Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.166
Jieru Liu, Caiyun Ding, Quanbing Yao
As the core information system, the Unified Process Management (UPM) system covers the critical business processes in large enterprises. To achieve stable operation of the system and high quality of the processes is the key requirements from these enterprises. The original UPM system has ambiguous IT roles and responsibilities and lacks of important management schemes in the course of software development, such as requirement management scheme, test management scheme, system design and evaluation scheme, system release scheme, documentation management scheme, etc. The present UPM system achieves great improvements by establishing quality improvement model based on CMMI3 in many aspects, such as clear IT roles and responsibilities, planned release, establishment of requirements management scheme and document management scheme, etc. And also the system improves stability and process quality and eventually wins high customer satisfaction. This article mainly describes the quality improvement practices of the UPM system based on CMMI3.
{"title":"The Quality Improvement on UPM System in the Nuclear Power Corporation","authors":"Jieru Liu, Caiyun Ding, Quanbing Yao","doi":"10.1109/IIH-MSP.2013.166","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.166","url":null,"abstract":"As the core information system, the Unified Process Management (UPM) system covers the critical business processes in large enterprises. To achieve stable operation of the system and high quality of the processes is the key requirements from these enterprises. The original UPM system has ambiguous IT roles and responsibilities and lacks of important management schemes in the course of software development, such as requirement management scheme, test management scheme, system design and evaluation scheme, system release scheme, documentation management scheme, etc. The present UPM system achieves great improvements by establishing quality improvement model based on CMMI3 in many aspects, such as clear IT roles and responsibilities, planned release, establishment of requirements management scheme and document management scheme, etc. And also the system improves stability and process quality and eventually wins high customer satisfaction. This article mainly describes the quality improvement practices of the UPM system based on CMMI3.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123931416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.100
Yan-yan Han, Yixiao Shang, Wen-cai He
Considering the combination of digital watermarking technique and visual cryptography, this paper proposes a new dual watermarking algorithm of color image. The first watermark is embedded into the high-frequency part of discrete wavelet transform (DWT). Using visual cryptography, we process the second watermark to generate two shares, then one of them is embedded into the low-frequency part of DWT and another is protected by the copyright. The experimental results show that this kind of new algorithm has high security. In addition, the embedding capacity of watermarks and robustness are improved effectively.
{"title":"DWT-Domain Dual Watermarking Algorithm of Color Image Based on Visual Cryptography","authors":"Yan-yan Han, Yixiao Shang, Wen-cai He","doi":"10.1109/IIH-MSP.2013.100","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.100","url":null,"abstract":"Considering the combination of digital watermarking technique and visual cryptography, this paper proposes a new dual watermarking algorithm of color image. The first watermark is embedded into the high-frequency part of discrete wavelet transform (DWT). Using visual cryptography, we process the second watermark to generate two shares, then one of them is embedded into the low-frequency part of DWT and another is protected by the copyright. The experimental results show that this kind of new algorithm has high security. In addition, the embedding capacity of watermarks and robustness are improved effectively.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124116944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.135
Alexandros Iosifidis, A. Tefas, I. Pitas
While single-view human action recognition has attracted considerable research study in the last three decades, multi-view action recognition is, still, a less exploited field. This paper provides a comprehensive survey of multi-view human action recognition approaches. The approaches are reviewed following an application-based categorization: methods are categorized based on their ability to operate using a fixed or an arbitrary number of cameras. Finally, benchmark databases frequently used for evaluation of multi-view approaches are briefly described.
{"title":"Multi-view Human Action Recognition: A Survey","authors":"Alexandros Iosifidis, A. Tefas, I. Pitas","doi":"10.1109/IIH-MSP.2013.135","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.135","url":null,"abstract":"While single-view human action recognition has attracted considerable research study in the last three decades, multi-view action recognition is, still, a less exploited field. This paper provides a comprehensive survey of multi-view human action recognition approaches. The approaches are reviewed following an application-based categorization: methods are categorized based on their ability to operate using a fixed or an arbitrary number of cameras. Finally, benchmark databases frequently used for evaluation of multi-view approaches are briefly described.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129017567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network Intrusion Detection System (NIDS) monitor traffic on a network looking for suspicious activity, which could be an attack or unauthorized activity. By the Orthogonal Expanded Walsh Code (OEWC) spreading and orthogonality, system can detect intrusion correlation on orthogonality tracking. This orthogonal tracking mechanism based on group matching technique is proposed for NIDSs to detect intrusions and attacks on signal processing. This paper adds survey on BPSK and M-ary QAM OEWC, which can properly support anti-MAI (Multiple-Access Interference) capability on DS-CDMA system. Variable-length characteristic of the OEWC family allows arbitrary code chip, hence, chip length can be chosen to suit the number of users for improving system efficiency and utilization. These together with secure, variable-length and manifold-signal abilities may make OEWC of interest to designers of reliable communications.
{"title":"OEWC-Based Orthogonality Tracking on NIDS","authors":"Yih-Fuh Wang, Meng-Yuan Liao","doi":"10.1109/IIH-MSP.2013.27","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.27","url":null,"abstract":"Network Intrusion Detection System (NIDS) monitor traffic on a network looking for suspicious activity, which could be an attack or unauthorized activity. By the Orthogonal Expanded Walsh Code (OEWC) spreading and orthogonality, system can detect intrusion correlation on orthogonality tracking. This orthogonal tracking mechanism based on group matching technique is proposed for NIDSs to detect intrusions and attacks on signal processing. This paper adds survey on BPSK and M-ary QAM OEWC, which can properly support anti-MAI (Multiple-Access Interference) capability on DS-CDMA system. Variable-length characteristic of the OEWC family allows arbitrary code chip, hence, chip length can be chosen to suit the number of users for improving system efficiency and utilization. These together with secure, variable-length and manifold-signal abilities may make OEWC of interest to designers of reliable communications.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129562514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we investigated on an efficient masker for speech privacy protection. Previously, we proposed and evaluated a speaker-dependent masker which is created from speech of the speaker being masked. This masker was proven to lower the intelligibility of speech at a much lower level than conventional babble maskers. However, this masker needs to be prepared for each potential speaker, and may be expensive to create and maintain. Accordingly, we investigated on an alternative masker, where the speech is masked by a masker created from a different speaker of the same gender. We measured the effectiveness of this gender-dependent masker, and found that male gender-dependent masker is feasible, with efficiency almost equal to the previously proposed speaker-dependent masker. However, female speech was not as effectively masked, and needs further investigation.
{"title":"Towards Gender-Dependent Babble Maskers for Speech Privacy Protection","authors":"K. Kondo, Tomohiro Komiyama, S. Kashiwada","doi":"10.1109/IIH-MSP.2013.77","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.77","url":null,"abstract":"In this paper, we investigated on an efficient masker for speech privacy protection. Previously, we proposed and evaluated a speaker-dependent masker which is created from speech of the speaker being masked. This masker was proven to lower the intelligibility of speech at a much lower level than conventional babble maskers. However, this masker needs to be prepared for each potential speaker, and may be expensive to create and maintain. Accordingly, we investigated on an alternative masker, where the speech is masked by a masker created from a different speaker of the same gender. We measured the effectiveness of this gender-dependent masker, and found that male gender-dependent masker is feasible, with efficiency almost equal to the previously proposed speaker-dependent masker. However, female speech was not as effectively masked, and needs further investigation.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129543411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper analyzes the relationship between macro block (MB) modes and depth values in multiview video plus depth (MVD) format, and proposed a depth based mode decision algorithm for 3D video coding. The depth information was utilized to determine the final mode decision process. The experimental results show the proposed algorithm can reduce the complexity of the mode decision process remarkably while maintaining nearly the same rate distortion performance.
{"title":"A Depth Based Mode Decision Algorithm for 3D Video Coding","authors":"H. Dou, Ke-bin Jia","doi":"10.1109/IIH-MSP.2013.41","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.41","url":null,"abstract":"This paper analyzes the relationship between macro block (MB) modes and depth values in multiview video plus depth (MVD) format, and proposed a depth based mode decision algorithm for 3D video coding. The depth information was utilized to determine the final mode decision process. The experimental results show the proposed algorithm can reduce the complexity of the mode decision process remarkably while maintaining nearly the same rate distortion performance.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reversible data hiding is one of the popular topics in watermarking researches, and it belongs to the branch of digital rights management (DRM) applications. Similar to conventional watermarking techniques, for reversible data hiding, at the encoder, secret information can be embedded into original images, and the marked image can be obtained. Different from conventional watermarking, due to the term 'reversible', it implies that at the decoder, both the original image and embedded secret should be perfectly separated from marked image. It requires keeping the reversibility of proposed algorithm, while looking for good image quality and large amount of secret for embedding. With the prediction-based algorithm, output image can be predicted, and differences between original and predicted images can be altered to make reversible data hiding possible. We also utilize inherent characteristics of original images for reaching better performances. Simulation results reveal that with our algorithm, comparable or better performances can be observed due to the characteristics from different images.
{"title":"Prediction-Based Reversible Data Hiding with Content Characteristics","authors":"Hsiang-Cheh Huang, Chuan-Chang Lin, Feng-Cheng Chang","doi":"10.1109/IIH-MSP.2013.12","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.12","url":null,"abstract":"Reversible data hiding is one of the popular topics in watermarking researches, and it belongs to the branch of digital rights management (DRM) applications. Similar to conventional watermarking techniques, for reversible data hiding, at the encoder, secret information can be embedded into original images, and the marked image can be obtained. Different from conventional watermarking, due to the term 'reversible', it implies that at the decoder, both the original image and embedded secret should be perfectly separated from marked image. It requires keeping the reversibility of proposed algorithm, while looking for good image quality and large amount of secret for embedding. With the prediction-based algorithm, output image can be predicted, and differences between original and predicted images can be altered to make reversible data hiding possible. We also utilize inherent characteristics of original images for reaching better performances. Simulation results reveal that with our algorithm, comparable or better performances can be observed due to the characteristics from different images.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125846860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Electronic image stabilization (EIS) technology is an important research area of video processing and computer vision. This paper presented a set of fast and parallel EIS algorithms. Firstly, this paper proposed a fast local motion vector (LMV) estimation algorithm based on the FAST feature to solve the problem that the traditional algorithm is too complex. Secondly, a parallel global motion vector (GMV) algorithm based on image division is designed, which computes every LMV simultaneously, and then estimates the GMV by all LMVs. Finally, based on the proposed algorithm, an EIS systems based on BF609 dual-core DSP processor is designed and implemented. Experiment results show that the algorithm and system presented in this thesis can effectively stabilize jittery video and achieve high real-time performance. When dealing with PAL standard video, the total time cost is less than 40ms.
{"title":"Design and Implementation of Electronic Image Stabilization System Based on Dual-Core DSP","authors":"Haolong Zhang, Qiang Wu, Tianqi Liu, Xuwen Li","doi":"10.1109/IIH-MSP.2013.38","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.38","url":null,"abstract":"Electronic image stabilization (EIS) technology is an important research area of video processing and computer vision. This paper presented a set of fast and parallel EIS algorithms. Firstly, this paper proposed a fast local motion vector (LMV) estimation algorithm based on the FAST feature to solve the problem that the traditional algorithm is too complex. Secondly, a parallel global motion vector (GMV) algorithm based on image division is designed, which computes every LMV simultaneously, and then estimates the GMV by all LMVs. Finally, based on the proposed algorithm, an EIS systems based on BF609 dual-core DSP processor is designed and implemented. Experiment results show that the algorithm and system presented in this thesis can effectively stabilize jittery video and achieve high real-time performance. When dealing with PAL standard video, the total time cost is less than 40ms.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125741948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.126
Chin-Feng Lee, Chinchen Chang, Cheng-You Gao
This paper is a two staged multi-layer reversible data hiding scheme based on Lagrange interpolation. Lagrange interpolation will cross applied on odd and even pixels to produce predicted images, and then histogram shifting modification will be applied to embed confidential data into the differences between predicted and original images. The experimental results show the quality of Lena image from this scheme has a PSNR value of 66.88dB and a embedding capacity of 0.1bpp, for one level. For 10 levels, the embedding capacity is 2.17 bpp and the scheme can still maintain a high PSNR value of 45dB, which means this algorithm is more efficient than the algorithms from Ni et al. and Tai et al, for both quality and embedding capacity.
{"title":"A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation","authors":"Chin-Feng Lee, Chinchen Chang, Cheng-You Gao","doi":"10.1109/IIH-MSP.2013.126","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.126","url":null,"abstract":"This paper is a two staged multi-layer reversible data hiding scheme based on Lagrange interpolation. Lagrange interpolation will cross applied on odd and even pixels to produce predicted images, and then histogram shifting modification will be applied to embed confidential data into the differences between predicted and original images. The experimental results show the quality of Lena image from this scheme has a PSNR value of 66.88dB and a embedding capacity of 0.1bpp, for one level. For 10 levels, the embedding capacity is 2.17 bpp and the scheme can still maintain a high PSNR value of 45dB, which means this algorithm is more efficient than the algorithms from Ni et al. and Tai et al, for both quality and embedding capacity.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121051019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thi Thi Zin, I. Oka, Takuya Sasayama, S. Ata, Hitoshi Watanabe, H. Sasano
This paper proposes an image processing approach to automatic scoring system for archery targets. Specifically, the proposed system first performs Morphological operations on the target image to obtain thick boundaries of the arrow hits and then the image segmentation process is applied to segment the target area by using color and shape features. In doing so, a dynamic thresholding is applied to handle the possible effects of illumination variations and the bull's eyes or the target concentric circles are segmented by using geometrical properties of circles and ellipses to calculate hit scores. Thus the system can have a capability of scoring inside and outside the concentric circles separately. The proposed method is tested by using our own video sequences taken in the self-conducted experiments performed by four archers on two different days shooting 6 arrows. The test results show that the proposed scoring system is promising with an accuracy rate of 100%.
{"title":"Image Processing Approach to Automatic Scoring System for Archery Targets","authors":"Thi Thi Zin, I. Oka, Takuya Sasayama, S. Ata, Hitoshi Watanabe, H. Sasano","doi":"10.1109/IIH-MSP.2013.73","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.73","url":null,"abstract":"This paper proposes an image processing approach to automatic scoring system for archery targets. Specifically, the proposed system first performs Morphological operations on the target image to obtain thick boundaries of the arrow hits and then the image segmentation process is applied to segment the target area by using color and shape features. In doing so, a dynamic thresholding is applied to handle the possible effects of illumination variations and the bull's eyes or the target concentric circles are segmented by using geometrical properties of circles and ellipses to calculate hit scores. Thus the system can have a capability of scoring inside and outside the concentric circles separately. The proposed method is tested by using our own video sequences taken in the self-conducted experiments performed by four archers on two different days shooting 6 arrows. The test results show that the proposed scoring system is promising with an accuracy rate of 100%.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126664133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}