• Title/Summary/Keyword: linear embedding

Search Result 96, Processing Time 0.023 seconds

A Watermarking Method Based on the Informed Coding and Embedding Using Trellis Code and Entropy Masking (Trellis 부호 및 엔트로피 마스킹을 이용한 정보부호화 기반 워터마킹)

  • Lee, Jeong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2677-2684
    • /
    • 2009
  • In this paper, we study a watermarking method based on the informed coding and embedding by means of trellis code and entropy masking. An image is divided as $8{\times}8$ block with no overlapping and the discrete cosine transform(DCT) is applied to each block. Then the 16 medium-frequency AC terms of each block are extracted. Next it is compared with gaussian random vectors having zero mean and unit variance. As these processing, the embedding vectors with minimum value of linear combination between linear correlation and Watson distance can be obtained by Viterbi algorithm at each stage of trellis coding. For considering the image characteristics, we apply different weight value between the linear correlation and the Watson distance using the entropy masking. To evaluate the performance of proposed method, the average bit error rate of watermark message is calculated from different several images. By the experiments the proposed method is improved in terms of the average bit error rate.

Speaker verification system combining attention-long short term memory based speaker embedding and I-vector in far-field and noisy environments (Attention-long short term memory 기반의 화자 임베딩과 I-vector를 결합한 원거리 및 잡음 환경에서의 화자 검증 알고리즘)

  • Bae, Ara;Kim, Wooil
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.2
    • /
    • pp.137-142
    • /
    • 2020
  • Many studies based on I-vector have been conducted in a variety of environments, from text-dependent short-utterance to text-independent long-utterance. In this paper, we propose a speaker verification system employing a combination of I-vector with Probabilistic Linear Discriminant Analysis (PLDA) and speaker embedding of Long Short Term Memory (LSTM) with attention mechanism in far-field and noisy environments. The LSTM model's Equal Error Rate (EER) is 15.52 % and the Attention-LSTM model is 8.46 %, improving by 7.06 %. We show that the proposed method solves the problem of the existing extraction process which defines embedding as a heuristic. The EER of the I-vector/PLDA without combining is 6.18 % that shows the best performance. And combined with attention-LSTM based embedding is 2.57 % that is 3.61 % less than the baseline system, and which improves performance by 58.41 %.

Reversible Data Hiding Using a Piecewise Autoregressive Predictor Based on Two-stage Embedding

  • Lee, Byeong Yong;Hwang, Hee Joon;Kim, Hyoung Joong
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.4
    • /
    • pp.974-986
    • /
    • 2016
  • Reversible image watermarking, a type of digital data hiding, is capable of recovering the original image and extracting the hidden message with precision. A number of reversible algorithms have been proposed to achieve a high embedding capacity and a low distortion. While numerous algorithms for the achievement of a favorable performance regarding a small embedding capacity exist, the main goal of this paper is the achievement of a more favorable performance regarding a larger embedding capacity and a lower distortion. This paper therefore proposes a reversible data hiding algorithm for which a novel piecewise 2D auto-regression (P2AR) predictor that is based on a rhombus-embedding scheme is used. In addition, a minimum description length (MDL) approach is applied to remove the outlier pixels from a training set so that the effect of a multiple linear regression can be maximized. The experiment results demonstrate that the performance of the proposed method is superior to those of previous methods.

Audio Watermarking Using Independent Component Analysis

  • Seok, Jong-Won
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.175-180
    • /
    • 2012
  • This paper presents a blind watermark detection scheme for an additive watermark embedding model. The proposed estimation-correlation-based watermark detector first estimates the embedded watermark by exploiting non-Gaussian of the real-world audio signal and the mutual independence between the host-signal and the embedded watermark and then a correlation-based detector is used to determine the presence or the absence of the watermark. For watermark estimation, blind source separation (BSS) based on independent component analysis (ICA) is used. Low watermark-to-signal ratio (WSR) is one of the limitations of blind detection with the additive embedding model. The proposed detector uses two-stage processing to improve the WSR at the blind detector; the first stage removes the audio spectrum from the watermarked audio signal using linear predictive (LP) filtering and the second stage uses the resulting residue from the LP filtering stage to estimate the embedded watermark using BSS based on ICA. Simulation results show that the proposed detector performs significantly better than existing estimation-correlationbased detection schemes.

Embedding in Fibonacci Circulants (피보나치 원형군에서의 임베딩)

  • 유명기;김용석
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.169-172
    • /
    • 2002
  • In this paper, we consider the problem of embedding Fibonacci linear array, Fibonacci mesh, Fibonacci tree into Fibonacci circulants and between Fibonacci cubes and Fibonacci circulants. We show that the Fibonacci linear array of order n , Ln is a subgraph of the Fibonacci circulants of order n , En with En◎ Ln,n≥0 , the Fibonacci mesh of order (nt,n2), M(n,.nT)with S2n.1 f( M(n.れ)닌 M(n.1.n.1)), 52れ 늰( M(n.n.1)띤 M(H.n-1)) and the Fibonacci tree-lof order n, FT/sub n/ with ∑/sub n+3/⊇ FTn , n≥0, the Fibonacci tree-ll of order n , Tれ with ∑/sub n/⊇ Tn Fu퍼hermore, 낀e show that the Fibonacci cubes of order n , rn is subgraph of the Fibonacci circulants of order n , En and inversely rn can be embedded into En with expansion 1, dilation n -2 and congestion.

  • PDF

Cost-Efficient Virtual Optical Network Embedding for Manageable Inter-Data-Center Connectivity

  • Perello, Jordi;Pavon-Marino, Pablo;Spadaro, Salvatore
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.142-145
    • /
    • 2013
  • Network virtualization opens the door to novel infrastructure services offering connectivity and node manageability. In this letter, we focus on the cost-efficient embedding of on-demand virtual optical network requests for interconnecting geographically distributed data centers. We present a mixed integer linear programming formulation that introduces flexibility in the virtual-physical node mapping to optimize the usage of the underlying physical resources. Illustrative results show that flexibility in the node mapping can reduce the number of add-drop ports required to serve the offered demands by 40%.

A Color Image Watermarking Method for Embedding Audio Signal

  • Kim Sang Jin;Kim Chung Hwa
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.631-635
    • /
    • 2004
  • The rapid development of digital media and communication network urgently brings about the need of data certification technology to protect IPR (Intellectual property right). This paper proposed a new watermarking method for embedding contents owner's audio signal in order to protect color image IPR. Since this method evolves the existing static model and embeds audio signal of big data, it has the advantage of restoring signal transformed due to attacks. Three basic stages of watermarking include: 1) Encode analogue ID owner's audio signal using PCM and create new 3D audio watermark; 2) Interleave 3D audio watermark by linear bit expansion and 3) Transform Y signal of color image into wavelet and embed interleaved audio watermark in the low frequency band on the transform domain. The results demonstrated that the audio signal embedding in color image proposed in this paper enhanced robustness against lossy JPEG compression, standard image compression and image cropping and rotation which remove a part of image.

  • PDF

The Prediction of Chaos Time Series Utilizing Inclined Vector (기울기백터를 이용한 카오스 시계열에 대한 예측)

  • Weon, Sek-Jun
    • The KIPS Transactions:PartB
    • /
    • v.9B no.4
    • /
    • pp.421-428
    • /
    • 2002
  • The local prediction method utilizing embedding vector loses the prediction power when the parameter r estimation is not exact for predicting the chaos time series induced from the high order differential equation. In spite of the fact that there have been a lot of suggestions regarding how to estimate the delay time ($\tau$), no specific method is proposed to apply to any time series. The inclinded linear model, which utilizes inclinded netter, yields satisfying degree of prediction power without estimating exact delay time ($\tau$). The usefulness of this approach has been indicated not only theoretically but also in practical situation when the method w8s applied to economical time series analysis.