This paper proposes a novel scheme that considers the data hiding with sub sampling and compressive sensing. We utilize the characteristics of compressive sensing, sparsity and random projection, to embed secret data in the observation domain of the sparse image obtained through compressive sensing. The high bit correction rate (BCR) in experiments shows the high accuracy of our proposed method.
{"title":"Data Hiding Based on Subsampling and Compressive Sensing","authors":"Wei Li, Jeng-Shyang Pan, Lijun Yan, Chun-Sheng Yang, Hsiang-Cheh Huang","doi":"10.1109/IIH-MSP.2013.157","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.157","url":null,"abstract":"This paper proposes a novel scheme that considers the data hiding with sub sampling and compressive sensing. We utilize the characteristics of compressive sensing, sparsity and random projection, to embed secret data in the observation domain of the sparse image obtained through compressive sensing. The high bit correction rate (BCR) in experiments shows the high accuracy of our proposed method.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124209427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we investigated on an efficient masker for speech privacy protection. Previously, we proposed and evaluated a speaker-dependent masker which is created from speech of the speaker being masked. This masker was proven to lower the intelligibility of speech at a much lower level than conventional babble maskers. However, this masker needs to be prepared for each potential speaker, and may be expensive to create and maintain. Accordingly, we investigated on an alternative masker, where the speech is masked by a masker created from a different speaker of the same gender. We measured the effectiveness of this gender-dependent masker, and found that male gender-dependent masker is feasible, with efficiency almost equal to the previously proposed speaker-dependent masker. However, female speech was not as effectively masked, and needs further investigation.
{"title":"Towards Gender-Dependent Babble Maskers for Speech Privacy Protection","authors":"K. Kondo, Tomohiro Komiyama, S. Kashiwada","doi":"10.1109/IIH-MSP.2013.77","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.77","url":null,"abstract":"In this paper, we investigated on an efficient masker for speech privacy protection. Previously, we proposed and evaluated a speaker-dependent masker which is created from speech of the speaker being masked. This masker was proven to lower the intelligibility of speech at a much lower level than conventional babble maskers. However, this masker needs to be prepared for each potential speaker, and may be expensive to create and maintain. Accordingly, we investigated on an alternative masker, where the speech is masked by a masker created from a different speaker of the same gender. We measured the effectiveness of this gender-dependent masker, and found that male gender-dependent masker is feasible, with efficiency almost equal to the previously proposed speaker-dependent masker. However, female speech was not as effectively masked, and needs further investigation.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129543411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network Intrusion Detection System (NIDS) monitor traffic on a network looking for suspicious activity, which could be an attack or unauthorized activity. By the Orthogonal Expanded Walsh Code (OEWC) spreading and orthogonality, system can detect intrusion correlation on orthogonality tracking. This orthogonal tracking mechanism based on group matching technique is proposed for NIDSs to detect intrusions and attacks on signal processing. This paper adds survey on BPSK and M-ary QAM OEWC, which can properly support anti-MAI (Multiple-Access Interference) capability on DS-CDMA system. Variable-length characteristic of the OEWC family allows arbitrary code chip, hence, chip length can be chosen to suit the number of users for improving system efficiency and utilization. These together with secure, variable-length and manifold-signal abilities may make OEWC of interest to designers of reliable communications.
{"title":"OEWC-Based Orthogonality Tracking on NIDS","authors":"Yih-Fuh Wang, Meng-Yuan Liao","doi":"10.1109/IIH-MSP.2013.27","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.27","url":null,"abstract":"Network Intrusion Detection System (NIDS) monitor traffic on a network looking for suspicious activity, which could be an attack or unauthorized activity. By the Orthogonal Expanded Walsh Code (OEWC) spreading and orthogonality, system can detect intrusion correlation on orthogonality tracking. This orthogonal tracking mechanism based on group matching technique is proposed for NIDSs to detect intrusions and attacks on signal processing. This paper adds survey on BPSK and M-ary QAM OEWC, which can properly support anti-MAI (Multiple-Access Interference) capability on DS-CDMA system. Variable-length characteristic of the OEWC family allows arbitrary code chip, hence, chip length can be chosen to suit the number of users for improving system efficiency and utilization. These together with secure, variable-length and manifold-signal abilities may make OEWC of interest to designers of reliable communications.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129562514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper analyzes the relationship between macro block (MB) modes and depth values in multiview video plus depth (MVD) format, and proposed a depth based mode decision algorithm for 3D video coding. The depth information was utilized to determine the final mode decision process. The experimental results show the proposed algorithm can reduce the complexity of the mode decision process remarkably while maintaining nearly the same rate distortion performance.
{"title":"A Depth Based Mode Decision Algorithm for 3D Video Coding","authors":"H. Dou, Ke-bin Jia","doi":"10.1109/IIH-MSP.2013.41","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.41","url":null,"abstract":"This paper analyzes the relationship between macro block (MB) modes and depth values in multiview video plus depth (MVD) format, and proposed a depth based mode decision algorithm for 3D video coding. The depth information was utilized to determine the final mode decision process. The experimental results show the proposed algorithm can reduce the complexity of the mode decision process remarkably while maintaining nearly the same rate distortion performance.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thi Thi Zin, I. Oka, Takuya Sasayama, S. Ata, Hitoshi Watanabe, H. Sasano
This paper proposes an image processing approach to automatic scoring system for archery targets. Specifically, the proposed system first performs Morphological operations on the target image to obtain thick boundaries of the arrow hits and then the image segmentation process is applied to segment the target area by using color and shape features. In doing so, a dynamic thresholding is applied to handle the possible effects of illumination variations and the bull's eyes or the target concentric circles are segmented by using geometrical properties of circles and ellipses to calculate hit scores. Thus the system can have a capability of scoring inside and outside the concentric circles separately. The proposed method is tested by using our own video sequences taken in the self-conducted experiments performed by four archers on two different days shooting 6 arrows. The test results show that the proposed scoring system is promising with an accuracy rate of 100%.
{"title":"Image Processing Approach to Automatic Scoring System for Archery Targets","authors":"Thi Thi Zin, I. Oka, Takuya Sasayama, S. Ata, Hitoshi Watanabe, H. Sasano","doi":"10.1109/IIH-MSP.2013.73","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.73","url":null,"abstract":"This paper proposes an image processing approach to automatic scoring system for archery targets. Specifically, the proposed system first performs Morphological operations on the target image to obtain thick boundaries of the arrow hits and then the image segmentation process is applied to segment the target area by using color and shape features. In doing so, a dynamic thresholding is applied to handle the possible effects of illumination variations and the bull's eyes or the target concentric circles are segmented by using geometrical properties of circles and ellipses to calculate hit scores. Thus the system can have a capability of scoring inside and outside the concentric circles separately. The proposed method is tested by using our own video sequences taken in the self-conducted experiments performed by four archers on two different days shooting 6 arrows. The test results show that the proposed scoring system is promising with an accuracy rate of 100%.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126664133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Electronic image stabilization (EIS) technology is an important research area of video processing and computer vision. This paper presented a set of fast and parallel EIS algorithms. Firstly, this paper proposed a fast local motion vector (LMV) estimation algorithm based on the FAST feature to solve the problem that the traditional algorithm is too complex. Secondly, a parallel global motion vector (GMV) algorithm based on image division is designed, which computes every LMV simultaneously, and then estimates the GMV by all LMVs. Finally, based on the proposed algorithm, an EIS systems based on BF609 dual-core DSP processor is designed and implemented. Experiment results show that the algorithm and system presented in this thesis can effectively stabilize jittery video and achieve high real-time performance. When dealing with PAL standard video, the total time cost is less than 40ms.
{"title":"Design and Implementation of Electronic Image Stabilization System Based on Dual-Core DSP","authors":"Haolong Zhang, Qiang Wu, Tianqi Liu, Xuwen Li","doi":"10.1109/IIH-MSP.2013.38","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.38","url":null,"abstract":"Electronic image stabilization (EIS) technology is an important research area of video processing and computer vision. This paper presented a set of fast and parallel EIS algorithms. Firstly, this paper proposed a fast local motion vector (LMV) estimation algorithm based on the FAST feature to solve the problem that the traditional algorithm is too complex. Secondly, a parallel global motion vector (GMV) algorithm based on image division is designed, which computes every LMV simultaneously, and then estimates the GMV by all LMVs. Finally, based on the proposed algorithm, an EIS systems based on BF609 dual-core DSP processor is designed and implemented. Experiment results show that the algorithm and system presented in this thesis can effectively stabilize jittery video and achieve high real-time performance. When dealing with PAL standard video, the total time cost is less than 40ms.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125741948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reversible data hiding is one of the popular topics in watermarking researches, and it belongs to the branch of digital rights management (DRM) applications. Similar to conventional watermarking techniques, for reversible data hiding, at the encoder, secret information can be embedded into original images, and the marked image can be obtained. Different from conventional watermarking, due to the term 'reversible', it implies that at the decoder, both the original image and embedded secret should be perfectly separated from marked image. It requires keeping the reversibility of proposed algorithm, while looking for good image quality and large amount of secret for embedding. With the prediction-based algorithm, output image can be predicted, and differences between original and predicted images can be altered to make reversible data hiding possible. We also utilize inherent characteristics of original images for reaching better performances. Simulation results reveal that with our algorithm, comparable or better performances can be observed due to the characteristics from different images.
{"title":"Prediction-Based Reversible Data Hiding with Content Characteristics","authors":"Hsiang-Cheh Huang, Chuan-Chang Lin, Feng-Cheng Chang","doi":"10.1109/IIH-MSP.2013.12","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.12","url":null,"abstract":"Reversible data hiding is one of the popular topics in watermarking researches, and it belongs to the branch of digital rights management (DRM) applications. Similar to conventional watermarking techniques, for reversible data hiding, at the encoder, secret information can be embedded into original images, and the marked image can be obtained. Different from conventional watermarking, due to the term 'reversible', it implies that at the decoder, both the original image and embedded secret should be perfectly separated from marked image. It requires keeping the reversibility of proposed algorithm, while looking for good image quality and large amount of secret for embedding. With the prediction-based algorithm, output image can be predicted, and differences between original and predicted images can be altered to make reversible data hiding possible. We also utilize inherent characteristics of original images for reaching better performances. Simulation results reveal that with our algorithm, comparable or better performances can be observed due to the characteristics from different images.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125846860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.168
Bin Zhu
Due to the electromagnetic radiation interference, it is recommended to prohibit using mobile stations in the area of industrial buildings in the power plant. While pagers are successfully applied, there are many drawbacks for the pagers in the nuclear power plant. This paper proposes a working method for the mobile station in the nuclear power plant. By the way of simple improvements in the mobile station and the base station, the defects of the pagers are overcome, the issue of prohibiting using mobile stations in area of industrial building in the nuclear power plant is solved and potential safety problems due to human factors for not turning off mobile stations are eliminated.
{"title":"A Working Method for Mobile Station in Nuclear Power Plant","authors":"Bin Zhu","doi":"10.1109/IIH-MSP.2013.168","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.168","url":null,"abstract":"Due to the electromagnetic radiation interference, it is recommended to prohibit using mobile stations in the area of industrial buildings in the power plant. While pagers are successfully applied, there are many drawbacks for the pagers in the nuclear power plant. This paper proposes a working method for the mobile station in the nuclear power plant. By the way of simple improvements in the mobile station and the base station, the defects of the pagers are overcome, the issue of prohibiting using mobile stations in area of industrial building in the nuclear power plant is solved and potential safety problems due to human factors for not turning off mobile stations are eliminated.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121516921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.135
Alexandros Iosifidis, A. Tefas, I. Pitas
While single-view human action recognition has attracted considerable research study in the last three decades, multi-view action recognition is, still, a less exploited field. This paper provides a comprehensive survey of multi-view human action recognition approaches. The approaches are reviewed following an application-based categorization: methods are categorized based on their ability to operate using a fixed or an arbitrary number of cameras. Finally, benchmark databases frequently used for evaluation of multi-view approaches are briefly described.
{"title":"Multi-view Human Action Recognition: A Survey","authors":"Alexandros Iosifidis, A. Tefas, I. Pitas","doi":"10.1109/IIH-MSP.2013.135","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.135","url":null,"abstract":"While single-view human action recognition has attracted considerable research study in the last three decades, multi-view action recognition is, still, a less exploited field. This paper provides a comprehensive survey of multi-view human action recognition approaches. The approaches are reviewed following an application-based categorization: methods are categorized based on their ability to operate using a fixed or an arbitrary number of cameras. Finally, benchmark databases frequently used for evaluation of multi-view approaches are briefly described.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129017567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.123
Ziwon Hyung, Kyogu Lee
Recommending music that satisfies the user's taste has been a challenging problem. Previous works on music recommendation system focused on the user's purchase history or the content of the music. In this paper, we propose a music recommendation system purely based on analyzing textual input of the users. We first mine a large corpus of Korean radio episodes, which is written by the listener. Each episode is composed of a personal story and a song request which we assume to be somehow related to the story. We then performing probabilistic Latent Semantic Analysis (pLSA) to find similar documents and recommend music that are associated to those documents. We evaluate our system by computing the mean reciprocal rank and mean average precision, which are both conventional metrics in evaluating information retrieval systems. The result shows that music similarity and document similarity are closely correlated, and thus it is possible to recommend music purely based on text analysis.
{"title":"Recommending Music Based on Probabilistic Latent Semantic Analysis on Korean Radio Episodes","authors":"Ziwon Hyung, Kyogu Lee","doi":"10.1109/IIH-MSP.2013.123","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.123","url":null,"abstract":"Recommending music that satisfies the user's taste has been a challenging problem. Previous works on music recommendation system focused on the user's purchase history or the content of the music. In this paper, we propose a music recommendation system purely based on analyzing textual input of the users. We first mine a large corpus of Korean radio episodes, which is written by the listener. Each episode is composed of a personal story and a song request which we assume to be somehow related to the story. We then performing probabilistic Latent Semantic Analysis (pLSA) to find similar documents and recommend music that are associated to those documents. We evaluate our system by computing the mean reciprocal rank and mean average precision, which are both conventional metrics in evaluating information retrieval systems. The result shows that music similarity and document similarity are closely correlated, and thus it is possible to recommend music purely based on text analysis.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129184174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}