1 Up votes0 Down votes

144 views5 pages2013, Journal of Computing, eISSN 2151-9617, http://www.journalofcomputing.org/, Call For Computer Science Papers

Apr 29, 2013

© Attribution Non-Commercial (BY-NC)

PDF, TXT or read online from Scribd

2013, Journal of Computing, eISSN 2151-9617, http://www.journalofcomputing.org/, Call For Computer Science Papers

Attribution Non-Commercial (BY-NC)

144 views

2013, Journal of Computing, eISSN 2151-9617, http://www.journalofcomputing.org/, Call For Computer Science Papers

Attribution Non-Commercial (BY-NC)

- The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine who Outwitted America's Enemies
- Steve Jobs
- NIV, Holy Bible, eBook
- NIV, Holy Bible, eBook, Red Letter Edition
- Hidden Figures Young Readers' Edition
- Cryptonomicon
- Console Wars: Sega, Nintendo, and the Battle that Defined a Generation
- Make Your Mind Up: My Guide to Finding Your Own Style, Life, and Motavation!
- The Golden Notebook: A Novel
- Alibaba: The House That Jack Ma Built
- Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone
- Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone
- Autonomous: A Novel
- The 10X Rule: The Only Difference Between Success and Failure
- Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are
- Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy

You are on page 1of 5

ORG

21

Firas A. Jassim

Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another color image (cover). The proposed technique uses Five Modulus Method to convert the whole pixels within both the cover and the stego images into multiples of five. Since each pixels inside the stego image is divisible by five then the whole stego image could be divided by five to get new range of pixels 0..51. Basically, the reminder of each number that is not divisible by five is either 1,2,3 or 4 when divided by 5. Subsequently, then a 44 window size has been implemented to accommodate the proposed technique. For each 44 window inside the cover image, a number from 1 to 4 could be embedded secretly from the stego image. The previous discussion must be applied separately for each of the R, G, and B arrays. Moreover, a stego-key could be combined with the proposed algorithm to make it difficult for any adversary to extract the secret image from the cover image. Based on the PSNR value, the extracted stego image has high PSNR value. Hence this new steganography algorithm is very efficient to hide color images. Index Termsinformation hiding, image representation, security, protection.

1 INTRODUCTION

n past decade, the concept of steganography had obtained a wide attention in the filed of information security. The word steganography comes from the Greek words stegos which means covered and graphia which means writing. Steganography refers to the process of hiding secret message inside any kind of media such as audio, video, or photo [1]. The basic idea in almost data hiding systems is the weakness of human perceptual such as vision, listening, and hearing. There is a common confusion between steganography and cryptography because they both are used to protect secret information. The main difference between Steganography and cryptography is that, cryptography concentrates on keeping the contents of a message secret while steganography concentrates on keeping the existence of a message secret [2]. Therefore, to add more protection to the secret information both steganography and cryptography are needed but each with its own technique. Subsequently, if the idea is to hide the appearance of the secret message, then the procedure of steganography will arise [2]. Combining both steganography and cryptography in the same secret message, these will double the job for the third party to extract the stego image from the cover image and another job is to decipher the encrypted message [3]. Moreover, steganography is not the same as watermarking [4]. The main dissimilarity between steganography and watermarking is the absence of an opponent. In watermarking applications like copyright protection and authentication, there is an active opponent that would attempt to remove, abolish or forge watermarks. In steganography there is no such active opponent as there is no value associated with the act of removing the infor-

mation hidden in the content [5]. Several methods have been proposed for image based steganography, the simplest and widest known steganographic method is the Least Significant Bit (LSB) which replaces the least significant bits of pixels selected to hide the information. A detailed discussion about LSB could be found in [6]. Also, there are a wide variety of different techniques with their own advantages and disadvantages were constructed in steganography. Research in hiding data inside image using steganography technique has been done by many researchers [7][8][9]. Also, an excellent theoretical background about steganography could be found in [10]. The paper is organized as follows: In the next section, an overview of Five Modulus Method was presented. The proposed steganography algorithm was presented in Section 3. The analysis of stego-key was discussed in section 4. Moreover, experimental results and conclusions are presented in Sections 5 and 6, respectively.

Firas A. Jassim is with the Management Information Systems Department, Irbid National University, Irbid-Jordan.

Five Modulus Method (FMM) was firstly originated by [11]. Basically, it was founded as a method for image compression. The basic idea behind FMM is to transform the whole image into multiples of five. Since the human eye does not differentiate between the original image and the transformed FMM image [11]. It is known that, for each of the R, G, and B arrays in the color image are consist of pixel values varying from 0 to 255. The main impression of FMM is to transform the whole pixels inside the image into numbers divisible by five. Steganography algorithms concentrate on introducing as small deformation in the cover image as possible [12]. According to figure (1), it is clear that the FMM transformation does not affect the Human Visual System (HVS).

JOURNAL OF COMPUTING, VOLUME 5, ISSUE 2, FEBRUARY 2013, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

22

Fig. 1. Original image (Saif.bmp) (left) FMM image (right) 17 37 189 93 44 12 2 15 45 10 87 101 207 . 35 85 100 220 121 23 . 190 220 120 99 170 8 95 100 170 Fig. 2. Original block (left) FMM block (right) 0 205 25 10

According to figure (2), the new pixel value in the kk window will be a multiple of five as: 0, 5, 10, 20, , 100, 105, , 200, 205, 210, , 250, 255. Hence, the values that are not divisible by 5 are distinct inside kk block. Now, the good thing is that by dividing the new values by 5. A new range of values will be constructed as: 0, 1, 2, 3, , 51. Since 05=0, 55=1, 105=2, , 2505=50, 2555=51. Hence, the new range is consisting of 52 distinct values.

3.1 Window Size Determination Since the reminder of each number that is not divisible by five is either 0, 1,2,3 or 4. The zero reminder means that it is divisible by 5 while 1, 2, 3, 4 reminders means the opposite. The determination of the suitable window size is based on two concepts. The first one is that the new range values are 0..51, i.e. 52 distinct values. The second one is that the reminders of numbers that are not divisible by five are 1, 2, 3, and 4. Since the selection of window is based on the square criterion which means kk. Then, nearest number which can accommodate the 52 values is 64. But the square root of 64 is 8 which means 88 window size and that is large. Now, to reduce the large window size, the second concept which is the 1, 2, 3, and 4 reminders may be applied. Since the whole values are multiples of five, then each number that is not divisible by five will be inconsistent with the others inside window. Therefore, by dividing 64 by 4 we get 16. Subsequently, a 44 window size that contains 16 items will be suitable to accommodate the proposed algorithm. A 44 window could holds the 52 values by using a simple looping method. 3.2 Looping Method As stated in the previous section, the nearest upper integer to encompass the 52 values is 64 and also the suitable window size is 44 which contains 16 position. The new range of values 0..51 could be apportioned into four parts each one consist of 16 elements. The first part contains the first 16 values which are 0..15 (could be named as P1), while the second part varies 16..31 (P2), and the third one is 32..47 (P3). Finally, since the last range is 48..51 which consists of only four numbers but there is no doubt it need a stand alone fourth part (P4). The looping method consists of adding the suitable reminder to the pixel inside the window. If the position of the stego pixel is less than 15, i.e. in the first part (P1) then 1 may be added to its position inside block, 2 to P2, 3 to P3, and 4 to P4. TABLE 1 Arbitrary 44 windows

26 25 25 25 25 25 25 25 25 25 25 25 25 25 25 25 25 27 25 25 25 25 25 25 25 25 25 25 25 25 25 25 26 25 25 25 25 25 25 25 25 25 28 25 25 25 25 25

PROPOSED ALGORITHM

The proposed technique is based on the FMM transformation. Therefore, all the pixels inside the FMM images are all multiples of 5 only. Basically, the original pixel values are in the range 0 to 255 for each of the Red, Green, and Blue arrays. After the FMM transform, the new range is still 0 to 255 but with multiples of 5 only, i.e. 0, 5, 10, 15, , 255. The FMM method will be a pplied for both the cover and the stego images. Now, if we divide the new range by 5 we can get a simpler range that is 0, 1, 2, 51, i.e. 05=0, 2555=51. The model of the proposed stegosystem could be introduced as a scheme in figure (3).

Concerning the first 44 window, the only number that is not divisible by 5 is 26. The position of 26 is in the first index of the 44 window. The first index holds the value of 0 since P1 indexes are 0..15. Hence, stego pixel inside 26 is 05=5. The multiplication of 5 was done because the aim is to retrieve the original value which was divided by 5 previously. Moreover, in the second 44 window, the reminder of 27 is 2 when divided by 5 and this means two loops, i.e. this pixel lies in P2 where its range varies 16..31. The position of 27 in the second window using vertical tracing is 2. Therefore, the second stego pixel inside P2 is 175=85. The number 17 is the second number in the range 16..31. Finally, for the third window, the reminder of 28 is 3 which mean that it is in P3, i.e. three loops. Since

JOURNAL OF COMPUTING, VOLUME 5, ISSUE 2, FEBRUARY 2013, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

23

the range for P3 is 32...47, and its position is 11 vertically, then the stego pixel inside the third window is 415=205. The value of 41 was used as the eleventh index in the range 32..47.

which equals to 4.510192 where 128 comes from 5124 which are the total number of 44 windows in the 512512 cover image and 2 for both the horizontal and the vertical tracing.

4 PRIVATE STEGO-KEY

A stego-key is used to control the hidden information in such away that helps to recover the secret message. Stegokey encodes information in such a way that the third party cannot extract the stego image unless he holds the stego-key. A stego-key is a password, which ensures that only the recipient who knows the stego-key has the ability to extract the stego image from the cover image. FurFig. 4. Horizontal shift by seven bits (left) Vertical shift by seven bits thermore, combining the secret key with the proposed (right) algorithm makes it difficult to extract the stego image by In order to determine the direction of shifting, the starting any adversary. According to figure (4), the technique used to produce digit of the stego-key will be saved for this purpose. a stego-key is by forward shifting either horizontally or Hence, a value of zero in the first digit means that the vertically. As mentioned previously, a 44 window con- direction is horizontal while the value of one means vertitains 16 positions, therefore; by shifting the position of the cal. To illustrate this point of view, suppose the password stego pixel by n positions inside the same 4 4 window. 791432 is to be used as a stego-key for an arbitrary block The shifting procedure is done either horizontally or ver- of 44 window pixels, table (2). By adding the value of 0 tically depending on the first digit in the stego-key. Fur- to the left of the stego-key, i.e. 0791432, then a horizontal thermore, if an adversary looks forward to extract the direction will be used, table (3). On the other hand, if the stego image then he would try tremendous number of value of the first digit is 1, i.e. 1791432, this means vertical contingencies. For each 44 window there are 16 positions direction, table (4). for both the horizontal and the vertical tracing. Hence, in a 512512 image, the exact number of trials are (162)128 TABLE 2 Arbitrary block of 44 windows

21 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20 20 20

20 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20

20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 21 20 20 20 20 20 20 20 20 20 20 20 20

According to table (3), the first 44 window contains the number 21 as non divisible by 5 and that is a stego pixel. If and adversary hops to implement the proposed algorithm without the stego key, then huge number of possibilities could be tried. Alternatively, as the stego key used in table (3) is 0791432, then the first window should be

back shifted with 7 horizontal numbers. Hence, the receiver could easily extract the stego image with the help of the stego key. The same procedure could be implemented to table (4) but with vertical tracing.

JOURNAL OF COMPUTING, VOLUME 5, ISSUE 2, FEBRUARY 2013, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

24

EXPERIMENTAL RESULTS

In order to demonstrate the proposed steganography algorithm, four bitmap test images (Shaikh1.bmp, Shaikh1.bmp, Shaikh1.bmp, and Shapes.bmp) were used as cover images. Alternatively, four stego images (Stego1.bmp, Stego2.bmp, Stego3.bmp, and Stego4.bmp) were used as stego images with the previous four cover images, respectively, figure (5). As stated previously, a 44 window size was used to implement the proposed algorithm. Also, for each 44 window, one stego pixel could be embedded inside each 44 window. Hence, the maximum payload could be reached by the proposed method is always 25% for all image sizes.

(heart.bmp) 128128

Moreover, it clearly shown in table (5) that the PSNR values for both the stego and cover images are approximately high (around forties). TABLE 5

(stego1.bmp) 128128

(shaikh1.bmp) 512512

PSNR (dB) values after the stegoanalysis Shaikh1 (512512) 45.8751 Shaikh2 (10241024) 47.0648 Shaikh3 (20482048) 46.9422 Shapes (512512) 41.9158 stego1 (128128) 38.3058 stego1 (256256) 44.1497 stego1 (512512) 47.6531 Stego4 (128128) 47.9789

CONCLUSION

(stego2.bmp) 256256

(shaikh2.bmp) 10241024

In this paper, a novel steganography algorithm has been introduced. The novel algorithm based on the Five Modulus method to reduce the original pixels range from 0..255 into 0..51. The constructed stego images have no noticeable dissimilarities between the original stego images. This method also distributes the stego image uniformly in the cover image. A stego-key may also be combined with the cover image to complicate the way for any adversary who aims to extract the secret image. An error metrics, especially PSNR, have been calculated to prove that the dissimilarities between the original image and the cover images are small and that is based on the high PSNR values.

REFERENCES

[1] (stego3.bmp) 512512 [2] [3] (shaikh2.bmp) 20482048 [4] N. Johnson and S. Jajodia, Exploring Steganography: Seeing the Unseen, IEEE Computer Society, vol. 31, no. 2, pp. 26-34, 1998. H. Wang and S. Wang, Cyber warfare: Steganography vs. Steganalysis, Communications of the ACM, vol. 47, no. 10, 2004. T. Lin and J. Delp, A Review of Data Hiding in Digital Images, in Proceedings of the Image Processing, Image Quality, and Image Capture Conference, Georgia, pp. 274-278, 1999. S. Channalli and A. Jadhav, Steganography An Art of Hiding Data, International Journal on Computer Science and Engineering, vol. 1, no. 3, pp. 137-141, 2009. P. Hayati, V. Potdar, and E. Chang, A Survey of Steganographic and Steganalytic Tools for the Digital Forensic Investigator, in Workshop of Information Hiding and Digital Watermarking to be held in conjunc-

[5]

25

tion with IFIPTM, Moncton, New Brunswick, Canada, 2007. R. Chandramouli and N. Memon, Analysis of LSB based image steganography techniques, Proceedings 2001 International Conference on Image, Vol. 3, pp. 1019-1022. [7] Chang C. C., Hsiao J. Y., and Chan C. S., Finding optimal leastsignificant-bit substitution in image hiding by dynamic programming strategy, Pattern Recognition, vol. 36, pp. 1583-1595, 2003. [8] P.C. Wu and W.H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, vol. 24, pp. 16131626, 2003. [9] A. Westfeld, F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis, Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001. [10] Cachin C., An Information-Theoretic Model for Steganography, In Proceedings of the Second International Workshop on Information Hiding, D. Aucsmith, ed. vol. 1525 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, pp. 306318, 1998. [11] F.A. Jassim, "Five Modulus Method for Image Compression", Signals and Image Processing: An International Journal, vol.3, no.5, pp. 19-28, 2012. [12] J. Fridrich and M. Goljan, Digital image steganography using stochastic modulation, In: Proceedings of SPIE: Security and Watermarking of Multimedia Contents V, 2003, 5020: 191202 [6] Firas A. Jassim received the BS degree in mathematics and computer applications from Al-Nahrain University, Baghdad, Iraq in 1997, and the MS degree in mathematics and computer applications from Al-Nahrain University, Baghdad, Iraq in 1999 and the PhD degree in computer information systems from the university of banking and financial sciences, Amman, Jordan in 2012. Now, he is working as an assistant professor with the Management Information Systems Department at Irbid National University, Irbid, Jordan. His research interests are Image processing, image compression, image enhancement, image interpolation, image steganography and simulation.

- Report of Secure Data TransmissionUploaded byAsad Sarosh
- Impact of Facebook Usage on the Academic Grades: A Case StudyUploaded byJournal of Computing
- Image Steganography Project ReportUploaded byAshesh Mishra
- Steganography Using JAVAUploaded byDevendra Sharma
- Comparative Analysis of Discrete Logarithm and RSA Algorithm in Data CryptographyUploaded byijcsis
- QoS Aware Web Services Recommendations FrameworkUploaded byJournal of Computing
- Secure, Robust, and High Quality DWT Domain Audio Watermarking Algorithm with Binary ImageUploaded byJournal of Computing
- Combining shape moments features for improving the retrieval performanceUploaded byJournal of Computing
- Towards A Well-Secured Electronic Health Record in the Health CloudUploaded byJournal of Computing
- NSC December 2014 Assignment Marking Scheme - FinalUploaded byMM PP
- Image Retrival of Domain Name system Space Adjustment TechniqueUploaded byJournal of Computing
- Application of DSmT-ICM with Adaptive decision rule to supervised classification in multisource remote sensingUploaded byJournal of Computing
- Ijret - Psnr Value of Digital Image Watermarking by Using Singular Value Decomposition-discrete Cosine TransformationUploaded byInternational Journal of Research in Engineering and Technology
- Audio Watermarking in Image by Using Radon – Wavelet TransformsUploaded byJournal of Telecommunications
- Detection of Retinal Blood Vessel using Kirsch algorithmUploaded byJournal of Computing
- Project Report- SteganographyUploaded byHimanshu Prakash Pal
- SVD and Lifting Wavelet Based Fragile Image WatermarkingUploaded byIDES
- V1I101Uploaded byeditor_ijarcsse
- Information HidingUploaded byAnastasiya Alexandrova
- A Novel Data Embedding Technique for Hiding Text in Video File Using SteganographyUploaded byIndra Prasetyo Bintoro
- l 028090095Uploaded byInternational Journal of computational Engineering research (IJCER)
- 9781df00d4a9d593e395fd1eaf9b2ea29d53Uploaded byphani
- Moving Steganography and Steganalysis From the Laboratory Into the Real World,2013Uploaded bysooshky
- IJCERT JOURNALSUploaded byIJCERT PUBLICATIONS
- V3I6201499a33.pdfUploaded byArjun
- Implementation of Audio Watermarking algorithm based on embedding strategy in high frequency sub-band with binary sequence using DWT-FFTUploaded byIJAR Journal
- Embedding and Extraction Techniques for Medical Images-Issues and ChallengesUploaded byCS & IT
- Visual+CryptographyUploaded byTAhmedCS
- Summer TrainingUploaded byAshish Kapoor
- Overview - KupcuUploaded bydreamka12

- When Do Refactoring Tools Fall ShortUploaded byJournal of Computing
- Hybrid Network Coding Peer-to-Peer Content DistributionUploaded byJournal of Computing
- Applying a natural intelligence pattern in cognitive robotsUploaded byJournal of Computing
- Mobile Search Engine Optimization (Mobile SEO): Optimizing Websites for Mobile DevicesUploaded byJournal of Computing
- Divide and Conquer For Convex HullUploaded byJournal of Computing
- Business Process: The Model and The RealityUploaded byJournal of Computing
- Complex Event Processing - A SurveyUploaded byJournal of Computing
- A Compact Priority based Architecture Designed and Simulated for Data Sharing based on Reconfigurable ComputingUploaded byJournal of Computing
- Product Lifecycle Management Advantages and ApproachUploaded byJournal of Computing
- Using case-based decision support systems for accounting choices (CBDSS): an experimental investigationUploaded byJournal of Computing
- Image Retrival of Domain Name system Space Adjustment TechniqueUploaded byJournal of Computing
- Energy Efficient Routing Protocol Using Local Mobile Agent for Large Scale WSNsUploaded byJournal of Computing
- Exploring leadership role in GSD: potential contribution to an overall knowledge management strategyUploaded byJournal of Computing
- Decision Support Model for Selection of Location Urban Green Public Open SpaceUploaded byJournal of Computing
- Analytical Study of AHP and Fuzzy AHP TechniquesUploaded byJournal of Computing
- Detection and Estimation of multiple far-field primary users using sensor array in Cognitive Radio NetworksUploaded byJournal of Computing
- K-Means Clustering and Affinity Clustering based on Heterogeneous Transfer LearningUploaded byJournal of Computing
- QoS Aware Web Services Recommendations FrameworkUploaded byJournal of Computing
- Real-Time Markerless Square-ROI Recognition based on Contour-Corner for Breast AugmentationUploaded byJournal of Computing
- Towards A Well-Secured Electronic Health Record in the Health CloudUploaded byJournal of Computing
- Combining shape moments features for improving the retrieval performanceUploaded byJournal of Computing
- Predicting Consumers Intention to Adopt M-Commerce Services: An Empirical Study in the Indian ContextUploaded byJournal of Computing
- Application of DSmT-ICM with Adaptive decision rule to supervised classification in multisource remote sensingUploaded byJournal of Computing
- Secure, Robust, and High Quality DWT Domain Audio Watermarking Algorithm with Binary ImageUploaded byJournal of Computing
- Detection of Retinal Blood Vessel using Kirsch algorithmUploaded byJournal of Computing
- Impact of Software Project Uncertainties over Effort Estimation and their Removal by Validating Modified General Regression Neural Network ModelUploaded byJournal of Computing
- Arabic documents classification using fuzzy R.B.F classifier with sliding windowUploaded byJournal of Computing
- Overflow Detection Scheme in RNS Multiplication Before Forward ConversionUploaded byJournal of Computing

- Core Impact Wifi ReportUploaded bySachin Kushwaha
- Upload a Document _ ScribdUploaded byfdggd
- gueldenbUploaded bydikpalak
- Causal Lt i Systems 03Uploaded byYeong Ming Keat
- FEM-VOFUploaded bykhabiran
- Numerical Methods for Unconstrained Optimization and Nonlinear Equations Classics in Applied MathematicsUploaded bymohammad_albooyeh
- Network Security University QP 2 Mark Questions and AnswersUploaded bypriyajega
- Artificial Intelligence ProblemsUploaded byAnik
- GreyAtom FSDSE Brochure.pdfUploaded bymoronkreacionz
- Numerical Hyperbolic SystemsUploaded byIésus Sousa Freire
- World Best Roulette SystemUploaded bybaksownet
- Elmore Delay ModelUploaded byDeep Saxena
- ccUploaded byferdi tayfun
- one step inequalities.pdfUploaded byKhushi Amin
- Comp 128Uploaded byanassanass
- EURO_Lisbon_XXIV_Presentation.pdfUploaded byflopezr81
- ThermoUploaded byfauziputra
- Assignment 4Uploaded by123fake
- A Tutorial on Adaptive MCMCUploaded byUğur Şevik
- Support Vector Machines with MatlabUploaded byresplandor
- Survey ReportUploaded byGilbert Shih
- Extended Kalman Filter PDFUploaded byAngela
- Signal Processing Elements and SoftwareUploaded byArtono Dwijo Sutomo
- SSL Architecture.pptUploaded byEswin Angel
- 2.2. A tutorial on statistical-learning for scientific data processing — scikit-learn 0.13Uploaded byMarko Aleksendrić
- Algorithms Examples SheetUploaded byfuntime_in_life2598
- Mech SNL 16.0 L01 OverviewUploaded byPercy Romero Murillo
- ssUploaded byandhracolleges
- Part8 Ch3 RaidUploaded byhimanshu_agra
- LAFF-NLAUploaded byDennis Chen

## Much more than documents.

Discover everything Scribd has to offer, including books and audiobooks from major publishers.

Cancel anytime.