Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.117
Hengliang Tang, Yanfeng Sun, Jie Zhu, Mingru Zhao
Automatic nodes location is a key supporting technology in WSN, and gains much more attention with the development of the modern network technology and wireless communication technology. In this paper, a novel locating method based on correlation analysis is presented. First, in order to get the accurate and valid data, the normalization procedure is applied on the original wireless information. Then, the statistical histogram, which can decrease the dimension and weaken the effect of abnormal values for the normalized data, is adopted to summarize the detailed information and to represent the signal information. Finally, a novel nodes location method based on correlation analysis is proposed to evaluate the positions of the unknown nodes. The experiments tested on the public Intel Lab Data demonstrate the feasibility and validity of the proposed locating method for WSN.
{"title":"Nodes Location Method Based on Correlation Analysis in WSN","authors":"Hengliang Tang, Yanfeng Sun, Jie Zhu, Mingru Zhao","doi":"10.1109/IIH-MSP.2013.117","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.117","url":null,"abstract":"Automatic nodes location is a key supporting technology in WSN, and gains much more attention with the development of the modern network technology and wireless communication technology. In this paper, a novel locating method based on correlation analysis is presented. First, in order to get the accurate and valid data, the normalization procedure is applied on the original wireless information. Then, the statistical histogram, which can decrease the dimension and weaken the effect of abnormal values for the normalized data, is adopted to summarize the detailed information and to represent the signal information. Finally, a novel nodes location method based on correlation analysis is proposed to evaluate the positions of the unknown nodes. The experiments tested on the public Intel Lab Data demonstrate the feasibility and validity of the proposed locating method for WSN.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115945887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sheng-Hsiung Chang, Chien-Yue Chen, B. Lin, Pei-Jung Wu
In this study, a 3D display and interactive laser technology are integrated to develop an interface system with virtual touch and to build up a laser interactive 3D game platform.
{"title":"A Creative 3D Game Platform Interacted with Laser Beam","authors":"Sheng-Hsiung Chang, Chien-Yue Chen, B. Lin, Pei-Jung Wu","doi":"10.1109/IIH-MSP.2013.22","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.22","url":null,"abstract":"In this study, a 3D display and interactive laser technology are integrated to develop an interface system with virtual touch and to build up a laser interactive 3D game platform.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125129699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A TeleHead is a steerable dummy head that tracks a listener's head movement quickly and quietly. We made a personal auditory tele-existence system connecting Toyama Prefectural University and Research Institute of Electrical Communication Tohoku University by using a TeleHead over the Internet. The remote TeleHead can provide dynamic binaural signals associated with the head-movement data input, and the local listener can hear the sounds represented by them. The listener perceives the three-dimensional sound image as if he were at the remote place even when the system has a total latency of 223 ms.
{"title":"Personal Auditory Tele-existence System Using a TeleHead","authors":"T. Hirahara, D. Morikawa, Y. Iwaya","doi":"10.1109/IIH-MSP.2013.88","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.88","url":null,"abstract":"A TeleHead is a steerable dummy head that tracks a listener's head movement quickly and quietly. We made a personal auditory tele-existence system connecting Toyama Prefectural University and Research Institute of Electrical Communication Tohoku University by using a TeleHead over the Internet. The remote TeleHead can provide dynamic binaural signals associated with the head-movement data input, and the local listener can hear the sounds represented by them. The listener perceives the three-dimensional sound image as if he were at the remote place even when the system has a total latency of 223 ms.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"52 Pt 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126243305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a novel facial expression recognition method under partial occlusion based on Gabor multi-orientation features fusion and local Gabor binary pattern histogram sequence (LGBPHS). Firstly, the Gabor filter is adopted to extract multi-scale and multi-orientation features. Secondly, the Gabor magnitudes of different orientations in the same scale will be fused according to the fusion rule in this paper and then the fusion features are further encoded by using the LBP operator. Finally, the fused image is divided into several non-overlapping rectangle units with equal size, and the histogram of each unit is computed and combined as facial expression features. The proposed method is robust to partial occlusion and better recognition rates are achieved in JAFFE database with eyes occlusion and mouth occlusion. Experimental results show that the method is effective to facial expression recognition under partial occlusion.
{"title":"Facial Expression Recognition under Partial Occlusion Based on Gabor Multi-orientation Features Fusion and Local Gabor Binary Pattern Histogram Sequence","authors":"Shuai Liu, Yan Zhang, Ke-Ping Liu, Yan Li","doi":"10.1109/IIH-MSP.2013.63","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.63","url":null,"abstract":"In this paper, we propose a novel facial expression recognition method under partial occlusion based on Gabor multi-orientation features fusion and local Gabor binary pattern histogram sequence (LGBPHS). Firstly, the Gabor filter is adopted to extract multi-scale and multi-orientation features. Secondly, the Gabor magnitudes of different orientations in the same scale will be fused according to the fusion rule in this paper and then the fusion features are further encoded by using the LBP operator. Finally, the fused image is divided into several non-overlapping rectangle units with equal size, and the histogram of each unit is computed and combined as facial expression features. The proposed method is robust to partial occlusion and better recognition rates are achieved in JAFFE database with eyes occlusion and mouth occlusion. Experimental results show that the method is effective to facial expression recognition under partial occlusion.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a new design of planar dipole array antenna (PDAA). Radiated patches are etched on the metallic layer of a double-sided printed circuit board (FR4) to form the PDAA. The two symmetric flags with trapezoid patch are designed on both side of the print circuit board to form the basic dipole element. IE3D software is used to design PDAA. Better parameters are selected to manufacture the proposed array antenna. The fabricated 4×8-element planar dipole array antenna can be operated at 5.2/5.8 GHz successfully. With suitable size parameters of the dipole element, PDAA is fabricated. From the measured results, the wide bandwidth about 1.97GHz is obtained. The peak gain of the fabricated PDAA with reflector is 15.55dBi at 5.2GHz and 17.53dBi at 5.8GHz. This high gain planar dipole array antenna can be used in WLAN frequency band.
{"title":"Design of High Gain Planar Dipole Array Antenna for WLAN Application","authors":"Yuh-Yih Lu, Jhih-Jie Jhu, Hsiang-Cheh Huang","doi":"10.1109/IIH-MSP.2013.9","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.9","url":null,"abstract":"This paper presents a new design of planar dipole array antenna (PDAA). Radiated patches are etched on the metallic layer of a double-sided printed circuit board (FR4) to form the PDAA. The two symmetric flags with trapezoid patch are designed on both side of the print circuit board to form the basic dipole element. IE3D software is used to design PDAA. Better parameters are selected to manufacture the proposed array antenna. The fabricated 4×8-element planar dipole array antenna can be operated at 5.2/5.8 GHz successfully. With suitable size parameters of the dipole element, PDAA is fabricated. From the measured results, the wide bandwidth about 1.97GHz is obtained. The peak gain of the fabricated PDAA with reflector is 15.55dBi at 5.2GHz and 17.53dBi at 5.8GHz. This high gain planar dipole array antenna can be used in WLAN frequency band.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121718132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A steganography detection algorithm on JPEG images-Markov detection is introduced. On the basics of Markov steganography detection algorithm, we detect many kinds of images, such as stego-images, spliced images and median filtered images and so on. The experiment results show that the improved Markov algorithm has higher detection accuracy rate for many kinds of images.
{"title":"Research on Image Detection Algorithm with Markov Process","authors":"Liu Meng-jiao, Niu Shao-zhang, Zou Jian-cheng","doi":"10.1109/IIH-MSP.2013.68","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.68","url":null,"abstract":"A steganography detection algorithm on JPEG images-Markov detection is introduced. On the basics of Markov steganography detection algorithm, we detect many kinds of images, such as stego-images, spliced images and median filtered images and so on. The experiment results show that the improved Markov algorithm has higher detection accuracy rate for many kinds of images.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124020906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.133
Pham Hai Dang Le, D. Graf, M. Franz
Watermarked images are increasingly prevalent in the internet. Hence, any practical steganalyzer has to take the presence of watermarked images into account, particularly as potential source of false alarms due to similar embedding algorithms. In this study, we investigate the impact of watermarked images on the performance of a standard steganalyzer using two recent watermarking schemes: JPEG Compression Resistance Watermarking (JCRW) in the DCT domain [1] and Controllable Secure Watermarking (CSW) [2] in the pixel domain. Our findings show that JCRW and CSW do interfere with steganalysis. In particular, CSW-watermarked images were mostly classified as stego images thus rendering the investigated steganalyzer useless because of the excessively high false alarm rate. We propose a two-step classifier to handle this problem which achieves the same performance as the original steganalyzer, but in the presence of watermarking.
{"title":"Steganalysis in the Presence of Watermarked Images","authors":"Pham Hai Dang Le, D. Graf, M. Franz","doi":"10.1109/IIH-MSP.2013.133","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.133","url":null,"abstract":"Watermarked images are increasingly prevalent in the internet. Hence, any practical steganalyzer has to take the presence of watermarked images into account, particularly as potential source of false alarms due to similar embedding algorithms. In this study, we investigate the impact of watermarked images on the performance of a standard steganalyzer using two recent watermarking schemes: JPEG Compression Resistance Watermarking (JCRW) in the DCT domain [1] and Controllable Secure Watermarking (CSW) [2] in the pixel domain. Our findings show that JCRW and CSW do interfere with steganalysis. In particular, CSW-watermarked images were mostly classified as stego images thus rendering the investigated steganalyzer useless because of the excessively high false alarm rate. We propose a two-step classifier to handle this problem which achieves the same performance as the original steganalyzer, but in the presence of watermarking.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131056765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on integer wavelet transform (IWT), the author uses the idea of radius-weighted mean (RWM) and present a high-capacity color image watermarking scheme. More specifically, the Euclidean distance of RWM and centroid is used as the embedding criterion, a watermark is hidden in the low-low (LL) subbnad of IWT domain. To further promote payload size, the criterion of Euclidean norm of RWM is employed in the low-high (LH) and high-low (HL) subbnads of IWT domain. Simulations confirm that the marked images generated by the proposed method are robust against manipulations such as JPEG, JPEG2000, color quantization, cropping, (edge) sharpening, noise additions, blurring, and inversion. In addition, the resultant perceived quality is good while our peak signal-to-noise ratio outperforms existing techniques.
{"title":"High-Payload Digital Watermarking Using Radius-Weighted Mean Based on IWT Domain","authors":"Ching-Yu Yang","doi":"10.1109/IIH-MSP.2013.26","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.26","url":null,"abstract":"Based on integer wavelet transform (IWT), the author uses the idea of radius-weighted mean (RWM) and present a high-capacity color image watermarking scheme. More specifically, the Euclidean distance of RWM and centroid is used as the embedding criterion, a watermark is hidden in the low-low (LL) subbnad of IWT domain. To further promote payload size, the criterion of Euclidean norm of RWM is employed in the low-high (LH) and high-low (HL) subbnads of IWT domain. Simulations confirm that the marked images generated by the proposed method are robust against manipulations such as JPEG, JPEG2000, color quantization, cropping, (edge) sharpening, noise additions, blurring, and inversion. In addition, the resultant perceived quality is good while our peak signal-to-noise ratio outperforms existing techniques.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elderly care system is one among the most popular research topics in biomedical health-care system design as aging has emerged in different countries. We present a biologically-motivated system to detect unexpected falls in real-time video sequences. The system employs event-based temporal difference image between video sequences as input and extracts static features like aspect ratio and inclination angle of the human body silhouette in unobserved video, which is adopted to improve privacy protection. This method has less computation than those methods using motion dynamic features. Meantime, since time difference is an important factor to distinguish fall incident and lying down event, the critical time difference is obtained from the experiments and verified by statistical results. With the K-Nearest Neighbor (KNN) classifier and the critical time difference, this system presents an accurate approach to detect fall incidents. 86.11% average recognition rate is achieved in the experiment. Compared with other methods of motion dynamic features categorization, our proposed system shows great computational savings, and it is an ideal candidate for hardware implementation with event-based circuits.
{"title":"A Fall Detection System Based on Human Body Silhouette","authors":"Bor-Shing Lin, Jhe-Shin Su, Hao Chen, G. Jan","doi":"10.1109/IIH-MSP.2013.21","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.21","url":null,"abstract":"Elderly care system is one among the most popular research topics in biomedical health-care system design as aging has emerged in different countries. We present a biologically-motivated system to detect unexpected falls in real-time video sequences. The system employs event-based temporal difference image between video sequences as input and extracts static features like aspect ratio and inclination angle of the human body silhouette in unobserved video, which is adopted to improve privacy protection. This method has less computation than those methods using motion dynamic features. Meantime, since time difference is an important factor to distinguish fall incident and lying down event, the critical time difference is obtained from the experiments and verified by statistical results. With the K-Nearest Neighbor (KNN) classifier and the critical time difference, this system presents an accurate approach to detect fall incidents. 86.11% average recognition rate is achieved in the experiment. Compared with other methods of motion dynamic features categorization, our proposed system shows great computational savings, and it is an ideal candidate for hardware implementation with event-based circuits.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132440960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.141
J. Bahi, Jean-François Couchot, Nicolas Friot, C. Guyeux, Kamel Mazouzi
This paper takes place in the field of invisible chaos-based watermarking schemes. It addresses the quality study of an already pyblished algorithm by focusing on three class of properties. Its robustness is experimentally shown against classical attacks on a large set of image instances and image transformations. It correctness and completness are formally proven. Due to this main advantages, this process is fitted for practical use.
{"title":"Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction","authors":"J. Bahi, Jean-François Couchot, Nicolas Friot, C. Guyeux, Kamel Mazouzi","doi":"10.1109/IIH-MSP.2013.141","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.141","url":null,"abstract":"This paper takes place in the field of invisible chaos-based watermarking schemes. It addresses the quality study of an already pyblished algorithm by focusing on three class of properties. Its robustness is experimentally shown against classical attacks on a large set of image instances and image transformations. It correctness and completness are formally proven. Due to this main advantages, this process is fitted for practical use.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132699126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}