首页 > 最新文献

2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing最新文献

英文 中文
A New Perspective on Hole Generation and Filling in DIBR Based View Synthesis 基于DIBR的视图合成中孔洞生成与填充的新视角
Ce Zhu, Shuai Li
Depth-image-based rendering (DIBR) technique is widely used to synthesize virtual views in many applications including multiview and free viewpoint video systems. In view of disocclusion problem in the view synthesis, the disoccluded regions known as holes in the virtual view need to be dealt with properly to generate a synthesized view of high quality. This paper first investigates the generation of holes in view interpolation and reveals concretely under what conditions the holes will appear. Accordingly a novel hole-filling method is proposed by fully utilizing the occlusion information. The proposed scheme can effectively locate the relevant background pixels including those occluded around the hole and make use of integrated background information in the hole filling. Experimental results show that our proposed approach demonstrates superior performance in terms of visual quality of the synthesized view.
深度图像渲染技术在多视点和自由视点视频系统中被广泛应用于虚拟视图的合成。针对视图合成中的咬合问题,需要对虚拟视图中被称为孔洞的咬合区域进行适当处理,以生成高质量的合成视图。本文首先研究了视点插值中孔洞的产生,并具体揭示了孔洞在什么条件下会出现。据此,提出了一种充分利用遮挡信息的补孔方法。该方案能够有效地定位相关背景像素,包括被遮挡在孔周围的背景像素,并利用综合背景信息进行补孔。实验结果表明,我们的方法在合成视图的视觉质量方面表现出优异的性能。
{"title":"A New Perspective on Hole Generation and Filling in DIBR Based View Synthesis","authors":"Ce Zhu, Shuai Li","doi":"10.1109/IIH-MSP.2013.156","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.156","url":null,"abstract":"Depth-image-based rendering (DIBR) technique is widely used to synthesize virtual views in many applications including multiview and free viewpoint video systems. In view of disocclusion problem in the view synthesis, the disoccluded regions known as holes in the virtual view need to be dealt with properly to generate a synthesized view of high quality. This paper first investigates the generation of holes in view interpolation and reveals concretely under what conditions the holes will appear. Accordingly a novel hole-filling method is proposed by fully utilizing the occlusion information. The proposed scheme can effectively locate the relevant background pixels including those occluded around the hole and make use of integrated background information in the hole filling. Experimental results show that our proposed approach demonstrates superior performance in terms of visual quality of the synthesized view.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115223166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Image Encryption Using Arnold Transform Technique and Hartley Transform Domain 基于Arnold变换和Hartley变换域的图像加密
K. Lin
This paper proposes an image encryption method to encrypt a covert image by combining the Arnold transform technique in the space domain and the Hartley transform method in the frequency domain. First, transform a covert image into form eight binary images by decimal value to eight-digit binary operation. Then, transform eight binary images into form eight binary scrambled images by the Arnold transform, respectively. And then, recombine the sequence of the eight binary scrambled matrices into a scrambled matrix with 256 gray levels according to the specific order. Finally, derive an encrypted image from the scrambled image by the Hartley transform. Simulations show that the proposed method has higher image scrambling degree, more security and has robustness against occlusion and salt & pepper noise attacks.
本文提出了一种结合空间域的Arnold变换技术和频域的Hartley变换方法对隐蔽图像进行加密的图像加密方法。首先,将隐蔽图像通过十进制值到八位数二进制运算转换成八张二值图像。然后,分别用Arnold变换将8张二值图像变换成8张二值置乱图像。然后,将8个二进制置乱矩阵的序列按照特定的顺序重新组合成256个灰度级的置乱矩阵。最后,通过哈特利变换从置乱后的图像中得到加密图像。仿真结果表明,该方法具有较高的图像置乱度和安全性,对遮挡和椒盐噪声攻击具有鲁棒性。
{"title":"Image Encryption Using Arnold Transform Technique and Hartley Transform Domain","authors":"K. Lin","doi":"10.1109/IIH-MSP.2013.30","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.30","url":null,"abstract":"This paper proposes an image encryption method to encrypt a covert image by combining the Arnold transform technique in the space domain and the Hartley transform method in the frequency domain. First, transform a covert image into form eight binary images by decimal value to eight-digit binary operation. Then, transform eight binary images into form eight binary scrambled images by the Arnold transform, respectively. And then, recombine the sequence of the eight binary scrambled matrices into a scrambled matrix with 256 gray levels according to the specific order. Finally, derive an encrypted image from the scrambled image by the Hartley transform. Simulations show that the proposed method has higher image scrambling degree, more security and has robustness against occlusion and salt & pepper noise attacks.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116004724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes 一种基于循环码的防作弊块秘密共享方案
Xing-Fu Xu, Daoshun Wang, Shundong Li, Ching-Nung Yang
In secret sharing, cheaters may reconstruct and recover the secret by providing faked shares, but the honest participants get no information about it. The anti-cheating secret sharing scheme can detect cheating and identify cheaters, so that it can effectively resist cheating attacks. In this paper, we construct a Cyclic Codes-based (k, n)-block secret sharing scheme against cheating. If there are more than k participants reconstructing the secret, we can detect cheating and identify cheaters. We discuss the relationship between the length of the secret block and the computational complexity, the length of the secret block and the storage space. Also, we give the upper bound of the number of identifiable cheaters. When there are no fewer than k honest participants, we can identify all cheaters.
在秘密共享中,骗子可以通过提供虚假的股份来重建和恢复秘密,但诚实的参与者无法获得有关秘密的信息。反作弊秘密共享方案可以检测作弊行为,识别作弊者,从而有效抵御作弊攻击。本文构造了一个基于循环码的(k, n)块秘密共享方案。如果有超过k个参与者在重构这个秘密,我们就可以检测出作弊行为并识别出作弊者。讨论了秘密块长度与计算复杂度、秘密块长度与存储空间的关系。同时,我们给出了可识别作弊者数目的上界。当诚实参与者不少于k人时,我们可以识别出所有的作弊者。
{"title":"An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes","authors":"Xing-Fu Xu, Daoshun Wang, Shundong Li, Ching-Nung Yang","doi":"10.1109/IIH-MSP.2013.99","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.99","url":null,"abstract":"In secret sharing, cheaters may reconstruct and recover the secret by providing faked shares, but the honest participants get no information about it. The anti-cheating secret sharing scheme can detect cheating and identify cheaters, so that it can effectively resist cheating attacks. In this paper, we construct a Cyclic Codes-based (k, n)-block secret sharing scheme against cheating. If there are more than k participants reconstructing the secret, we can detect cheating and identify cheaters. We discuss the relationship between the length of the secret block and the computational complexity, the length of the secret block and the storage space. Also, we give the upper bound of the number of identifiable cheaters. When there are no fewer than k honest participants, we can identify all cheaters.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116539262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clock Difference Prediction of Atomic Clock Based on Support Vector Machine 基于支持向量机的原子钟钟差预测
Wu Wenjuan, Z. Jiangmiao
The atomic clock device is complicated, and its operation is influenced by a lot of factors, so the date has certain randomness. Predicting atomic clock data by appropriate algorithm is the important step of atomic clock data processing. This article chooses SVM algorithm to predict clock differences, and processed the real atomic clock data, compared relative error with the prediction results and the results of linear regression algorithm, the prediction algorithm based on SVM is effective.
由于原子钟装置复杂,其运行受很多因素的影响,因此其日期具有一定的随机性。用合适的算法预测原子钟数据是原子钟数据处理的重要步骤。本文选择SVM算法进行时钟差预测,并对真实原子钟数据进行处理,将预测结果的相对误差与线性回归算法的预测结果进行比较,表明基于SVM的预测算法是有效的。
{"title":"Clock Difference Prediction of Atomic Clock Based on Support Vector Machine","authors":"Wu Wenjuan, Z. Jiangmiao","doi":"10.1109/IIH-MSP.2013.46","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.46","url":null,"abstract":"The atomic clock device is complicated, and its operation is influenced by a lot of factors, so the date has certain randomness. Predicting atomic clock data by appropriate algorithm is the important step of atomic clock data processing. This article chooses SVM algorithm to predict clock differences, and processed the real atomic clock data, compared relative error with the prediction results and the results of linear regression algorithm, the prediction algorithm based on SVM is effective.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122355936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Prostate Cancer Detection Using Blood Flow Information in Power Doppler Ultrasonography 利用功率多普勒超声血流信息自动检测前列腺癌
Chuan-Yu Chang, Ching-Fong You, Y. Tsai
Compared with the benign prostate, the malignant prostate has higher peak systolic velocity, lower end diastolic velocity and resistance index. In these blood flow information, the end diastolic velocity is more consistent and significant. In this paper, an automatic prostate cancer detection using blood flow information in power Doppler ultrasonography is proposed. The prostate region was segmented semi-automatically by the active contour model. The average velocity, resistance index and end diastolic velocity obtained from left and right peripheral zone were combined to form a feature vector. Accordingly, a support vector machine is used to classify the prostate as malignant or benign. Experimental results demonstrate the effectiveness of the proposed approach.
与良性前列腺相比,恶性前列腺具有较高的峰值收缩速度、较低的舒张末期速度和阻力指数。在这些血流信息中,舒张末期速度更为一致和显著。本文提出了一种利用功率多普勒超声血流信息自动检测前列腺癌的方法。采用活动轮廓模型对前列腺区域进行半自动分割。将左、右外周区的平均流速、阻力指数和舒张末期流速组合成特征向量。因此,使用支持向量机对前列腺进行恶性或良性分类。实验结果证明了该方法的有效性。
{"title":"Automatic Prostate Cancer Detection Using Blood Flow Information in Power Doppler Ultrasonography","authors":"Chuan-Yu Chang, Ching-Fong You, Y. Tsai","doi":"10.1109/IIH-MSP.2013.131","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.131","url":null,"abstract":"Compared with the benign prostate, the malignant prostate has higher peak systolic velocity, lower end diastolic velocity and resistance index. In these blood flow information, the end diastolic velocity is more consistent and significant. In this paper, an automatic prostate cancer detection using blood flow information in power Doppler ultrasonography is proposed. The prostate region was segmented semi-automatically by the active contour model. The average velocity, resistance index and end diastolic velocity obtained from left and right peripheral zone were combined to form a feature vector. Accordingly, a support vector machine is used to classify the prostate as malignant or benign. Experimental results demonstrate the effectiveness of the proposed approach.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122881225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vision Assisted Active Safety System for Vehicles on the Highway 公路车辆视觉辅助主动安全系统
Chuan-Chun Ku, C. Young, Chih-Hung Lin
Active safety is an important feature of a modern vehicle to provide precautions, warnings or compensatory control before the pre-crash stage of vehicle safety. This paper introduces a vision-based automatic system to detect lane changing and car distance, which use a CCD Camera to capture the vehicle and road image on a PAC DSP board. The algorithm uses multiple image features, such as edges, gradient, vehicle symmetry property, and Hough Transform to detect the Vanishing Point. Some experimental results based on real world video images have been presented, these seem to indicate that the algorithm is capable of identifying a front vehicle and estimating its distance from the host vehicle.
主动安全是现代车辆在碰撞前阶段提供预防、警告或补偿性控制的重要特征。本文介绍了一种基于视觉的变道和车距自动检测系统,该系统利用CCD摄像机在PAC DSP板上采集车辆和道路图像。该算法利用图像的边缘、梯度、车辆对称性和霍夫变换等多种特征来检测消失点。一些基于真实世界视频图像的实验结果表明,该算法能够识别前方车辆并估计其与主车辆的距离。
{"title":"Vision Assisted Active Safety System for Vehicles on the Highway","authors":"Chuan-Chun Ku, C. Young, Chih-Hung Lin","doi":"10.1109/IIH-MSP.2013.127","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.127","url":null,"abstract":"Active safety is an important feature of a modern vehicle to provide precautions, warnings or compensatory control before the pre-crash stage of vehicle safety. This paper introduces a vision-based automatic system to detect lane changing and car distance, which use a CCD Camera to capture the vehicle and road image on a PAC DSP board. The algorithm uses multiple image features, such as edges, gradient, vehicle symmetry property, and Hough Transform to detect the Vanishing Point. Some experimental results based on real world video images have been presented, these seem to indicate that the algorithm is capable of identifying a front vehicle and estimating its distance from the host vehicle.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129570581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fuzzy Enhancement Method for Transmission Line Image Based on Genetic Algorithm 基于遗传算法的传输线图像模糊增强方法
Xiaolin Zhou, Guangmin Sun, Dequn Zhao, Zhimeng Wang, Li Gao, Xiaomeng Wang, Yufeng Jin
An improved image enhancement algorithm based on genetic algorithm has been presented and applied for transmission line image processing in this paper, in which fuzziness is served as the optimization method of the image enhancement procedure. Because the complexity and uncertainty of the image itself, fuzzy theory has been used in the image processing. In this process, the parameters of the transformation function are found by the genetic algorithm. Thus, a new kind of image enhancement method is proposed by combining fuzzy theory with the genetic algorithm. Finally, compared with the traditional image enhancement methods, the method presented in this paper is better in performance.
本文提出了一种改进的基于遗传算法的图像增强算法,并将其应用于传输线图像处理中,该算法将模糊性作为图像增强过程的优化方法。由于图像本身的复杂性和不确定性,模糊理论被应用到图像处理中。在此过程中,通过遗传算法找到变换函数的参数。为此,提出了一种将模糊理论与遗传算法相结合的图像增强方法。最后,与传统的图像增强方法相比,本文提出的方法具有更好的性能。
{"title":"A Fuzzy Enhancement Method for Transmission Line Image Based on Genetic Algorithm","authors":"Xiaolin Zhou, Guangmin Sun, Dequn Zhao, Zhimeng Wang, Li Gao, Xiaomeng Wang, Yufeng Jin","doi":"10.1109/IIH-MSP.2013.64","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.64","url":null,"abstract":"An improved image enhancement algorithm based on genetic algorithm has been presented and applied for transmission line image processing in this paper, in which fuzziness is served as the optimization method of the image enhancement procedure. Because the complexity and uncertainty of the image itself, fuzzy theory has been used in the image processing. In this process, the parameters of the transformation function are found by the genetic algorithm. Thus, a new kind of image enhancement method is proposed by combining fuzzy theory with the genetic algorithm. Finally, compared with the traditional image enhancement methods, the method presented in this paper is better in performance.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129364043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Efficient Reversible Data Hiding Scheme Based on Reference Pixel and Block Selection 一种基于参考像素和块选择的高效可逆数据隐藏方案
Siren Cai, Xinlu Gui
In this paper, we propose an efficient data hiding scheme based on reference pixel and block selection to further improve the embedding performance of histogram shifting. Specifically, we first divide the original image into non-overlapping blocks of an adjustable size. Then for each block, we assign the median of pixels as the reference pixel and the number of pixels equal to the reference value as the smooth level. In this way, difference histograms for each smooth level can be constructed. We embed the secret data using histogram shifting from the highest level histogram to lower level ones instead of sequential embedding. By this means, our proposed reversible data hiding scheme can adaptively embed data in the smooth blocks and thus improve the marked image quality with a comparable embedding capacity. The experimental results also demonstrate its superiority over some state-of-the-art reversible data hiding works.
为了进一步提高直方图移位的嵌入性能,本文提出了一种基于参考像素和块选择的高效数据隐藏方案。具体来说,我们首先将原始图像划分为大小可调的非重叠块。然后,对于每个块,我们将像素的中位数作为参考像素,并将与参考值相等的像素数作为平滑水平。这样,就可以构造每个平滑层的差异直方图。我们采用直方图从最高直方图向较低直方图移位的方法来嵌入秘密数据,而不是采用顺序嵌入的方法。通过这种方法,我们提出的可逆数据隐藏方案可以自适应地将数据嵌入到平滑块中,从而在具有相当嵌入容量的情况下提高标记图像的质量。实验结果也证明了该方法相对于一些现有的可逆数据隐藏方法的优越性。
{"title":"An Efficient Reversible Data Hiding Scheme Based on Reference Pixel and Block Selection","authors":"Siren Cai, Xinlu Gui","doi":"10.1109/IIH-MSP.2013.147","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.147","url":null,"abstract":"In this paper, we propose an efficient data hiding scheme based on reference pixel and block selection to further improve the embedding performance of histogram shifting. Specifically, we first divide the original image into non-overlapping blocks of an adjustable size. Then for each block, we assign the median of pixels as the reference pixel and the number of pixels equal to the reference value as the smooth level. In this way, difference histograms for each smooth level can be constructed. We embed the secret data using histogram shifting from the highest level histogram to lower level ones instead of sequential embedding. By this means, our proposed reversible data hiding scheme can adaptively embed data in the smooth blocks and thus improve the marked image quality with a comparable embedding capacity. The experimental results also demonstrate its superiority over some state-of-the-art reversible data hiding works.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124172747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Texture Classification Based on Motion Statistical Feature Matrix 基于运动统计特征矩阵的动态纹理分类
Yulong Qiao, Ying Zhao, Xianrui Song
Dynamic texture is an extension of texture to the spatio-temporal domain. The motion property is one of the most important characteristics in dynamic texture analysis. This paper proposes a dynamic texture classification method based on the block-based motion estimation method and the statistical feature matrix. The method makes use of the block-based motion estimation method to estimate the motion vector of the dynamic texture, and constructs the statistical feature matrix by computing the complex covariance and dissimilarity of the motion vectors, which is used to describe the dynamic texture. The classification method is evaluated on two benchmark dynamic texture databases. The experimental results demonstrate the effectiveness of the introduced method.
动态纹理是纹理在时空领域的延伸。运动特性是动态织构分析中最重要的特征之一。提出了一种基于分块运动估计方法和统计特征矩阵的动态纹理分类方法。该方法利用基于块的运动估计方法估计动态纹理的运动向量,并通过计算运动向量的复协方差和不相似度来构造统计特征矩阵,用于描述动态纹理。在两个基准动态纹理数据库上对该分类方法进行了评估。实验结果证明了该方法的有效性。
{"title":"Dynamic Texture Classification Based on Motion Statistical Feature Matrix","authors":"Yulong Qiao, Ying Zhao, Xianrui Song","doi":"10.1109/IIH-MSP.2013.138","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.138","url":null,"abstract":"Dynamic texture is an extension of texture to the spatio-temporal domain. The motion property is one of the most important characteristics in dynamic texture analysis. This paper proposes a dynamic texture classification method based on the block-based motion estimation method and the statistical feature matrix. The method makes use of the block-based motion estimation method to estimate the motion vector of the dynamic texture, and constructs the statistical feature matrix by computing the complex covariance and dissimilarity of the motion vectors, which is used to describe the dynamic texture. The classification method is evaluated on two benchmark dynamic texture databases. The experimental results demonstrate the effectiveness of the introduced method.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121348709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Diagnosis Algorithm of Immunity-Based System with Continuous Variable of Mutual Test Results among Sensors 传感器互测结果连续变量免疫系统诊断算法
K. Wada, T. Toriu, H. Hama
The fault diagnosis for high availability system is required that it detects failure points as quick as possible. Moreover, it can realize the much higher availability, if it detects the point that is more likely to break down while the system operates normally. To meet these requirements, we propose a new algorithm for the immunity-based system diagnosis, which can detect unknown fault modes. The immunity-based system diagnosis has mutual test among sensors in the system. Proposed algorithm has continuous variables of its mutual test results among sensors. The variables are calculated from the deviation from typical relationship among output of sensors. Our experimental results demonstrate that proposed algorithm needs much less number of times of sampling than conventional algorithm for fault detection, and it can detect the sensor that has the largest error in the system while system operates normally.
高可用性系统的故障诊断要求能尽快发现故障点。此外,如果检测到在系统正常运行时更有可能发生故障的点,则可以实现更高的可用性。为了满足这些要求,我们提出了一种新的基于免疫的系统诊断算法,该算法可以检测到未知的故障模式。基于免疫的系统诊断具有系统各传感器之间相互测试的特点。该算法具有传感器间互测结果的连续变量。根据传感器输出与典型关系的偏差计算变量。实验结果表明,与传统的故障检测算法相比,该算法所需的采样次数要少得多,并且在系统正常运行的情况下,能够检测出系统中误差最大的传感器。
{"title":"Diagnosis Algorithm of Immunity-Based System with Continuous Variable of Mutual Test Results among Sensors","authors":"K. Wada, T. Toriu, H. Hama","doi":"10.1109/IIH-MSP.2013.70","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.70","url":null,"abstract":"The fault diagnosis for high availability system is required that it detects failure points as quick as possible. Moreover, it can realize the much higher availability, if it detects the point that is more likely to break down while the system operates normally. To meet these requirements, we propose a new algorithm for the immunity-based system diagnosis, which can detect unknown fault modes. The immunity-based system diagnosis has mutual test among sensors in the system. Proposed algorithm has continuous variables of its mutual test results among sensors. The variables are calculated from the deviation from typical relationship among output of sensors. Our experimental results demonstrate that proposed algorithm needs much less number of times of sampling than conventional algorithm for fault detection, and it can detect the sensor that has the largest error in the system while system operates normally.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127757631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1