Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. Existing risk assessment for CPS always focuses on the reliability assessment, using Probability Risk Assessment (PRA). In this way, the assessment of physical part and cyber part is isolated as PRA is difficult to quantify the risks from the cyber world. Methodologies should be developed to assess the both parts as a whole system, considering this integrated system has a high coupling between the physical layer and cyber layer. In this paper, a risk assessment idea for CPS with the use of attack tree is proposed. Firstly, it presents a detailed description about the threat and vulnerability attributes of each leaf in an attack tree and tells how to assign value to its threat and vulnerability vector. Then this paper focuses on calculating the threat and vulnerability vector of an attack path with the use of the leaf vector values. Finally, damage is taken into account and an idea to calculate the risk value of the whole attack path is given.
{"title":"Security Analysis on Cyber-physical System Using Attack Tree","authors":"Feng Xie, Tianbo Lu, Xiaobo Guo, Jingli Liu, Yong Peng, Yang Gao","doi":"10.1109/IIH-MSP.2013.113","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.113","url":null,"abstract":"Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. Existing risk assessment for CPS always focuses on the reliability assessment, using Probability Risk Assessment (PRA). In this way, the assessment of physical part and cyber part is isolated as PRA is difficult to quantify the risks from the cyber world. Methodologies should be developed to assess the both parts as a whole system, considering this integrated system has a high coupling between the physical layer and cyber layer. In this paper, a risk assessment idea for CPS with the use of attack tree is proposed. Firstly, it presents a detailed description about the threat and vulnerability attributes of each leaf in an attack tree and tells how to assign value to its threat and vulnerability vector. Then this paper focuses on calculating the threat and vulnerability vector of an attack path with the use of the leaf vector values. Finally, damage is taken into account and an idea to calculate the risk value of the whole attack path is given.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.129
Chao-Ho Chen, Tsong-Yi Chen, Min-Tsung Wu, T. Tang, Wu-Chih Hu
This paper is dedicated to a license plate recognition (LPR) system for moving vehicles by using car video camera. The proposed LPR method mainly consists of preprocessing, plate location, and character segmentation & recognition. At irst, the possible regions of license plate are enhanced from the captured images through the proposed edge detection method and gradient-based binarization. Then, the correct plate regions are selected by analyzing the horizontal projection and the corner distribution. A vertical Sobel processing is performed on the segmented license-plate region and then the proposed weighted-binarization method is employed to segment each character of the license, followed by the skew correction. Finally, a probabilistic neural network (PNN) technique is applied to recognize each segmented character. Experimental results show that the accuracy rates of license-plate location and license-plate recognition can achieve 91.7% and 88.5%, respectively.
{"title":"License Plate Recognition for Moving Vehicles Using a Moving Camera","authors":"Chao-Ho Chen, Tsong-Yi Chen, Min-Tsung Wu, T. Tang, Wu-Chih Hu","doi":"10.1109/IIH-MSP.2013.129","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.129","url":null,"abstract":"This paper is dedicated to a license plate recognition (LPR) system for moving vehicles by using car video camera. The proposed LPR method mainly consists of preprocessing, plate location, and character segmentation & recognition. At irst, the possible regions of license plate are enhanced from the captured images through the proposed edge detection method and gradient-based binarization. Then, the correct plate regions are selected by analyzing the horizontal projection and the corner distribution. A vertical Sobel processing is performed on the segmented license-plate region and then the proposed weighted-binarization method is employed to segment each character of the license, followed by the skew correction. Finally, a probabilistic neural network (PNN) technique is applied to recognize each segmented character. Experimental results show that the accuracy rates of license-plate location and license-plate recognition can achieve 91.7% and 88.5%, respectively.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"88 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a novel facial expression recognition method under partial occlusion based on Gabor multi-orientation features fusion and local Gabor binary pattern histogram sequence (LGBPHS). Firstly, the Gabor filter is adopted to extract multi-scale and multi-orientation features. Secondly, the Gabor magnitudes of different orientations in the same scale will be fused according to the fusion rule in this paper and then the fusion features are further encoded by using the LBP operator. Finally, the fused image is divided into several non-overlapping rectangle units with equal size, and the histogram of each unit is computed and combined as facial expression features. The proposed method is robust to partial occlusion and better recognition rates are achieved in JAFFE database with eyes occlusion and mouth occlusion. Experimental results show that the method is effective to facial expression recognition under partial occlusion.
{"title":"Facial Expression Recognition under Partial Occlusion Based on Gabor Multi-orientation Features Fusion and Local Gabor Binary Pattern Histogram Sequence","authors":"Shuai Liu, Yan Zhang, Ke-Ping Liu, Yan Li","doi":"10.1109/IIH-MSP.2013.63","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.63","url":null,"abstract":"In this paper, we propose a novel facial expression recognition method under partial occlusion based on Gabor multi-orientation features fusion and local Gabor binary pattern histogram sequence (LGBPHS). Firstly, the Gabor filter is adopted to extract multi-scale and multi-orientation features. Secondly, the Gabor magnitudes of different orientations in the same scale will be fused according to the fusion rule in this paper and then the fusion features are further encoded by using the LBP operator. Finally, the fused image is divided into several non-overlapping rectangle units with equal size, and the histogram of each unit is computed and combined as facial expression features. The proposed method is robust to partial occlusion and better recognition rates are achieved in JAFFE database with eyes occlusion and mouth occlusion. Experimental results show that the method is effective to facial expression recognition under partial occlusion.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on integer wavelet transform (IWT), the author uses the idea of radius-weighted mean (RWM) and present a high-capacity color image watermarking scheme. More specifically, the Euclidean distance of RWM and centroid is used as the embedding criterion, a watermark is hidden in the low-low (LL) subbnad of IWT domain. To further promote payload size, the criterion of Euclidean norm of RWM is employed in the low-high (LH) and high-low (HL) subbnads of IWT domain. Simulations confirm that the marked images generated by the proposed method are robust against manipulations such as JPEG, JPEG2000, color quantization, cropping, (edge) sharpening, noise additions, blurring, and inversion. In addition, the resultant perceived quality is good while our peak signal-to-noise ratio outperforms existing techniques.
{"title":"High-Payload Digital Watermarking Using Radius-Weighted Mean Based on IWT Domain","authors":"Ching-Yu Yang","doi":"10.1109/IIH-MSP.2013.26","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.26","url":null,"abstract":"Based on integer wavelet transform (IWT), the author uses the idea of radius-weighted mean (RWM) and present a high-capacity color image watermarking scheme. More specifically, the Euclidean distance of RWM and centroid is used as the embedding criterion, a watermark is hidden in the low-low (LL) subbnad of IWT domain. To further promote payload size, the criterion of Euclidean norm of RWM is employed in the low-high (LH) and high-low (HL) subbnads of IWT domain. Simulations confirm that the marked images generated by the proposed method are robust against manipulations such as JPEG, JPEG2000, color quantization, cropping, (edge) sharpening, noise additions, blurring, and inversion. In addition, the resultant perceived quality is good while our peak signal-to-noise ratio outperforms existing techniques.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a new design of planar dipole array antenna (PDAA). Radiated patches are etched on the metallic layer of a double-sided printed circuit board (FR4) to form the PDAA. The two symmetric flags with trapezoid patch are designed on both side of the print circuit board to form the basic dipole element. IE3D software is used to design PDAA. Better parameters are selected to manufacture the proposed array antenna. The fabricated 4×8-element planar dipole array antenna can be operated at 5.2/5.8 GHz successfully. With suitable size parameters of the dipole element, PDAA is fabricated. From the measured results, the wide bandwidth about 1.97GHz is obtained. The peak gain of the fabricated PDAA with reflector is 15.55dBi at 5.2GHz and 17.53dBi at 5.8GHz. This high gain planar dipole array antenna can be used in WLAN frequency band.
{"title":"Design of High Gain Planar Dipole Array Antenna for WLAN Application","authors":"Yuh-Yih Lu, Jhih-Jie Jhu, Hsiang-Cheh Huang","doi":"10.1109/IIH-MSP.2013.9","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.9","url":null,"abstract":"This paper presents a new design of planar dipole array antenna (PDAA). Radiated patches are etched on the metallic layer of a double-sided printed circuit board (FR4) to form the PDAA. The two symmetric flags with trapezoid patch are designed on both side of the print circuit board to form the basic dipole element. IE3D software is used to design PDAA. Better parameters are selected to manufacture the proposed array antenna. The fabricated 4×8-element planar dipole array antenna can be operated at 5.2/5.8 GHz successfully. With suitable size parameters of the dipole element, PDAA is fabricated. From the measured results, the wide bandwidth about 1.97GHz is obtained. The peak gain of the fabricated PDAA with reflector is 15.55dBi at 5.2GHz and 17.53dBi at 5.8GHz. This high gain planar dipole array antenna can be used in WLAN frequency band.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121718132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A TeleHead is a steerable dummy head that tracks a listener's head movement quickly and quietly. We made a personal auditory tele-existence system connecting Toyama Prefectural University and Research Institute of Electrical Communication Tohoku University by using a TeleHead over the Internet. The remote TeleHead can provide dynamic binaural signals associated with the head-movement data input, and the local listener can hear the sounds represented by them. The listener perceives the three-dimensional sound image as if he were at the remote place even when the system has a total latency of 223 ms.
{"title":"Personal Auditory Tele-existence System Using a TeleHead","authors":"T. Hirahara, D. Morikawa, Y. Iwaya","doi":"10.1109/IIH-MSP.2013.88","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.88","url":null,"abstract":"A TeleHead is a steerable dummy head that tracks a listener's head movement quickly and quietly. We made a personal auditory tele-existence system connecting Toyama Prefectural University and Research Institute of Electrical Communication Tohoku University by using a TeleHead over the Internet. The remote TeleHead can provide dynamic binaural signals associated with the head-movement data input, and the local listener can hear the sounds represented by them. The listener perceives the three-dimensional sound image as if he were at the remote place even when the system has a total latency of 223 ms.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"52 Pt 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126243305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sheng-Hsiung Chang, Chien-Yue Chen, B. Lin, Pei-Jung Wu
In this study, a 3D display and interactive laser technology are integrated to develop an interface system with virtual touch and to build up a laser interactive 3D game platform.
{"title":"A Creative 3D Game Platform Interacted with Laser Beam","authors":"Sheng-Hsiung Chang, Chien-Yue Chen, B. Lin, Pei-Jung Wu","doi":"10.1109/IIH-MSP.2013.22","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.22","url":null,"abstract":"In this study, a 3D display and interactive laser technology are integrated to develop an interface system with virtual touch and to build up a laser interactive 3D game platform.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125129699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a digital audio watermarking method. In the method, watermark has been represented by a form of the histogram for sound power level's distribution in time domain in certain frequency band(s). The relation of four numbers of selected bins in a histogram are changed by a rule of watermark bits assignment. To evaluate the performance of the embedding procedure in each frequency band, the robustness test against several kinds of manipulations or attacks were conducted for some instrumental music sources and harmonic complex tone. Considering the results of robustness test, the performance of multi-band embedding is discussed. Promising results of hearing tests are also presented.
{"title":"Digital Watermarking Method Based on STFT Histogram","authors":"K. Sonoda, A. Sęk","doi":"10.1109/IIH-MSP.2013.80","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.80","url":null,"abstract":"This paper presents a digital audio watermarking method. In the method, watermark has been represented by a form of the histogram for sound power level's distribution in time domain in certain frequency band(s). The relation of four numbers of selected bins in a histogram are changed by a rule of watermark bits assignment. To evaluate the performance of the embedding procedure in each frequency band, the robustness test against several kinds of manipulations or attacks were conducted for some instrumental music sources and harmonic complex tone. Considering the results of robustness test, the performance of multi-band embedding is discussed. Promising results of hearing tests are also presented.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133555384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.133
Pham Hai Dang Le, D. Graf, M. Franz
Watermarked images are increasingly prevalent in the internet. Hence, any practical steganalyzer has to take the presence of watermarked images into account, particularly as potential source of false alarms due to similar embedding algorithms. In this study, we investigate the impact of watermarked images on the performance of a standard steganalyzer using two recent watermarking schemes: JPEG Compression Resistance Watermarking (JCRW) in the DCT domain [1] and Controllable Secure Watermarking (CSW) [2] in the pixel domain. Our findings show that JCRW and CSW do interfere with steganalysis. In particular, CSW-watermarked images were mostly classified as stego images thus rendering the investigated steganalyzer useless because of the excessively high false alarm rate. We propose a two-step classifier to handle this problem which achieves the same performance as the original steganalyzer, but in the presence of watermarking.
{"title":"Steganalysis in the Presence of Watermarked Images","authors":"Pham Hai Dang Le, D. Graf, M. Franz","doi":"10.1109/IIH-MSP.2013.133","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.133","url":null,"abstract":"Watermarked images are increasingly prevalent in the internet. Hence, any practical steganalyzer has to take the presence of watermarked images into account, particularly as potential source of false alarms due to similar embedding algorithms. In this study, we investigate the impact of watermarked images on the performance of a standard steganalyzer using two recent watermarking schemes: JPEG Compression Resistance Watermarking (JCRW) in the DCT domain [1] and Controllable Secure Watermarking (CSW) [2] in the pixel domain. Our findings show that JCRW and CSW do interfere with steganalysis. In particular, CSW-watermarked images were mostly classified as stego images thus rendering the investigated steganalyzer useless because of the excessively high false alarm rate. We propose a two-step classifier to handle this problem which achieves the same performance as the original steganalyzer, but in the presence of watermarking.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131056765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.141
J. Bahi, Jean-François Couchot, Nicolas Friot, C. Guyeux, Kamel Mazouzi
This paper takes place in the field of invisible chaos-based watermarking schemes. It addresses the quality study of an already pyblished algorithm by focusing on three class of properties. Its robustness is experimentally shown against classical attacks on a large set of image instances and image transformations. It correctness and completness are formally proven. Due to this main advantages, this process is fitted for practical use.
{"title":"Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction","authors":"J. Bahi, Jean-François Couchot, Nicolas Friot, C. Guyeux, Kamel Mazouzi","doi":"10.1109/IIH-MSP.2013.141","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.141","url":null,"abstract":"This paper takes place in the field of invisible chaos-based watermarking schemes. It addresses the quality study of an already pyblished algorithm by focusing on three class of properties. Its robustness is experimentally shown against classical attacks on a large set of image instances and image transformations. It correctness and completness are formally proven. Due to this main advantages, this process is fitted for practical use.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132699126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}