NUMB3RS Activity: Coded Messages. Episode: The Mole

Similar documents
Note: Please use the actual date you accessed this material in your citation.

Aim: How can we use Matrices to code and decode a message?

WATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak

EECS 270 Midterm 2 Exam Closed book portion Fall 2014

Proceedings of the Third International DERIVE/TI-92 Conference

An Introduction to Cryptography

Chrominance Subsampling in Digital Images

FPGA Laboratory Assignment 4. Due Date: 06/11/2012

Math Final Exam Practice Test December 2, 2013

Sherlock Holmes and the adventures of the dancing men

MATH& 146 Lesson 11. Section 1.6 Categorical Data

Chapter 2: Lines And Points

G.709 FEC testing Guaranteeing correct FEC behavior

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

Quantitative Evaluation of Pairs and RS Steganalysis

18-551, Spring Group #4 Final Report. Get in the Game. Nick Lahr (nlahr) Bryan Murawski (bmurawsk) Chris Schnieder (cschneid)

1/29/2008. Announcements. Announcements. Announcements. Announcements. Announcements. Announcements. Project Turn-In Process. Quiz 2.

Announcements. Project Turn-In Process. Project 1A: Project 1B. and URL for project on a Word doc Upload to Catalyst Collect It

CSE 166: Image Processing. Overview. Representing an image. What is an image? History. What is image processing? Today. Image Processing CSE 166

Announcements. Project Turn-In Process. and URL for project on a Word doc Upload to Catalyst Collect It

On Your Own. Applications. Unit 2. ii. The following are the pairs of mutual friends: A-C, A-E, B-D, C-D, and D-E.

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Homework Packet Week #5 All problems with answers or work are examples.

Grove - OLED Display 1.12"

Audio Compression Technology for Voice Transmission

Video compression principles. Color Space Conversion. Sub-sampling of Chrominance Information. Video: moving pictures and the terms frame and

Snapshot. Sanjay Jhaveri Mike Huhs Final Project

Algebra I Module 2 Lessons 1 19

Part 1: Introduction to Computer Graphics

Lecture 18: Exam Review

2 Select the magic wand tool (M) in the toolbox. 3 Click the sky to select that area. Add to the. 4 Click the Quick Mask Mode button(q) in

NENS 230 Assignment #2 Data Import, Manipulation, and Basic Plotting

Mathematics Curriculum Document for Algebra 2

A Layered Approach for Watermarking In Images Based On Huffman Coding

A Fast Constant Coefficient Multiplier for the XC6200

WINGS TO YOUR THOUGHTS..

Import and quantification of a micro titer plate image

Implementation of an MPEG Codec on the Tilera TM 64 Processor

1/ 19 2/17 3/23 4/23 5/18 Total/100. Please do not write in the spaces above.

Grade 7/8 Math Circles November 27 & 28 & Symmetry and Music

A NUMERIC COMPRESSION ALGORITHM FOR THE HP PRIME CALCULATOR DR. JACKIE F. WOLDERING HHC SEPT , 2015 NASHVILLE, TN.

CS302 Digital Logic Design Solved Objective Midterm Papers For Preparation of Midterm Exam

Computer Vision for HCI. Image Pyramids. Image Pyramids. Multi-resolution image representations Useful for image coding/compression

Bar Codes to the Rescue!

Getting Started. Connect green audio output of SpikerBox/SpikerShield using green cable to your headphones input on iphone/ipad.

Patterns Manual September 16, Main Menu Basic Settings Misc. Patterns Definitions

Light Emitting Diodes (LEDs)

Fully Pipelined High Speed SB and MC of AES Based on FPGA

Taking Control of Your TV

Video coding standards

Table of content. Table of content Introduction Concepts Hardware setup...4

The BAT WAVE ANALYZER project

Defining and Labeling Circuits and Electrical Phasing in PLS-CADD

8/30/2010. Chapter 1: Data Storage. Bits and Bit Patterns. Boolean Operations. Gates. The Boolean operations AND, OR, and XOR (exclusive or)

1 Rovi DTA Guide User Manual for SD and HD DTAs. Copyright 2014 Rovi Corporation

User s Manual. Log Scale (/LG) GX10/GX20/GP10/GP20/GM10 IM 04L51B01-06EN. 2nd Edition

TI-Inspire manual 1. Real old version. This version works well but is not as convenient entering letter

LFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM

CHECKPOINT 2.5 FOUR PORT ARBITER AND USER INTERFACE

Practice Task: The Sieve of Eratosthenes

MODULE 3. Combinational & Sequential logic

Extra long-range RFID (proximity) card reader

EXPERIMENT 8 Medium Scale Integration (MSI) Logic Circuits

AL37219C-EVB-A2 Evaluation Board

Arduino Hacking Village THOTCON 0x9

KRS-V7A Programming Software for the Kenwood TM-V7A

Review. What about images? What about images? Slides04 - RGB-Pixels.key - September 22, 2015

MUHAMMAD NAEEM LATIF MCS 3 RD SEMESTER KHANEWAL

7thSense Design Delta Media Server

Normalization Methods for Two-Color Microarray Data

Programmer s Reference

How to use the NATIVE format reader Readmsg.exe

Update to 8 June 2011 Press Release

Digital Image and Fourier Transform

WCS-D800 Programming Software for the Icom ID-800

Cedits bim bum bam. OOG series

Optimum Composite Field S-Boxes Aimed at AES

Package spotsegmentation

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

WCS-V82 Programming Software for the Icom IC-V82

CHAPTER 7 BASIC GRAPHICS, EVENTS AND GLOBAL DATA

INFplus User Documentation

Large Amount of Data GIF Image Encryption with High Security using Path-based Animation

User s Manual. Log Scale (/LG) GX10/GP10/GX20/GP20 IM 04L51B01-06EN. 1st Edition

Comparing Areas of Rectangles

Transform Coding of Still Images

DICOM medical image watermarking of ECG signals using EZW algorithm. A. Kannammal* and S. Subha Rani

Daily use, 6 How to bring up and use the menus on the screen. First-time setup, 15 See what the first-time setup sequence consists of.

Release Notes for LAS AF version 1.8.0

Research Article. ISSN (Print) *Corresponding author Shireen Fathima

Data Representation. signals can vary continuously across an infinite range of values e.g., frequencies on an old-fashioned radio with a dial

Biopac Student Lab Lesson 9 ELECTRODERMAL ACTIVITY & POLYGRAPH Analysis Procedure. Rev

accompanist's that may share the same name and allow you to select the correct accompanist.

QuasarBrite Dot Matrix LED Display

Image Steganalysis: Challenges

Quiz #4 Thursday, April 25, 2002, 5:30-6:45 PM

Writing maths, from Euclid to today

User Manual. LPA_Tool. Prepared by: Customer Support. Date: November 25, 1999 WaveRider Document N o.: LPA_Tool User Manual_V2-0.

KRAMER ELECTRONICS LTD. USER MANUAL

Steganographic Technique for Hiding Secret Audio in an Image

Transcription:

Teacher Page 1 : Coded Messages Topic: Inverse Matrices Grade Level: 10-11 Objective: Students will learn how to apply inverse matrix multiplication to the coding of values. Time: 15 minutes Materials: TI-83 Plus/TI-84 Plus graphing calculator Introduction In The Mole, the FBI discovers that a suspect downloaded a number of images off the Internet. Charlie points out that the NSA has discovered groups like al-qaeda and Hezbollah hide messages in photographs through a process called steganography. On a computer screen, a picture is made up of a series of thousands of dots and bytes, and not every single byte is needed to make the picture. A coded message can easily be hidden in the unused parts of the image. Discuss with Students For the main activity, students should already be familiar with matrix multiplication. An example is given below, in case a review is needed. 7 9 12 1 2 3 1(7) 2(0) 3(8) 1(9) 2(10) 3(11) 1(12) 2(13) 3(14) 0 10 13 + + + + + + 4 5 6 = 4(7) + 5(0) + 6(8) 4(9) + 5(10) + 6(11) 4(12) + 5(13) + 6(14) 8 11 14 31 62 80 = 76 152 167 Remind students of the following matrix properties. Matrix multiplication is not commutative (i.e., AB is not necessarily equal to BA) To multiply matrices A and B, the number of columns in A must equal the number of rows in B. To illustrate this, reverse the multiplication with the above matrices. In the activity, students will use their calculators to do most of the computations. The guide below gives a quick overview of how to manipulate matrices on the calculator. 1. 2. 3. To enter a matrix A, press ` ù, go to the EDIT menu, and select 1:[A]. Enter the number of rows and columns. Then input the entries of the matrix. To multiply two matrices from the home screen, press ` ù and from the NAMES menu, select the appropriate matrices.

Teacher Page 2 Students may not be aware that some matrices do not have inverse. In order for a matrix to have an inverse, its determinant cannot equal 0. For example, the matrix 3 2 3 2 does not have an inverse, because 6 4 det = 3(4) 6(2) = 0 6 4. Student Page Answers: 9 9 1 0 3 1. 2. 23 15 9 3 1 3. The identity matrix 1 0 0 1. 4. The matrix itself. This is the matrix version of the identity property of multiplication. 5.

Student Page 1 Name: Date: : Coded Messages In The Mole, the FBI discovers that a suspect downloaded a number of images off the Internet. Charlie points out that the NSA has discovered groups like al-qaeda and Hezbollah hide messages in photographs through a process called steganography. On a computer screen, a picture is made up of a series of thousands of dots and bytes, and not every single byte is needed to make the picture. A coded message can easily be hidden in the unused parts of the image. How does this work? Every bitmap picture viewed on a computer is made up of thousands of very small squares called pixels, as shown in the picture below. [Source: http://www.prepressure.com/image/formatbitmap.jpg] The computer views these pixels as numbers, not colors. For example, the pixilated image above could be translated into the values below:..................... 14 8 7 8 14 12... 7 6 12 8 6 7... 4 4 4 3 12 14... Someone sending a secrete message as a picture could use encryption through matrix multiplication. 3 2 1. To encrypt matrix A = with the encryption matrix E = 5 6 1 3 3 0, find AE. The obtained result is the message sent to the receiver. The receiver now needs to decode and read the message. This decrypting involves the inverse matrix.

Student Page 2 For a 2 2 matrix a c b d its inverse is calculated 1 d b ad bc c a. 2. Calculate the inverse of the encryption matrix from Question 1, 1 3 3 0. 3. Multiply this inverse matrix by the original encryption matrix. What is the result? This answer to Question 3 is called the identity matrix. This matrix is the key to finding the inverse of a matrix. 4. Multiply any 2 2 matrix by the answer from Question 3. What is the result? 5. There are many ways to calculate the inverse of a matrix larger than 2 2. For this activity, you will use your calculator to find the inverse. Suppose the following message and encryption key were just intercepted. Using your calculator, multiply the inverse of the encryption key by the intercepted message and decode the picture using the color values below. 0 Black 1 Red-Brown 2 Green 3 Brown-Green 4 Dark Blue 5 Purple 6 Blue-Green 7 Dark Gray 8 Light Gray 9 Orange-Red 10 Vivid Green 11 Yellow 12 Blue 13 Pink-Purple 14 Light Blue 15 White 29 28 32 37 25 29 20 44 58 47 62 45 44 25 34 38 42 47 35 39 25 44 58 47 62 45 44 25 29 28 32 37 25 29 20 Intercepted Message 0 1 2 0 0 1 1 1 2 0 1 1 0 1 1 0 1 1 0 0 1 1 0 0 1 1 1 0 1 0 2 1 0 1 2 2 4 1 3 2 1 0 0 0 2 1 1 2 0 Encryption key Decoded Picture Now, reverse roles encrypt your own message and send it to another graphing calculator.

Student Page 3 Color the grid below with a picture to encrypt. Use the color codes from the previous page to store the image as matrix A. Store the encryption matrix at the right below as matrix B. 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 1. 2. 3. To encode the picture matrix A with the encryption matrix B, find AB. Store the result as a matrix different from your neighbor by pressing the = key and selecting a matrix from the matrix menu. To send this coded message to your neighbor s calculator, make sure both calculators are connected with the unit-to-unit cable. On the calculator receiving the matrix, press ` ó, go to the RECEIVE menu, and press e 4. 5. On the calculator sending the matrix, press ` ó, go to the SEND menu, and select 8:Matrix Select the coded matrix, press e, and select TRANSMIT to send. You neighbor will now send an encrypted matrix to you. To decode the encoded matrix, multiply the inverse of the encryption matrix by the encoded matrix. Using the decoded matrix, color the squares to the right based on the color coding used earlier. Check with your neighbor if you decoded it correctly.

The goal of this activity is to give your students a short and simple snapshot into a very extensive math topic. TI and NCTM encourage you and your students to learn more about this topic using the extensions provided below and through your own independent research Extensions Activity: Finding the Inverse Matrix by the Adjoint Method Introduction Two common methods for finding the inverse of a matrix are Gauss-Jordan and the Adjoint method. The Adjoint method is described below. To find A 1, calculate A ( adj A) =, where adj A is the transpose of the cofactor matrix of A. det A 1 1 Example: Given 1 2 3 A = 1 3 2 find A 1. 3 0 3 Step 1: Find the cofactor matrix of A. This is found by replacing each cell in matrix A with its minor and imposing an alternating negative sign. Step 2: Find the transpose of the cofactor matrix. To do this, interchange the rows and columns of the matrix. This means make the columns into rows. Step 3: To find A 1, multiply the transposed 1 matrix by det A 3 2 1 2 1 3 0 3 3 3 3 0 9 3 9 2 3 1 3 1 2 = 6 6 6 0 3 3 3 3 0 5 1 1 2 3 1 3 1 2 3 2 1 2 1 3 9 6 5 3 6 1 9 6 1 3 1 5 9 6 5 4 2 12 1 1 1 1 3 6 1 12 = 4 2 12 9 6 1 3 1 1 4 2 12 Additional Resources The actual images used in the NUMB3RS episode were JPEG images (not bitmaps). The different methods of steganography for JPEG images can be found at the Web site http://www.guillermito2.net/stegano/jsteg/index.html. To learn a different technique of using steganography to disguise a message, see the NUMB3RS activity Now You See It. This activity can be downloaded for free by going to http://education.ti.com/exchange and searching for 6213. To learn more on multiplying matrices, see the NUMB3RS activity Settling the Score. This activity can be downloaded for free by going to http://education.ti.com/exchange and searching for 6809.