustness of the watermarkng. However, extracted watermark cannot ensure the qualty under JPEG compresson. Embeddng the nformaton nto the sgnfcant wavelet coeffcent n those dynamc blocks wth strong edges accordng to a "Bnary Algorthm" was proposed n research [7]. Snce the change to the blocks wth strong edge strengths s less vsble to human eyes. The threshold n extracton process was lmted by the demanded sze of the watermark. The authors n [8] used wavelet packet decomposton technque for both the orgnal mage and the watermark by embeddng watermark nto low-frequency sub-band and comparng the correlaton between recovery and orgnal watermark to decde the exstence of watermark. The authors n [9] suggested a method that usng statstcal characterstcs of coeffcents to quantze. Ths method used two quantzaton algorthm for two phases of watermarkng system. Usng the same method, the Abstract In ths research, we ntroduce an effcent blnd watermarkng method for gray mage based on wavelet tree quantzaton usng adaptve threshold n extracton process. Based on dfference value between two largest coeffcents, each scrambled bnary watermark bt s embedded nto each block whch created by four LH3 coeffcents and one LH4 coeffcent. In extracton process, we compare dfference value n each block to adaptve threshold to recover watermark bt. The qualty of extracted watermark depends on the threshold whch s determned by the Weghted Wthn-Class Varance algorthm. Performance of proposed method s represented through expermental results under varous attacks such as, Hstogram Equalzaton, Croppng, Low-pass Flterng, Gaussan nose, Salt & Pepper nose and JPEG compresson. Index Terms blnd watermarkng, 3-level DWT, sgnfcant dfference, adaptve threshold, wthn-class varance I. INTRODUCTION Due to the advantage of the Internet, people can arbtrarly and access or dstrbute dgtal products. Hence, the dgtal watermarkng technque has been used n multmeda products to protect copyrght and authentcate mage... Ths technque embeds nformaton nto the dgtal contents so that the vewer cannot see any nformaton. However, there are many problems n the watermarkng system: the watermark has to ensure not degradng the qualty of the cover mage and beng perceptually nvsble for human eyes; the watermark must be robust to resst dfferent attacks and the watermarkng system s blndness. Several wavelet tree-based watermarkng methods are proposed based on the qualfed sgnfcant wavelet tree (QSWT) [,, 4, 5, and 6]. In [], the authors embedded watermark n each of two sub-bands of wavelet tree. The authors n [] mproved the method n [] by usng four trees to represent two watermark bts to enhance vsual Manuscrpt receved February, 3; revsed May, 3. do:.7/jeee

2 Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 authors n [] embedded watermark by modfyng the center coeffcent n each block and the value of ths coeffcent depend on the watermark bt and the mean of four cross neghbor coeffcents. Another way to group was represented n []: LH3 and HL3 sub-band are dvded nto equal four sectons. Each block was grouped by one coeffcent n each secton. Before that, the basc method s proposed n [] embeddng each watermark bt by comparng the dfference of two largest sgnfcant coeffcents n each wavelet tree to the average value. The maxmum coeffcent was modfed based on value of watermark bt. In [3], the authors embedded each pxel of watermark nto the wavelet coeffcent of mddle and low frequency of a block n the cover mage. However, the proposed method s non-blnd watermarkng system; that s, usng orgnal mage for extracton process. Addtons, the authors n [4] used a re-watermarkng approach employng blnd, quantzaton-based and robust technque to embed multple fngerprntng. They nvestgated two extensons to a wavelet coeffcent-tree based embeddng technque that turn out to mprove detecton performance. In ths research, an effcent blnd watermarkng method for mage based on the sgnfcant dfference of wavelet coeffcents s developed from [3]. Due to the mportance of determnng threshold value n extracton process, ths value could be determned based on the probablty densty functon (pdf) of blocks along dfference values nstead of proposed algorthm n [3]. By computng the weghed wthn-class varance [5], we separate pdf plot nto two parts and the dfference value chosen as threshold has mnmum varance. Smulaton results under dfferent attack cases demonstrate method's performance through PSNR of embedded mage and NC of extracted watermark. We have sze of HL3 after decomposng s when usng mage. There are watermark bts are embedded nto blocks, whch are grouped based on wavelet tree as Fg. ; that s, one coeffcent of HL4 and four coeffcents of the same orentaton n the same locaton n HL3 are grouped as a block. Each wavelet tree conssts of coeffcents for a wavelet tree constructed at each node from HL4 to HL3. Each 4-level sub-band, we have 4 coeffcents whch s the maxmum number of watermark can be embedded. However, due to watermark wth sze, we only need 5 blocks n embedded and extracton algorthm. For embeddng process, we modfy the maxmum coeffcent by the fxed quantty, called quantzaton value, based on the sgnfcant dfference of two largest coeffcents n each block and value of watermark bt. Ths value s the mean of all sgnfcant dfference values of all mage used. For one mage, we can fnd ths value as follows: N (max sec ) N () where N: number of blocks, max and sec are two th largest coeffcents n have: block. For many mages, we T m j....() m j where m: number of mages. The mages are consdered n smulaton nclude Lena, Baboon, Pepper, Goldhll and Salboat. The value of each mage and average of them s represented n TABLE I. The quantzaton value used n ths paper s the mean of all above mages. II. THE PROPOSED METHOD TABLE I. QUANTIZATION VALUE OF EACH IMAGE A. The ng Method ng model s represented n Fg.. The watermark after scramblng wth securty key wll be hd nto the host mage. We decompose ths mage at 4-level DWT to four sub-bands. Based on the wavelet tree technque, three are three super wavelet trees: HH3-HH3HH-HH s easly elmnated when usng the JPEG lossy compresson. HL4-HL3-HL-HL s sutable to embed the watermark n ths paper to satsfy extractng watermark under dfferent attacks nstead of LH sub-band famly. To lmt computng capacty, we only choose HL4 and HL3 for embeddng process. Lena ℰ 5 Baboon Pepper Goldhll Salboat T=Average 58 4 B. The Embeddng Process Comparng sgnfcant dfference to threshold to extract watermark bt Coeffcent of the HL LH3 LH HL3 HH3 LH HL HH Extracted HL HH Extracted Fgure. Embeddng watermark based on wavelet tree quantzaton + Embeddng Algorthm Host + Key Channel + Extracton Algorthm The watermark mage used to embed nto the host gray mage has sze 5 bts wth value or. After scramblng watermark wth securty number, each bt wll be embedded nto each block, respectvely. Each block have fve coeffcents (4 HL3 coeffcents + HL4 coeffcent) s created after decomposng Scambleb bt Attacks Fgure. ng model. 99

3 Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 gray mage. In each block, we seek two values: the largest coeffcent and sec - the second largest coeffcent sgnfcant and (max sec ). For th dfference value. Wthout attacks, we can determne the threshold value to extract watermark exactly. However, the change of pdf s very lght under some attacks, such as, hstogram equalzaton, Gaussan flter; otherwse, some attacks affect pdf extreme serously, such as average flter. In these cases, we cannot extract correctly encoded watermark; t can be explaned that the watermark bt are embedded, sgnfcant dfferences wll be ; however under varous attacks, they are larger than value. max - dfference bt of watermark, we perform the embeddng algorthm as the followng steps for block: Wth watermark bt : max where max ;f ( T ) max ;f ( T ) (3) T Sgnfcant dfference () Modfed sgnfcant () Weghted wthnof each block dfference value class varance Compute average Seek the value mnmum value Wth watermark bt : max max / sec sec / Fgure 5. The flowchart for determnng threshold The qualty of embedded mage depend on value T n the case we use same watermark. The detaled of embeddng process can be showed n Fg blocks 3-level DWT HL3 subband Embeddng Algorthm In ths paper, we proposed an algorthm to determne adaptve threshold based on computng the weghed wthn-class varance. In more detal, we fnd the threshold that gets mnmzed the weghted wthn-class varance, or ths turn out to be the same as maxmzng the between-class varance. However, we need to modfy sgnfcant dfference of the blocks whch have. Ths preprocess does not affect the qualty of recovery watermark because these blocks wll extract exactly snce threshold value s always less than. The proposed algorthm for determnng threshold s showed n Fg. 5. The process () n Fg. 5 can be performed as follows: HL4 subband pseudo-random sequence È 4-level DWT Host Bnary watermark Scramble HL3 subband IDWT 4 blocks Restructure Fgure 3. The flowchart of embeddng process. C. The Extracton Process bt embedded nto each block can be recovered based on comparng sgnfcant dfference to threshold - denoted as. After embeddng, dfference n each block of cover mage wll be or larger than as (3) and (4). In wth non-attack case, watermark s extracted exactly when the threshold n the range ( y ). However, ths value can be changed n dfferent attack cases; that s, extracted bt s nstead of. When fnd out the threshold, we can extracted as below equaton: bt ;f ( d ) ;f ( d ) d ;f ( d ) ;f ( d ) d w (d ) W (d ) (d ) W (d ) (d ).(7) where class probabltes estmated: and d W (d ) p() (5) W (d ) max ( d ) p() =d+ Attack Type: Rotaton And the class means are gven by:.4 d.8 ( d ) PDF p( ) W (d ).. 3 Sgnfcant Dfference are (8) Non-attack. (6) The detaled process () n Fg. 5 can be calculated as:.5. PDF Determne adaptve threshold y Average value ℰ (4) 4 Fgure 4. Probablty densty functon 3 Sgnfcant Dfference x ( n) (d ) 4 of sgnfcant dfference max ( d ) d p() W (d ) of cover mage Fnally, the ndvdual class varances are: We can consder the probablty densty functon x(n) of sgnfcant dfference n Fg. 4. The functon (d ) ( (d )) x(n) represents the number of block havng the same d p() W (d ) (9) ()

4 Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 max( d ) ( d) ( ( d)) d p () W( d) These calculaton steps were done through the range of d max d and pck out the value that value [, ( )] mnmzed ( d) W sgnfcant dfference value whch has. The adaptve threshold s the ( mn). If W there are many values, the threshold wll be the mean of them: mean d d mn () ( / W ( ) ) After determnng adaptve threshold, we use (5) to extract watermark. III. EXPERIMENTAL RESULT We use the peak sgnal-to-nose rato PSNR to evaluate the qualty between embedded mage and orgnal mage. Ths formula s defned as follows: PSNR 55 log ( ) MSE () where MSE s computed as below equaton: M N MSE I j I j M N j (, ) (, ) (3) where M and N are heght and wdth of the mage, are the grey value respectvely. I(, j ) and I (, j) located at coordnate (, j ) of the orgnal mage and embedded mage. After extractng, estmaton for qualty of extracted watermark s compared to the orgnal watermark s express accordng the normalzed correlaton NC value: m n NC w(, j) w(, j) m n (4) j where s the watermark of sze. w(, j ) and w (, j) are the values located at coordnate (, j ) of orgnal watermark and extracted watermark. Value of w(, j ) s set f t s a watermark bt, otherwse, t s set - and smlar to w (, j). So the value of w(, j) w(, j) s ether or -. If number of bt extracted correctly s larger than 5%, the NC value s postve; otherwse, t s negatve. A. Wth Non-Attack In below the smulaton, the gray-mages used as cover and watermark s the mages have sze (5 5) bnary mage wth sze (6 3). Addtons, we apply the Haar wavelets to decompose and reconstruct to cover mage. Smulaton result of embeddng process showed n TABLE.II, all cover mages n ths smulaton get good nvsblty (PSNR larger than 4dB). In the non-attack case, the watermark mage s extracted from the cover mage accordng usng proposed determnng threshold algorthm. Table. II shows the qualty of recovered watermark wth NC= for all mages. TABLE II. RESULT OF EMBEDDED IMAGE AND RECOVERY WATERMARK Lena Baboon Pepper Goldhll Salboat Orgnal PSNR MSE..... B. Wth Geometrc Attacks Under varous attacks, we only use mage Lena for smulaton. There are some geometrc attack types are consdered n ths smulaton, such as, croppng, scalng, rotaton and Gaussan nose. For the croppng attack, pxel of mage s dropped at the center of embedded mage and they are replaced by gray value pxels. In the scalng case, the host mage s scaled to and then scale one more tme to orgnal sze. For two last attack types, the cover mage s rotated by small degree and added Gaussan nose wth many dfferent varances. The result of watermarkng under geometrc attacks s showed n Table. III. Wth the larger value T, the robustness of watermark wll be ncreased but the nvsblty of host mage wll be reduced. There s a tradeoff between the robustness of watermark and the transparency of host mage. TABLE III. Attack Type Croppng PSNR.67 NC NC OF EXTRACTED WATERMARK UNDER GEOMETRIC ATTACKS.64 Scalng C. Wth Non-Geometrc Attacks TABLE IV. Attack Type Hstogram Equalzaton PSNR 9. NC.88 Rotaton.5 Gaussan Nose NC OF EXTRACTED WATERMARK UNDER NON- GEOMETRIC ATTACKS Gaussan Flter Medan Flter (3 3) Average Flter (3 3) Sharpenng There are some non-geometrc attacks: Hstogram Equalzaton, Gaussan flter, Medan flter, Average flter, sharpenng. Based on the experment result represented n Table. IV, the proposed method has a good resstance to many non-geometrc attacks.

5 Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 D. Wth JPEG Compresson TABLE.V showed the smulaton result n JPEG lossy compresson wth qualty factor from to 6. When we compress the mage wth qualty factor %, although the sze on dsk of mage s very small, NC value of watermark s always greater than.57 and NC= for 6%. E. Comparng to The Other Methods TABLE V. Qualty Factor % PSNR NC NC OF EXTRACTED WATERMARK UNDER JPEG COMPRESSION % 3% 4% 5% 6% We compare our proposed method wth some recently publshed papers: Ln et al [3], Wang et al [5], Run et al [6]. In our method, the expermental result s far better than the lsted method, especally for JPEG lossy compresson, scalng, rotaton, low-pass flter, hstogram equalzaton. Only croppng and sharpenng, the proposed method s not good. Comparson s represented n TABLE.VI. TABLE VI. Attack Type Croppng ¼ Scalng Rotaton.5 Rotaton.3 Gaussan flter Hstogram Equalzaton Sharpenng Medan flter (3 3) Medan flter (5 5) Average flter (3 3) Average flter (5 5) JPEG (QF=) JPEG (QF=) JPEG (QF=3) JPEG (QF=4) JPEG (QF=5) COMPARING PROPOSED METHOD TO THE OTHER METHODS Ln et al [3] (PSNR=44.5dB) IV. Wang et al [5] (PSNR=45.9dB) CONCLUSION Run et al [6] (PSNR=4.98dB) Proposed (PSNR=43.dB) In ths research, we propose an effcent blnd watermarkng for dgtal mage when usng the adaptve threshold algorthm n extracton process. Ths threshold s gven based on computng weghted -wthn class varance through consderng probablty densty functon of sgnfcant dfference. The proposed method s consdered n smulaton under dfferent attack types. The proposed method n ths paper has good mperceptblty through PSNR peek sgnal-to-nose rato parameter (PSNR>4dB) and effectvely resst many attacks, such as, Gaussan flter, Medan flter, Average flter (NC - Normalzed Correlaton of extracted watermark larger than.95) and JPEG compresson (NC=.87 for QF=3%). However, ths method s weakly at some geometrc attacks: croppng, Gaussan nose. REFERENCES [] M. Hsel, D. Tseng, and Y. Huang, Hdng dgtal watermarks usng multresoluton wavelet transform, IEEE Trans. Ind. Electron, vol. 48, pp , Oct.. [] B. K. Len and W. Ln, A watermarkng method based on maxmum dstance wavelet tree quantzaton, n Proc. 9th Conf. Computer Vson, Graphcs and Processng, pp , 6. [3] W. H. Ln, S. J. Horng, T. W. Kao, P. Fan, C. L. Lee, and Y. Pan, An effcent watermarkng method based on sgnfcant dfference of wavelet coeffcent quantzaton, IEEE Transactons on multmeda, pp , Aug. 8. [4] W. H. Ln, Y. Rau, and S. J. Horng, A wavelet-tree-based watermarkng method usng dstance vector of bnary cluster, Expert Systems wth Applcatons, pp , 9. [5] Y. R. Wang, W. H. Ln, and L. Yang, An ntellgent watermarkng method based on partcle swarm optmzaton, Expert Systems wth Applcatons 38, pp ,. [6] R. S. Run, S. J. Horng, W. H. Ln, T. W. Kao, P. Fan, and M. K. Khan, An effcent wavelet-tree-based watermarkng method, Expert Systems wth Applcatons, pp ,. [7] M. Keyvanpour and F. M. Bayat, Bnd mage watermarkng method based on chaotc key and dynamc coeffcent quantzaton n the dwt doman, Mathematcal and Computer Modellng (), do:.6/j.mcm [8] A. Dng and S. Dong, Algorthm of Dgtal Based on Decomposton of Wavelet Packet, Sxth Internatonal Confer-ence on Internet Computng for Scence and Engneerng, pp ,. [9] K. Byun, S. Lee, and H. Km, A watermarkng method usng quant-zaton and statstcal characterstcs of wavelet transform, PDCAT 5. Sxth Internatonal Conference on Parallel and Dstrbuted Com-putng, Applcatons and Technologes, pp , Dec. 5. [] L. Fan and T. Gao, A Novel Blnd Robust ng SchemeBased on Statstc Characterstc of Wavelet Doman Coeffcents, n Proc. Internatonal Conference on Sgnal Processng Systems, pp. 5, May 9. [] M. Hajzadeh, M. S. Helfroush, and M. J. Dehghan, A Novel Blnd ng Method Based on Dstance Vector of Sgnfcant Wavelet Coeffcents, 6th Iranan Machne Vson and Process-ng (MVIP), pp. 6, Oct.. [] P. Lu and Z. Dng, A Blnd ng Scheme Based on Wavelet Tree Quantzaton, Second Internatonal Symposum on Electronc Commerce and Securty, vol., pp. 8, May 9. [3] J. Huang and C. Yang, Dgtal ng Algorthm Usng multresoluton Wavelet Transform, 4 IEEE Internatonal Conference on Systems, Man and Cybernetcs, vol. 3, pp , Oct. 4. [4] J. H. Uhl, C. Kodl, and A. Uhl, Multple Blnd Re-watermarkng wth Quantzaton-Based Embeddng, n Proc. 8th IEEE Internatonal Conference on Processng, pp ,. [5] Y. Qao, Q. Hu, G. Qan, S. Luo, and W. L.Nownsk, Thresholdng based on varance and ntensty contrast, The journal of the pattern recognton socety, vol. Pattern Recognton 4, pp , 7. Thuong Le Ten was born and grew up n Sagon, now s Ho Ch Mnh Cty Vetnam. He got Bachelor Degree n Engneerng from the Unversty of Technology, Vetnam n -98, snce then he has been wth the Electroncs & Telecommuncatons Department, Ho Ch Mnh Cty Unversty of Technology. He spent 3 years n the Federal Republc of Germany as a vstng scholar at the Ruhr Unversty of Bochum from 989 untl 99. He receved the Ph.D. n Telecommuncatons from the Unversty of Tasmana, Australa n 998. He served as Deputy Department Head for many years and has been the Telecommuncatons Department Head snce 998. He has also apponted for the second poston as the Drector of Center for Overseas Studes snce 998. Hs areas of specalzaton ncludes: Communcaton Systems, Sgnal Processng and Electronc Crcuts.

6 Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 Then Huynh The was born n Bentre provnce, Vetnam n 988. He receved the B.E degrees from the Unversty of Techncal Educaton Ho Ch Mnh Cty (HCMUTE), HCM Cty, Vetnam n. He s currently pursung the M.E degree at Faculty of Electrcal & Electroncs Engneerng, HMCUTE. Hs research nterests are sgnal processng, dgtal watermarkng, and hdng nformaton. 3

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract

More information

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution 9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES he Internatonal Journal of Multmeda & Its Applcatons (IJMA) Vol.3, No.1, February 211 CONOURLE RANSFORM BASED WAERMARKING FOR COLOUR IMAGES Dnesh Kumar 1 and Vjay Kumar 2 1 Department of Computer Scence

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel

More information

A Novel and Secure technique for image. Steganography using DWT

A Novel and Secure technique for image. Steganography using DWT Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

Robust Block Selection for Watermarking Video Streams

Robust Block Selection for Watermarking Video Streams Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

Research on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating

Research on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating , pp. 337-344 http://dx.do.org/10.1457/jht.014.7.6.9 Research on Peak-detecton Algorthm for Hgh-precson Demodulaton System of Fber ragg Gratng Peng Wang 1, *, Xu Han 1, Smn Guan 1, Hong Zhao and Mngle

More information

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm 0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,

More information

Wavelet and Neural Network Approach to Demand Forecasting based on Whole and Electric Sub-Control Center Area

Wavelet and Neural Network Approach to Demand Forecasting based on Whole and Electric Sub-Control Center Area Internatonal Journal of Soft Computng and Engneerng (IJSCE) ISSN: 2231-2307, Volume-1, Issue-6, January 2012 Wavelet and Neural Networ Approach to Demand Forecastng based on Whole and Electrc Sub-Control

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

A Robust Feature Extraction Algorithm for Audio Fingerprinting

A Robust Feature Extraction Algorithm for Audio Fingerprinting A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry

More information

Improved Error Detection in the JPEG2000 Codec

Improved Error Detection in the JPEG2000 Codec Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,

More information

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features Recognton of Low-Resoluton Face Images usng Sparse Codng of Local Features M. Saad Shakeel and Kn-Man-Lam Centre for Sgnal Processng, Department of Electronc and Informaton Engneerng he Hong Kong Polytechnc

More information

Phasor Representation of Sinusoidal Signals

Phasor Representation of Sinusoidal Signals Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

Performance Analysis of the Weighted Window CFAR Algorithms

Performance Analysis of the Weighted Window CFAR Algorithms Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

FPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm

FPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm IACSIT Internatonal Journal of Engneerng and Technology, Vol. 7, No. 3, June 25 FPGA Implementaton of Ultrasonc S-Scan Coordnate Converson Based on Radx-4 CORDIC Algorthm Ruobo Ln, Guxong Lu, and Wenmng

More information

REMOVAL OF ELECTRODE MOTION ARTIFACT IN ECG SIGNALS USING WAVELET BASED THRESHOLD METHODS WITH GREY INCIDENCE DEGREE

REMOVAL OF ELECTRODE MOTION ARTIFACT IN ECG SIGNALS USING WAVELET BASED THRESHOLD METHODS WITH GREY INCIDENCE DEGREE Removal of Electrode Moton Artfact n Ecg Sgnals Usng Wavelet Based Threshold Methods wth Grey Incdence Degree REMOVAL OF ELECTRODE MOTION ARTIFACT IN ECG SIGNALS USING WAVELET BASED THRESHOLD METHODS WITH

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM

MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM Journal of Theoretcal and Appled Informaton Technology 2005-2015 JATIT & LLS. All rghts reserved. ISSN: 1992-8645 www.jatt.org E-ISSN: 1817-3195 MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET

More information

ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION

ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION 7th European Sgnal Processng Conference (EUSIPCO 9 Glasgow, Scotland, August 4-8, 9 ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION Babta Majh, G. Panda and B.

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

Centralized approach for multi-node localization and identification

Centralized approach for multi-node localization and identification Centralzed approach for mult-node localzaton and dentfcaton Ola A. Hasan Electrcal Engneerng Department Unversty of Basrah Basrah, Iraq Lolastar91@gmal.com Ramzy S. Al Electrcal Engneerng Department Unversty

More information

Th P5 13 Elastic Envelope Inversion SUMMARY. J.R. Luo* (Xi'an Jiaotong University), R.S. Wu (UC Santa Cruz) & J.H. Gao (Xi'an Jiaotong University)

Th P5 13 Elastic Envelope Inversion SUMMARY. J.R. Luo* (Xi'an Jiaotong University), R.S. Wu (UC Santa Cruz) & J.H. Gao (Xi'an Jiaotong University) -4 June 5 IFEMA Madrd h P5 3 Elastc Envelope Inverson J.R. Luo* (X'an Jaotong Unversty), R.S. Wu (UC Santa Cruz) & J.H. Gao (X'an Jaotong Unversty) SUMMARY We developed the elastc envelope nverson method.

More information

Wideband Spectrum Sensing by Compressed Measurements

Wideband Spectrum Sensing by Compressed Measurements Wdeband Spectrum Sensng by Compressed Measurements Davood Mardan Najafabad Department of Electrcal Engneerng Yazd Unversty Emal: d.mardan@stu.yazdun.ac.r Al A. Tadaon Department of Electrcal Engneerng

More information

Approximating User Distributions in WCDMA Networks Using 2-D Gaussian

Approximating User Distributions in WCDMA Networks Using 2-D Gaussian CCCT 05: INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS, AND CONTROL TECHNOLOGIES 1 Approxmatng User Dstrbutons n CDMA Networks Usng 2-D Gaussan Son NGUYEN and Robert AKL Department of Computer

More information

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network Relevance of Energy Effcency Gan n Massve MIMO Wreless Network Ahmed Alzahran, Vjey Thayananthan, Muhammad Shuab Quresh Computer Scence Department, Faculty of Computng and Informaton Technology Kng Abdulazz

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN

PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN Crstan V. SERDEAN 1, Martn TOMLINSON 1, Graham J. WADE 2 and Adran M. AMBROZE 1 1 Unversty of Plymouth, Unted Kngdom and 2 The

More information

Improvement of Buck Converter Performance Using Artificial Bee Colony Optimized-PID Controller

Improvement of Buck Converter Performance Using Artificial Bee Colony Optimized-PID Controller Journal of Automaton and Control Engneerng Vol. 3, No. 4, August 2015 Improvement of Buck Converter Performance Usng Artfcal Bee Colony Optmzed-PID Controller Yusuf Sonmez1, Ozcan Ayyldz1, H. Tolga Kahraman2,

More information

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance.

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance. ANALYTICAL COMPARISON OF THE PERFORMANCE OF ADAPTIVE MODULATION AND CODING IN WIRELESS NETWORK UNDER RAYLEIGH FADING 723 Sab Y.M. BANDIRI, Rafael M.S. BRAGA and Danlo H. SPADOTI Federal Unversty of Itajubá

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN Internatonal Journal of Scentfc & Engneerng Research, Volume 4, Issue, November-203 ISSN 2229-558 33 COMPARATIVE STUDY OF HUFFMAN CODING, SBAC AND CABAC USED IN VARIOUS VIDEO CODING STANDARS AND THEIR

More information

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln

More information

A Novel Cost Effective Demosaicing Approach

A Novel Cost Effective Demosaicing Approach 56 IEEE Transactons on Consumer Electroncs, Vol. 5, No., FEBRUARY 4 A Novel Cost Effectve Demosacng Approach R. Lukac, K.N. Platanots, D. Hatznakos, and M. Aleksc Abstract A unque color nterpolaton approach

More information

3D Particle Position Measurement via the Defocusing Concept

3D Particle Position Measurement via the Defocusing Concept Internatonal Journal of Advanced Scence and Technology Vol. 24, November,, 2 3D Partcle Poston Measurement va the Defocusng Concept Xaol Bao, Muguo L State Key Laboratory of Coastal and Offshore Engneerng,

More information

Distributed Adaptive Channel Allocation in Multi-Radio Wireless Sensor Networks

Distributed Adaptive Channel Allocation in Multi-Radio Wireless Sensor Networks Journal of Communcatons Vol., No., November 26 Dstrbuted Adaptve Channel Allocaton n Mult-Rado Wreless Sensor Networks We Peng, Dongyan Chen, Wenhu Sun, and Guqng Zhang2,3 School of Control Scence and

More information

On the Feasibility of Receive Collaboration in Wireless Sensor Networks

On the Feasibility of Receive Collaboration in Wireless Sensor Networks On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,

More information

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS Ferdnan Snaga #, Elathamby Ambkarajah # and Andrew P. Bradley* # School of Electrcal Engneerng and Telecommuncatons

More information

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network Progress In Electromagnetcs Research M, Vol. 70, 135 143, 2018 An Alternaton Dffuson LMS Estmaton Strategy over Wreless Sensor Network Ln L * and Donghu L Abstract Ths paper presents a dstrbuted estmaton

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images

Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images Ompraash Rajanar et al, / (IJCSIT) Internatonal Journal of Computer Scence and Informaton Technologes, Vol. 6 (), 015, 1636-164 Generalzed Multple ROI Prortzaton n JPEG000 for Natural Images Ompraash Rajanar

More information

SECURE multimedia data transmission across Internet can. A Channel-Dependent Statistical Watermark Detector for Color Images

SECURE multimedia data transmission across Internet can. A Channel-Dependent Statistical Watermark Detector for Color Images Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TMM.8.85447, IEEE Transactons

More information

Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking

Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking Proposed pproach for Improvng Bluetooth Netorks Securty through SVD udo Watermarkng M.. M. El-Bendary,. Haggag Dept. of Electroncs echnology, Faculty of Industral Educaton, Helan Unversty. Caro, Egypt.

More information

Range-Based Localization in Wireless Networks Using Density-Based Outlier Detection

Range-Based Localization in Wireless Networks Using Density-Based Outlier Detection Wreless Sensor Network, 010,, 807-814 do:10.436/wsn.010.11097 Publshed Onlne November 010 (http://www.scrp.org/journal/wsn) Range-Based Localzaton n Wreless Networks Usng Densty-Based Outler Detecton Abstract

More information

The Application of Interpolation Algorithms in OFDM Channel Estimation

The Application of Interpolation Algorithms in OFDM Channel Estimation The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School

More information

THEORY OF YARN STRUCTURE by Prof. Bohuslav Neckář, Textile Department, IIT Delhi, New Delhi. Compression of fibrous assemblies

THEORY OF YARN STRUCTURE by Prof. Bohuslav Neckář, Textile Department, IIT Delhi, New Delhi. Compression of fibrous assemblies THEORY OF YARN STRUCTURE by Prof. Bohuslav Neckář, Textle Department, IIT Delh, New Delh. Compresson of fbrous assembles Q1) What was the dea of fbre-to-fbre contact accordng to van Wyk? A1) Accordng to

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. The Impact of Spectrum Sensng Frequency and Pacet- Loadng

More information

Generator of Time Series of Rain Attenuation: Results of Parameter Extraction

Generator of Time Series of Rain Attenuation: Results of Parameter Extraction 32 M. GRÁBNER U.-. FIEBIG V. KVIERA GENERATOR OF TIME SERIES OF RAIN ATTENUATION: RESULTS... Generator of Tme Seres of Ran Attenuaton: Results of Parameter Extracton Martn GRÁBNER 1 Uwe-arsten FIEBIG 2

More information

Network Application Engineering Laboratories Ltd., Japan

Network Application Engineering Laboratories Ltd., Japan A Study of Pedestran Observaton System wth Ultrasonc Dstance Sensor Shohe MINOMI, Hrosh YAMAMOTO, Katsuch NAKAMURA, Katsuyuk YAMAZAKI Nagaoka Unversty of Technology, Japan e-mal:mnom@stn.nagaokaut.ac.jp

More information

INSTANTANEOUS TORQUE CONTROL OF MICROSTEPPING BIPOLAR PWM DRIVE OF TWO-PHASE STEPPING MOTOR

INSTANTANEOUS TORQUE CONTROL OF MICROSTEPPING BIPOLAR PWM DRIVE OF TWO-PHASE STEPPING MOTOR The 5 th PSU-UNS Internatonal Conference on Engneerng and 537 Technology (ICET-211), Phuket, May 2-3, 211 Prnce of Songkla Unversty, Faculty of Engneerng Hat Ya, Songkhla, Thaland 9112 INSTANTANEOUS TORQUE

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Control of Chaos in Positive Output Luo Converter by means of Time Delay Feedback

Control of Chaos in Positive Output Luo Converter by means of Time Delay Feedback Control of Chaos n Postve Output Luo Converter by means of Tme Delay Feedback Nagulapat nkran.ped@gmal.com Abstract Faster development n Dc to Dc converter technques are undergong very drastc changes due

More information

A Heuristic Speech De-noising with the aid of Dual Tree Complex Wavelet Transform using Teaching-Learning Based Optimization

A Heuristic Speech De-noising with the aid of Dual Tree Complex Wavelet Transform using Teaching-Learning Based Optimization ISSN (Prnt) : 39-863 ISSN (Onlne) : 975-44 D. Yugandhar et al. / Internatonal Journal of Engneerng and Technology (IJET) A Heurstc Speech De-nosng wth the ad of Dual Tree Complex Wavelet Transform usng

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

Multi-Level Halftoning by IGS Quantization

Multi-Level Halftoning by IGS Quantization Journal of Sgnal and Informaton Processng, 2013, 4, 351-358 Publshed Onlne ovember 2013 (http://www.scrp.org/journal/jsp) http://dx.do.org/10.4236/jsp.2013.44044 351 Mult-Level Halftonng by IGS Quantzaton

More information

Performance Analysis of Power Line Communication Using DS-CDMA Technique with Adaptive Laguerre Filters

Performance Analysis of Power Line Communication Using DS-CDMA Technique with Adaptive Laguerre Filters Internatonal Conference on Informaton and Electroncs Engneerng IPCSIT vol.6 ( ( IACSIT Press, Sngapore Performance Analyss of Power Lne Communcaton Usng DS-CDMA Technque wth Adaptve Laguerre Flters S.

More information

SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES

SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L Laval Unversty, Canada COPL, Physcs department Jl@phy.ulaval.ca KEY WORDS: Image Fuson, Evaluaton, Spatal Qualty, Blur Parameter,

More information

Enhancement for Φ-OTDR Performance by Using Narrow Linewidth Light Source and Signal Processing

Enhancement for Φ-OTDR Performance by Using Narrow Linewidth Light Source and Signal Processing PHOTONIC SENSORS / Vol. 6, No. 1, 016: 58 6 Enhancement for Φ-OTDR Performance by Usng Narrow Lnewdth Lght Source and Sgnal Processng Meng ZHANG 1, Song WANG *, Yuanwe ZHENG 1, Yao YANG 1, Xngje SA 1,

More information

An Algorithm Forecasting Time Series Using Wavelet

An Algorithm Forecasting Time Series Using Wavelet IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 04 ISSN (Prnt): 94-084 ISSN (Onlne): 94-0784 www.ijcsi.org 0 An Algorthm Forecastng Tme Seres Usng Wavelet Kas Ismal Ibraheem,Eman

More information

Development of Neural Networks for Noise Reduction

Development of Neural Networks for Noise Reduction The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 00 89 Development of Neural Networks for Nose Reducton Lubna Badr Faculty of Engneerng, Phladelpha Unversty, Jordan Abstract:

More information

HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY

HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY Internatonal Journal of Electrcal, Electroncs and Computer Systems, (IJEECS) HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY 1 Supryo Srman, 2 Dptendu Ku. Kundu, 3 Saradndu Panda,

More information