首页 > 最新文献

2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing最新文献

英文 中文
Data Hiding Based on Subsampling and Compressive Sensing 基于子采样和压缩感知的数据隐藏
Wei Li, Jeng-Shyang Pan, Lijun Yan, Chun-Sheng Yang, Hsiang-Cheh Huang
This paper proposes a novel scheme that considers the data hiding with sub sampling and compressive sensing. We utilize the characteristics of compressive sensing, sparsity and random projection, to embed secret data in the observation domain of the sparse image obtained through compressive sensing. The high bit correction rate (BCR) in experiments shows the high accuracy of our proposed method.
本文提出了一种考虑子采样和压缩感知的数据隐藏的新方案。我们利用压缩感知、稀疏性和随机投影的特性,在压缩感知得到的稀疏图像的观测域中嵌入秘密数据。实验结果表明,该方法具有较高的比特校正率(BCR)。
{"title":"Data Hiding Based on Subsampling and Compressive Sensing","authors":"Wei Li, Jeng-Shyang Pan, Lijun Yan, Chun-Sheng Yang, Hsiang-Cheh Huang","doi":"10.1109/IIH-MSP.2013.157","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.157","url":null,"abstract":"This paper proposes a novel scheme that considers the data hiding with sub sampling and compressive sensing. We utilize the characteristics of compressive sensing, sparsity and random projection, to embed secret data in the observation domain of the sparse image obtained through compressive sensing. The high bit correction rate (BCR) in experiments shows the high accuracy of our proposed method.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124209427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards Gender-Dependent Babble Maskers for Speech Privacy Protection 基于性别的胡言乱语面罩的言论隐私保护
K. Kondo, Tomohiro Komiyama, S. Kashiwada
In this paper, we investigated on an efficient masker for speech privacy protection. Previously, we proposed and evaluated a speaker-dependent masker which is created from speech of the speaker being masked. This masker was proven to lower the intelligibility of speech at a much lower level than conventional babble maskers. However, this masker needs to be prepared for each potential speaker, and may be expensive to create and maintain. Accordingly, we investigated on an alternative masker, where the speech is masked by a masker created from a different speaker of the same gender. We measured the effectiveness of this gender-dependent masker, and found that male gender-dependent masker is feasible, with efficiency almost equal to the previously proposed speaker-dependent masker. However, female speech was not as effectively masked, and needs further investigation.
本文研究了一种有效的语音隐私保护掩蔽器。之前,我们提出并评估了一个依赖于说话人的掩蔽器,该掩蔽器是由被掩蔽说话人的语音创建的。这种面具被证明比传统的胡言乱语面具在更低的水平上降低了言语的可理解性。然而,这个掩蔽器需要为每个潜在的演讲者准备,并且可能是昂贵的创建和维护。因此,我们研究了一种替代面具,其中演讲被由同一性别的不同演讲者创建的面具所掩盖。我们测量了这种性别依赖掩蔽器的有效性,发现男性性别依赖掩蔽器是可行的,其效率几乎与先前提出的说话人依赖掩蔽器相当。然而,女性的言语并没有被有效地掩盖,这需要进一步的研究。
{"title":"Towards Gender-Dependent Babble Maskers for Speech Privacy Protection","authors":"K. Kondo, Tomohiro Komiyama, S. Kashiwada","doi":"10.1109/IIH-MSP.2013.77","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.77","url":null,"abstract":"In this paper, we investigated on an efficient masker for speech privacy protection. Previously, we proposed and evaluated a speaker-dependent masker which is created from speech of the speaker being masked. This masker was proven to lower the intelligibility of speech at a much lower level than conventional babble maskers. However, this masker needs to be prepared for each potential speaker, and may be expensive to create and maintain. Accordingly, we investigated on an alternative masker, where the speech is masked by a masker created from a different speaker of the same gender. We measured the effectiveness of this gender-dependent masker, and found that male gender-dependent masker is feasible, with efficiency almost equal to the previously proposed speaker-dependent masker. However, female speech was not as effectively masked, and needs further investigation.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129543411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
OEWC-Based Orthogonality Tracking on NIDS 基于oewc的NIDS正交跟踪
Yih-Fuh Wang, Meng-Yuan Liao
Network Intrusion Detection System (NIDS) monitor traffic on a network looking for suspicious activity, which could be an attack or unauthorized activity. By the Orthogonal Expanded Walsh Code (OEWC) spreading and orthogonality, system can detect intrusion correlation on orthogonality tracking. This orthogonal tracking mechanism based on group matching technique is proposed for NIDSs to detect intrusions and attacks on signal processing. This paper adds survey on BPSK and M-ary QAM OEWC, which can properly support anti-MAI (Multiple-Access Interference) capability on DS-CDMA system. Variable-length characteristic of the OEWC family allows arbitrary code chip, hence, chip length can be chosen to suit the number of users for improving system efficiency and utilization. These together with secure, variable-length and manifold-signal abilities may make OEWC of interest to designers of reliable communications.
网络入侵检测系统(NIDS)监视网络上的流量,查找可疑活动,这些活动可能是攻击或未经授权的活动。通过正交扩展沃尔什码(OEWC)的扩展和正交性,系统可以通过正交跟踪检测入侵相关性。提出了一种基于组匹配技术的正交跟踪机制,用于检测信号处理系统的入侵和攻击。本文对BPSK和M-ary QAM OEWC进行了研究,它们能够很好地支持DS-CDMA系统的抗多址干扰能力。OEWC系列的变长特性允许任意编码芯片,因此可以根据用户数量选择芯片长度,以提高系统效率和利用率。这些与安全,可变长度和歧管信号能力一起,可能使OEWC对可靠通信的设计者感兴趣。
{"title":"OEWC-Based Orthogonality Tracking on NIDS","authors":"Yih-Fuh Wang, Meng-Yuan Liao","doi":"10.1109/IIH-MSP.2013.27","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.27","url":null,"abstract":"Network Intrusion Detection System (NIDS) monitor traffic on a network looking for suspicious activity, which could be an attack or unauthorized activity. By the Orthogonal Expanded Walsh Code (OEWC) spreading and orthogonality, system can detect intrusion correlation on orthogonality tracking. This orthogonal tracking mechanism based on group matching technique is proposed for NIDSs to detect intrusions and attacks on signal processing. This paper adds survey on BPSK and M-ary QAM OEWC, which can properly support anti-MAI (Multiple-Access Interference) capability on DS-CDMA system. Variable-length characteristic of the OEWC family allows arbitrary code chip, hence, chip length can be chosen to suit the number of users for improving system efficiency and utilization. These together with secure, variable-length and manifold-signal abilities may make OEWC of interest to designers of reliable communications.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129562514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Depth Based Mode Decision Algorithm for 3D Video Coding 基于深度的三维视频编码模式决策算法
H. Dou, Ke-bin Jia
This paper analyzes the relationship between macro block (MB) modes and depth values in multiview video plus depth (MVD) format, and proposed a depth based mode decision algorithm for 3D video coding. The depth information was utilized to determine the final mode decision process. The experimental results show the proposed algorithm can reduce the complexity of the mode decision process remarkably while maintaining nearly the same rate distortion performance.
分析了多视点视频加深度(MVD)格式中宏块(MB)模式与深度值之间的关系,提出了一种基于深度的3D视频编码模式决策算法。利用深度信息确定最终的模式决策过程。实验结果表明,该算法在保持几乎相同的率失真性能的同时,显著降低了模式决策过程的复杂度。
{"title":"A Depth Based Mode Decision Algorithm for 3D Video Coding","authors":"H. Dou, Ke-bin Jia","doi":"10.1109/IIH-MSP.2013.41","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.41","url":null,"abstract":"This paper analyzes the relationship between macro block (MB) modes and depth values in multiview video plus depth (MVD) format, and proposed a depth based mode decision algorithm for 3D video coding. The depth information was utilized to determine the final mode decision process. The experimental results show the proposed algorithm can reduce the complexity of the mode decision process remarkably while maintaining nearly the same rate distortion performance.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Processing Approach to Automatic Scoring System for Archery Targets 射箭目标自动计分系统的图像处理方法
Thi Thi Zin, I. Oka, Takuya Sasayama, S. Ata, Hitoshi Watanabe, H. Sasano
This paper proposes an image processing approach to automatic scoring system for archery targets. Specifically, the proposed system first performs Morphological operations on the target image to obtain thick boundaries of the arrow hits and then the image segmentation process is applied to segment the target area by using color and shape features. In doing so, a dynamic thresholding is applied to handle the possible effects of illumination variations and the bull's eyes or the target concentric circles are segmented by using geometrical properties of circles and ellipses to calculate hit scores. Thus the system can have a capability of scoring inside and outside the concentric circles separately. The proposed method is tested by using our own video sequences taken in the self-conducted experiments performed by four archers on two different days shooting 6 arrows. The test results show that the proposed scoring system is promising with an accuracy rate of 100%.
提出了一种用于射箭目标自动评分系统的图像处理方法。具体而言,该系统首先对目标图像进行形态学操作,获得箭头命中的粗边界,然后利用图像分割过程,利用颜色和形状特征对目标区域进行分割。在此过程中,应用动态阈值处理光照变化可能产生的影响,并利用圆和椭圆的几何特性对靶心或目标同心圆进行分割,计算命中分数。因此,该系统可以分别在同心圆内和圆外刻分。我们用四名弓箭手在两个不同的日子里发射6支箭进行了自我实验,并使用我们自己的视频序列对所提出的方法进行了测试。测试结果表明,该评分系统具有良好的应用前景,准确率达到100%。
{"title":"Image Processing Approach to Automatic Scoring System for Archery Targets","authors":"Thi Thi Zin, I. Oka, Takuya Sasayama, S. Ata, Hitoshi Watanabe, H. Sasano","doi":"10.1109/IIH-MSP.2013.73","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.73","url":null,"abstract":"This paper proposes an image processing approach to automatic scoring system for archery targets. Specifically, the proposed system first performs Morphological operations on the target image to obtain thick boundaries of the arrow hits and then the image segmentation process is applied to segment the target area by using color and shape features. In doing so, a dynamic thresholding is applied to handle the possible effects of illumination variations and the bull's eyes or the target concentric circles are segmented by using geometrical properties of circles and ellipses to calculate hit scores. Thus the system can have a capability of scoring inside and outside the concentric circles separately. The proposed method is tested by using our own video sequences taken in the self-conducted experiments performed by four archers on two different days shooting 6 arrows. The test results show that the proposed scoring system is promising with an accuracy rate of 100%.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126664133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and Implementation of Electronic Image Stabilization System Based on Dual-Core DSP 基于双核DSP的电子稳像系统的设计与实现
Haolong Zhang, Qiang Wu, Tianqi Liu, Xuwen Li
Electronic image stabilization (EIS) technology is an important research area of video processing and computer vision. This paper presented a set of fast and parallel EIS algorithms. Firstly, this paper proposed a fast local motion vector (LMV) estimation algorithm based on the FAST feature to solve the problem that the traditional algorithm is too complex. Secondly, a parallel global motion vector (GMV) algorithm based on image division is designed, which computes every LMV simultaneously, and then estimates the GMV by all LMVs. Finally, based on the proposed algorithm, an EIS systems based on BF609 dual-core DSP processor is designed and implemented. Experiment results show that the algorithm and system presented in this thesis can effectively stabilize jittery video and achieve high real-time performance. When dealing with PAL standard video, the total time cost is less than 40ms.
电子稳像技术是视频处理和计算机视觉领域的一个重要研究方向。本文提出了一套快速并行的EIS算法。首先,针对传统算法过于复杂的问题,提出了一种基于fast特征的快速局部运动矢量(LMV)估计算法。其次,设计了一种基于图像分割的并行全局运动矢量(GMV)算法,该算法同时计算每个LMV,然后由所有LMV对GMV进行估计;最后,基于所提出的算法,设计并实现了一个基于BF609双核DSP处理器的EIS系统。实验结果表明,本文提出的算法和系统能够有效地稳定抖动视频,达到较高的实时性。在处理PAL标准视频时,总时间成本小于40ms。
{"title":"Design and Implementation of Electronic Image Stabilization System Based on Dual-Core DSP","authors":"Haolong Zhang, Qiang Wu, Tianqi Liu, Xuwen Li","doi":"10.1109/IIH-MSP.2013.38","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.38","url":null,"abstract":"Electronic image stabilization (EIS) technology is an important research area of video processing and computer vision. This paper presented a set of fast and parallel EIS algorithms. Firstly, this paper proposed a fast local motion vector (LMV) estimation algorithm based on the FAST feature to solve the problem that the traditional algorithm is too complex. Secondly, a parallel global motion vector (GMV) algorithm based on image division is designed, which computes every LMV simultaneously, and then estimates the GMV by all LMVs. Finally, based on the proposed algorithm, an EIS systems based on BF609 dual-core DSP processor is designed and implemented. Experiment results show that the algorithm and system presented in this thesis can effectively stabilize jittery video and achieve high real-time performance. When dealing with PAL standard video, the total time cost is less than 40ms.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125741948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Prediction-Based Reversible Data Hiding with Content Characteristics 具有内容特征的基于预测的可逆数据隐藏
Hsiang-Cheh Huang, Chuan-Chang Lin, Feng-Cheng Chang
Reversible data hiding is one of the popular topics in watermarking researches, and it belongs to the branch of digital rights management (DRM) applications. Similar to conventional watermarking techniques, for reversible data hiding, at the encoder, secret information can be embedded into original images, and the marked image can be obtained. Different from conventional watermarking, due to the term 'reversible', it implies that at the decoder, both the original image and embedded secret should be perfectly separated from marked image. It requires keeping the reversibility of proposed algorithm, while looking for good image quality and large amount of secret for embedding. With the prediction-based algorithm, output image can be predicted, and differences between original and predicted images can be altered to make reversible data hiding possible. We also utilize inherent characteristics of original images for reaching better performances. Simulation results reveal that with our algorithm, comparable or better performances can be observed due to the characteristics from different images.
可逆数据隐藏是水印研究的热点之一,属于数字版权管理(DRM)应用的一个分支。与传统的水印技术类似,为了实现数据的可逆隐藏,在编码器处,可以将秘密信息嵌入到原始图像中,从而获得标记后的图像。与传统水印不同的是,由于“可逆”一词,它意味着在解码器处,原始图像和嵌入的秘密都必须与被标记的图像完美分离。它要求保持算法的可逆性,同时寻找良好的图像质量和大量的秘密进行嵌入。利用基于预测的算法,可以预测输出图像,并且可以改变原始图像与预测图像之间的差异,从而实现可逆的数据隐藏。我们还利用原始图像的固有特性来达到更好的性能。仿真结果表明,由于不同图像的特征,我们的算法可以观察到相当或更好的性能。
{"title":"Prediction-Based Reversible Data Hiding with Content Characteristics","authors":"Hsiang-Cheh Huang, Chuan-Chang Lin, Feng-Cheng Chang","doi":"10.1109/IIH-MSP.2013.12","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.12","url":null,"abstract":"Reversible data hiding is one of the popular topics in watermarking researches, and it belongs to the branch of digital rights management (DRM) applications. Similar to conventional watermarking techniques, for reversible data hiding, at the encoder, secret information can be embedded into original images, and the marked image can be obtained. Different from conventional watermarking, due to the term 'reversible', it implies that at the decoder, both the original image and embedded secret should be perfectly separated from marked image. It requires keeping the reversibility of proposed algorithm, while looking for good image quality and large amount of secret for embedding. With the prediction-based algorithm, output image can be predicted, and differences between original and predicted images can be altered to make reversible data hiding possible. We also utilize inherent characteristics of original images for reaching better performances. Simulation results reveal that with our algorithm, comparable or better performances can be observed due to the characteristics from different images.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125846860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Working Method for Mobile Station in Nuclear Power Plant 核电站移动站的一种工作方法
Bin Zhu
Due to the electromagnetic radiation interference, it is recommended to prohibit using mobile stations in the area of industrial buildings in the power plant. While pagers are successfully applied, there are many drawbacks for the pagers in the nuclear power plant. This paper proposes a working method for the mobile station in the nuclear power plant. By the way of simple improvements in the mobile station and the base station, the defects of the pagers are overcome, the issue of prohibiting using mobile stations in area of industrial building in the nuclear power plant is solved and potential safety problems due to human factors for not turning off mobile stations are eliminated.
由于电磁辐射干扰,建议禁止在电厂工业建筑区域使用移动台。呼机在成功应用的同时,也存在许多不足。本文提出了一种核电站移动站的工作方法。通过对移动台和基站进行简单的改进,克服了传呼机的缺陷,解决了核电站工业建筑区域禁止使用移动台的问题,消除了移动台未关闭的人为因素带来的安全隐患。
{"title":"A Working Method for Mobile Station in Nuclear Power Plant","authors":"Bin Zhu","doi":"10.1109/IIH-MSP.2013.168","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.168","url":null,"abstract":"Due to the electromagnetic radiation interference, it is recommended to prohibit using mobile stations in the area of industrial buildings in the power plant. While pagers are successfully applied, there are many drawbacks for the pagers in the nuclear power plant. This paper proposes a working method for the mobile station in the nuclear power plant. By the way of simple improvements in the mobile station and the base station, the defects of the pagers are overcome, the issue of prohibiting using mobile stations in area of industrial building in the nuclear power plant is solved and potential safety problems due to human factors for not turning off mobile stations are eliminated.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121516921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-view Human Action Recognition: A Survey 多视角人体动作识别研究进展
Alexandros Iosifidis, A. Tefas, I. Pitas
While single-view human action recognition has attracted considerable research study in the last three decades, multi-view action recognition is, still, a less exploited field. This paper provides a comprehensive survey of multi-view human action recognition approaches. The approaches are reviewed following an application-based categorization: methods are categorized based on their ability to operate using a fixed or an arbitrary number of cameras. Finally, benchmark databases frequently used for evaluation of multi-view approaches are briefly described.
在过去的三十年里,单视角人体动作识别已经引起了大量的研究,而多视角动作识别仍然是一个较少开发的领域。本文对多视角人体动作识别方法进行了综述。对这些方法进行了基于应用程序的分类:方法根据其使用固定或任意数量的摄像机的操作能力进行分类。最后,简要介绍了多视图方法评估中常用的基准数据库。
{"title":"Multi-view Human Action Recognition: A Survey","authors":"Alexandros Iosifidis, A. Tefas, I. Pitas","doi":"10.1109/IIH-MSP.2013.135","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.135","url":null,"abstract":"While single-view human action recognition has attracted considerable research study in the last three decades, multi-view action recognition is, still, a less exploited field. This paper provides a comprehensive survey of multi-view human action recognition approaches. The approaches are reviewed following an application-based categorization: methods are categorized based on their ability to operate using a fixed or an arbitrary number of cameras. Finally, benchmark databases frequently used for evaluation of multi-view approaches are briefly described.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129017567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Recommending Music Based on Probabilistic Latent Semantic Analysis on Korean Radio Episodes 基于韩语广播集概率潜在语义分析的音乐推荐
Ziwon Hyung, Kyogu Lee
Recommending music that satisfies the user's taste has been a challenging problem. Previous works on music recommendation system focused on the user's purchase history or the content of the music. In this paper, we propose a music recommendation system purely based on analyzing textual input of the users. We first mine a large corpus of Korean radio episodes, which is written by the listener. Each episode is composed of a personal story and a song request which we assume to be somehow related to the story. We then performing probabilistic Latent Semantic Analysis (pLSA) to find similar documents and recommend music that are associated to those documents. We evaluate our system by computing the mean reciprocal rank and mean average precision, which are both conventional metrics in evaluating information retrieval systems. The result shows that music similarity and document similarity are closely correlated, and thus it is possible to recommend music purely based on text analysis.
推荐满足用户口味的音乐一直是一个具有挑战性的问题。以前关于音乐推荐系统的工作主要集中在用户的购买历史或音乐的内容上。在本文中,我们提出了一个纯粹基于分析用户文本输入的音乐推荐系统。我们首先挖掘大量的韩国广播节目语料库,这些节目由听众撰写。每一集都由一个个人故事和一首我们认为与故事有关的歌曲请求组成。然后,我们执行概率潜在语义分析(pLSA)来查找类似的文档,并推荐与这些文档相关的音乐。我们通过计算平均倒数秩和平均平均精度来评估我们的系统,这两个都是评估信息检索系统的常规指标。结果表明,音乐相似度和文档相似度密切相关,因此可以完全基于文本分析来推荐音乐。
{"title":"Recommending Music Based on Probabilistic Latent Semantic Analysis on Korean Radio Episodes","authors":"Ziwon Hyung, Kyogu Lee","doi":"10.1109/IIH-MSP.2013.123","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.123","url":null,"abstract":"Recommending music that satisfies the user's taste has been a challenging problem. Previous works on music recommendation system focused on the user's purchase history or the content of the music. In this paper, we propose a music recommendation system purely based on analyzing textual input of the users. We first mine a large corpus of Korean radio episodes, which is written by the listener. Each episode is composed of a personal story and a song request which we assume to be somehow related to the story. We then performing probabilistic Latent Semantic Analysis (pLSA) to find similar documents and recommend music that are associated to those documents. We evaluate our system by computing the mean reciprocal rank and mean average precision, which are both conventional metrics in evaluating information retrieval systems. The result shows that music similarity and document similarity are closely correlated, and thus it is possible to recommend music purely based on text analysis.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129184174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1