首页 > 最新文献

2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing最新文献

英文 中文
The Quality Improvement on UPM System in the Nuclear Power Corporation 核电公司UPM系统的质量改进
Jieru Liu, Caiyun Ding, Quanbing Yao
As the core information system, the Unified Process Management (UPM) system covers the critical business processes in large enterprises. To achieve stable operation of the system and high quality of the processes is the key requirements from these enterprises. The original UPM system has ambiguous IT roles and responsibilities and lacks of important management schemes in the course of software development, such as requirement management scheme, test management scheme, system design and evaluation scheme, system release scheme, documentation management scheme, etc. The present UPM system achieves great improvements by establishing quality improvement model based on CMMI3 in many aspects, such as clear IT roles and responsibilities, planned release, establishment of requirements management scheme and document management scheme, etc. And also the system improves stability and process quality and eventually wins high customer satisfaction. This article mainly describes the quality improvement practices of the UPM system based on CMMI3.
统一流程管理(UPM)系统作为核心信息系统,涵盖了大型企业的关键业务流程。实现系统的稳定运行和过程的高质量是这些企业的关键要求。原有的UPM系统IT角色和职责模糊,缺乏软件开发过程中重要的管理方案,如需求管理方案、测试管理方案、系统设计与评估方案、系统发布方案、文档管理方案等。现有的UPM系统通过建立基于CMMI3的质量改进模型,在明确IT角色和职责、计划发布、建立需求管理方案和文档管理方案等方面取得了很大的改进。提高了系统的稳定性和工艺质量,最终赢得了较高的客户满意度。本文主要描述了基于CMMI3的UPM系统的质量改进实践。
{"title":"The Quality Improvement on UPM System in the Nuclear Power Corporation","authors":"Jieru Liu, Caiyun Ding, Quanbing Yao","doi":"10.1109/IIH-MSP.2013.166","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.166","url":null,"abstract":"As the core information system, the Unified Process Management (UPM) system covers the critical business processes in large enterprises. To achieve stable operation of the system and high quality of the processes is the key requirements from these enterprises. The original UPM system has ambiguous IT roles and responsibilities and lacks of important management schemes in the course of software development, such as requirement management scheme, test management scheme, system design and evaluation scheme, system release scheme, documentation management scheme, etc. The present UPM system achieves great improvements by establishing quality improvement model based on CMMI3 in many aspects, such as clear IT roles and responsibilities, planned release, establishment of requirements management scheme and document management scheme, etc. And also the system improves stability and process quality and eventually wins high customer satisfaction. This article mainly describes the quality improvement practices of the UPM system based on CMMI3.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123931416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DWT-Domain Dual Watermarking Algorithm of Color Image Based on Visual Cryptography 基于视觉密码的彩色图像dwt域双水印算法
Yan-yan Han, Yixiao Shang, Wen-cai He
Considering the combination of digital watermarking technique and visual cryptography, this paper proposes a new dual watermarking algorithm of color image. The first watermark is embedded into the high-frequency part of discrete wavelet transform (DWT). Using visual cryptography, we process the second watermark to generate two shares, then one of them is embedded into the low-frequency part of DWT and another is protected by the copyright. The experimental results show that this kind of new algorithm has high security. In addition, the embedding capacity of watermarks and robustness are improved effectively.
将数字水印技术与视觉密码学相结合,提出了一种新的彩色图像双水印算法。第一个水印嵌入到离散小波变换(DWT)的高频部分。我们利用视觉加密技术对第二个水印进行处理,生成两个共享,其中一个共享嵌入到DWT的低频部分,另一个共享受版权保护。实验结果表明,该算法具有较高的安全性。有效地提高了水印的嵌入能力和鲁棒性。
{"title":"DWT-Domain Dual Watermarking Algorithm of Color Image Based on Visual Cryptography","authors":"Yan-yan Han, Yixiao Shang, Wen-cai He","doi":"10.1109/IIH-MSP.2013.100","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.100","url":null,"abstract":"Considering the combination of digital watermarking technique and visual cryptography, this paper proposes a new dual watermarking algorithm of color image. The first watermark is embedded into the high-frequency part of discrete wavelet transform (DWT). Using visual cryptography, we process the second watermark to generate two shares, then one of them is embedded into the low-frequency part of DWT and another is protected by the copyright. The experimental results show that this kind of new algorithm has high security. In addition, the embedding capacity of watermarks and robustness are improved effectively.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124116944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Multi-view Human Action Recognition: A Survey 多视角人体动作识别研究进展
Alexandros Iosifidis, A. Tefas, I. Pitas
While single-view human action recognition has attracted considerable research study in the last three decades, multi-view action recognition is, still, a less exploited field. This paper provides a comprehensive survey of multi-view human action recognition approaches. The approaches are reviewed following an application-based categorization: methods are categorized based on their ability to operate using a fixed or an arbitrary number of cameras. Finally, benchmark databases frequently used for evaluation of multi-view approaches are briefly described.
在过去的三十年里,单视角人体动作识别已经引起了大量的研究,而多视角动作识别仍然是一个较少开发的领域。本文对多视角人体动作识别方法进行了综述。对这些方法进行了基于应用程序的分类:方法根据其使用固定或任意数量的摄像机的操作能力进行分类。最后,简要介绍了多视图方法评估中常用的基准数据库。
{"title":"Multi-view Human Action Recognition: A Survey","authors":"Alexandros Iosifidis, A. Tefas, I. Pitas","doi":"10.1109/IIH-MSP.2013.135","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.135","url":null,"abstract":"While single-view human action recognition has attracted considerable research study in the last three decades, multi-view action recognition is, still, a less exploited field. This paper provides a comprehensive survey of multi-view human action recognition approaches. The approaches are reviewed following an application-based categorization: methods are categorized based on their ability to operate using a fixed or an arbitrary number of cameras. Finally, benchmark databases frequently used for evaluation of multi-view approaches are briefly described.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129017567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
OEWC-Based Orthogonality Tracking on NIDS 基于oewc的NIDS正交跟踪
Yih-Fuh Wang, Meng-Yuan Liao
Network Intrusion Detection System (NIDS) monitor traffic on a network looking for suspicious activity, which could be an attack or unauthorized activity. By the Orthogonal Expanded Walsh Code (OEWC) spreading and orthogonality, system can detect intrusion correlation on orthogonality tracking. This orthogonal tracking mechanism based on group matching technique is proposed for NIDSs to detect intrusions and attacks on signal processing. This paper adds survey on BPSK and M-ary QAM OEWC, which can properly support anti-MAI (Multiple-Access Interference) capability on DS-CDMA system. Variable-length characteristic of the OEWC family allows arbitrary code chip, hence, chip length can be chosen to suit the number of users for improving system efficiency and utilization. These together with secure, variable-length and manifold-signal abilities may make OEWC of interest to designers of reliable communications.
网络入侵检测系统(NIDS)监视网络上的流量,查找可疑活动,这些活动可能是攻击或未经授权的活动。通过正交扩展沃尔什码(OEWC)的扩展和正交性,系统可以通过正交跟踪检测入侵相关性。提出了一种基于组匹配技术的正交跟踪机制,用于检测信号处理系统的入侵和攻击。本文对BPSK和M-ary QAM OEWC进行了研究,它们能够很好地支持DS-CDMA系统的抗多址干扰能力。OEWC系列的变长特性允许任意编码芯片,因此可以根据用户数量选择芯片长度,以提高系统效率和利用率。这些与安全,可变长度和歧管信号能力一起,可能使OEWC对可靠通信的设计者感兴趣。
{"title":"OEWC-Based Orthogonality Tracking on NIDS","authors":"Yih-Fuh Wang, Meng-Yuan Liao","doi":"10.1109/IIH-MSP.2013.27","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.27","url":null,"abstract":"Network Intrusion Detection System (NIDS) monitor traffic on a network looking for suspicious activity, which could be an attack or unauthorized activity. By the Orthogonal Expanded Walsh Code (OEWC) spreading and orthogonality, system can detect intrusion correlation on orthogonality tracking. This orthogonal tracking mechanism based on group matching technique is proposed for NIDSs to detect intrusions and attacks on signal processing. This paper adds survey on BPSK and M-ary QAM OEWC, which can properly support anti-MAI (Multiple-Access Interference) capability on DS-CDMA system. Variable-length characteristic of the OEWC family allows arbitrary code chip, hence, chip length can be chosen to suit the number of users for improving system efficiency and utilization. These together with secure, variable-length and manifold-signal abilities may make OEWC of interest to designers of reliable communications.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129562514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Gender-Dependent Babble Maskers for Speech Privacy Protection 基于性别的胡言乱语面罩的言论隐私保护
K. Kondo, Tomohiro Komiyama, S. Kashiwada
In this paper, we investigated on an efficient masker for speech privacy protection. Previously, we proposed and evaluated a speaker-dependent masker which is created from speech of the speaker being masked. This masker was proven to lower the intelligibility of speech at a much lower level than conventional babble maskers. However, this masker needs to be prepared for each potential speaker, and may be expensive to create and maintain. Accordingly, we investigated on an alternative masker, where the speech is masked by a masker created from a different speaker of the same gender. We measured the effectiveness of this gender-dependent masker, and found that male gender-dependent masker is feasible, with efficiency almost equal to the previously proposed speaker-dependent masker. However, female speech was not as effectively masked, and needs further investigation.
本文研究了一种有效的语音隐私保护掩蔽器。之前,我们提出并评估了一个依赖于说话人的掩蔽器,该掩蔽器是由被掩蔽说话人的语音创建的。这种面具被证明比传统的胡言乱语面具在更低的水平上降低了言语的可理解性。然而,这个掩蔽器需要为每个潜在的演讲者准备,并且可能是昂贵的创建和维护。因此,我们研究了一种替代面具,其中演讲被由同一性别的不同演讲者创建的面具所掩盖。我们测量了这种性别依赖掩蔽器的有效性,发现男性性别依赖掩蔽器是可行的,其效率几乎与先前提出的说话人依赖掩蔽器相当。然而,女性的言语并没有被有效地掩盖,这需要进一步的研究。
{"title":"Towards Gender-Dependent Babble Maskers for Speech Privacy Protection","authors":"K. Kondo, Tomohiro Komiyama, S. Kashiwada","doi":"10.1109/IIH-MSP.2013.77","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.77","url":null,"abstract":"In this paper, we investigated on an efficient masker for speech privacy protection. Previously, we proposed and evaluated a speaker-dependent masker which is created from speech of the speaker being masked. This masker was proven to lower the intelligibility of speech at a much lower level than conventional babble maskers. However, this masker needs to be prepared for each potential speaker, and may be expensive to create and maintain. Accordingly, we investigated on an alternative masker, where the speech is masked by a masker created from a different speaker of the same gender. We measured the effectiveness of this gender-dependent masker, and found that male gender-dependent masker is feasible, with efficiency almost equal to the previously proposed speaker-dependent masker. However, female speech was not as effectively masked, and needs further investigation.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129543411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Depth Based Mode Decision Algorithm for 3D Video Coding 基于深度的三维视频编码模式决策算法
H. Dou, Ke-bin Jia
This paper analyzes the relationship between macro block (MB) modes and depth values in multiview video plus depth (MVD) format, and proposed a depth based mode decision algorithm for 3D video coding. The depth information was utilized to determine the final mode decision process. The experimental results show the proposed algorithm can reduce the complexity of the mode decision process remarkably while maintaining nearly the same rate distortion performance.
分析了多视点视频加深度(MVD)格式中宏块(MB)模式与深度值之间的关系,提出了一种基于深度的3D视频编码模式决策算法。利用深度信息确定最终的模式决策过程。实验结果表明,该算法在保持几乎相同的率失真性能的同时,显著降低了模式决策过程的复杂度。
{"title":"A Depth Based Mode Decision Algorithm for 3D Video Coding","authors":"H. Dou, Ke-bin Jia","doi":"10.1109/IIH-MSP.2013.41","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.41","url":null,"abstract":"This paper analyzes the relationship between macro block (MB) modes and depth values in multiview video plus depth (MVD) format, and proposed a depth based mode decision algorithm for 3D video coding. The depth information was utilized to determine the final mode decision process. The experimental results show the proposed algorithm can reduce the complexity of the mode decision process remarkably while maintaining nearly the same rate distortion performance.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction-Based Reversible Data Hiding with Content Characteristics 具有内容特征的基于预测的可逆数据隐藏
Hsiang-Cheh Huang, Chuan-Chang Lin, Feng-Cheng Chang
Reversible data hiding is one of the popular topics in watermarking researches, and it belongs to the branch of digital rights management (DRM) applications. Similar to conventional watermarking techniques, for reversible data hiding, at the encoder, secret information can be embedded into original images, and the marked image can be obtained. Different from conventional watermarking, due to the term 'reversible', it implies that at the decoder, both the original image and embedded secret should be perfectly separated from marked image. It requires keeping the reversibility of proposed algorithm, while looking for good image quality and large amount of secret for embedding. With the prediction-based algorithm, output image can be predicted, and differences between original and predicted images can be altered to make reversible data hiding possible. We also utilize inherent characteristics of original images for reaching better performances. Simulation results reveal that with our algorithm, comparable or better performances can be observed due to the characteristics from different images.
可逆数据隐藏是水印研究的热点之一,属于数字版权管理(DRM)应用的一个分支。与传统的水印技术类似,为了实现数据的可逆隐藏,在编码器处,可以将秘密信息嵌入到原始图像中,从而获得标记后的图像。与传统水印不同的是,由于“可逆”一词,它意味着在解码器处,原始图像和嵌入的秘密都必须与被标记的图像完美分离。它要求保持算法的可逆性,同时寻找良好的图像质量和大量的秘密进行嵌入。利用基于预测的算法,可以预测输出图像,并且可以改变原始图像与预测图像之间的差异,从而实现可逆的数据隐藏。我们还利用原始图像的固有特性来达到更好的性能。仿真结果表明,由于不同图像的特征,我们的算法可以观察到相当或更好的性能。
{"title":"Prediction-Based Reversible Data Hiding with Content Characteristics","authors":"Hsiang-Cheh Huang, Chuan-Chang Lin, Feng-Cheng Chang","doi":"10.1109/IIH-MSP.2013.12","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.12","url":null,"abstract":"Reversible data hiding is one of the popular topics in watermarking researches, and it belongs to the branch of digital rights management (DRM) applications. Similar to conventional watermarking techniques, for reversible data hiding, at the encoder, secret information can be embedded into original images, and the marked image can be obtained. Different from conventional watermarking, due to the term 'reversible', it implies that at the decoder, both the original image and embedded secret should be perfectly separated from marked image. It requires keeping the reversibility of proposed algorithm, while looking for good image quality and large amount of secret for embedding. With the prediction-based algorithm, output image can be predicted, and differences between original and predicted images can be altered to make reversible data hiding possible. We also utilize inherent characteristics of original images for reaching better performances. Simulation results reveal that with our algorithm, comparable or better performances can be observed due to the characteristics from different images.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125846860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and Implementation of Electronic Image Stabilization System Based on Dual-Core DSP 基于双核DSP的电子稳像系统的设计与实现
Haolong Zhang, Qiang Wu, Tianqi Liu, Xuwen Li
Electronic image stabilization (EIS) technology is an important research area of video processing and computer vision. This paper presented a set of fast and parallel EIS algorithms. Firstly, this paper proposed a fast local motion vector (LMV) estimation algorithm based on the FAST feature to solve the problem that the traditional algorithm is too complex. Secondly, a parallel global motion vector (GMV) algorithm based on image division is designed, which computes every LMV simultaneously, and then estimates the GMV by all LMVs. Finally, based on the proposed algorithm, an EIS systems based on BF609 dual-core DSP processor is designed and implemented. Experiment results show that the algorithm and system presented in this thesis can effectively stabilize jittery video and achieve high real-time performance. When dealing with PAL standard video, the total time cost is less than 40ms.
电子稳像技术是视频处理和计算机视觉领域的一个重要研究方向。本文提出了一套快速并行的EIS算法。首先,针对传统算法过于复杂的问题,提出了一种基于fast特征的快速局部运动矢量(LMV)估计算法。其次,设计了一种基于图像分割的并行全局运动矢量(GMV)算法,该算法同时计算每个LMV,然后由所有LMV对GMV进行估计;最后,基于所提出的算法,设计并实现了一个基于BF609双核DSP处理器的EIS系统。实验结果表明,本文提出的算法和系统能够有效地稳定抖动视频,达到较高的实时性。在处理PAL标准视频时,总时间成本小于40ms。
{"title":"Design and Implementation of Electronic Image Stabilization System Based on Dual-Core DSP","authors":"Haolong Zhang, Qiang Wu, Tianqi Liu, Xuwen Li","doi":"10.1109/IIH-MSP.2013.38","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.38","url":null,"abstract":"Electronic image stabilization (EIS) technology is an important research area of video processing and computer vision. This paper presented a set of fast and parallel EIS algorithms. Firstly, this paper proposed a fast local motion vector (LMV) estimation algorithm based on the FAST feature to solve the problem that the traditional algorithm is too complex. Secondly, a parallel global motion vector (GMV) algorithm based on image division is designed, which computes every LMV simultaneously, and then estimates the GMV by all LMVs. Finally, based on the proposed algorithm, an EIS systems based on BF609 dual-core DSP processor is designed and implemented. Experiment results show that the algorithm and system presented in this thesis can effectively stabilize jittery video and achieve high real-time performance. When dealing with PAL standard video, the total time cost is less than 40ms.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125741948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation 利用拉格朗日插值的两阶段多级可逆数据隐藏
Chin-Feng Lee, Chinchen Chang, Cheng-You Gao
This paper is a two staged multi-layer reversible data hiding scheme based on Lagrange interpolation. Lagrange interpolation will cross applied on odd and even pixels to produce predicted images, and then histogram shifting modification will be applied to embed confidential data into the differences between predicted and original images. The experimental results show the quality of Lena image from this scheme has a PSNR value of 66.88dB and a embedding capacity of 0.1bpp, for one level. For 10 levels, the embedding capacity is 2.17 bpp and the scheme can still maintain a high PSNR value of 45dB, which means this algorithm is more efficient than the algorithms from Ni et al. and Tai et al, for both quality and embedding capacity.
本文提出了一种基于拉格朗日插值的两阶段多层可逆数据隐藏方案。在奇偶像素上交叉应用拉格朗日插值得到预测图像,然后利用直方图移位修正将机密数据嵌入到预测图像与原始图像的差值中。实验结果表明,该方案的莉娜图像质量的PSNR值为66.88dB,嵌入容量为0.1bpp。对于10个水平,该方案的嵌入容量为2.17 bpp,且仍能保持45dB的高PSNR值,这意味着该算法在质量和嵌入容量方面都比Ni等和Tai等人的算法更高效。
{"title":"A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation","authors":"Chin-Feng Lee, Chinchen Chang, Cheng-You Gao","doi":"10.1109/IIH-MSP.2013.126","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.126","url":null,"abstract":"This paper is a two staged multi-layer reversible data hiding scheme based on Lagrange interpolation. Lagrange interpolation will cross applied on odd and even pixels to produce predicted images, and then histogram shifting modification will be applied to embed confidential data into the differences between predicted and original images. The experimental results show the quality of Lena image from this scheme has a PSNR value of 66.88dB and a embedding capacity of 0.1bpp, for one level. For 10 levels, the embedding capacity is 2.17 bpp and the scheme can still maintain a high PSNR value of 45dB, which means this algorithm is more efficient than the algorithms from Ni et al. and Tai et al, for both quality and embedding capacity.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121051019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Image Processing Approach to Automatic Scoring System for Archery Targets 射箭目标自动计分系统的图像处理方法
Thi Thi Zin, I. Oka, Takuya Sasayama, S. Ata, Hitoshi Watanabe, H. Sasano
This paper proposes an image processing approach to automatic scoring system for archery targets. Specifically, the proposed system first performs Morphological operations on the target image to obtain thick boundaries of the arrow hits and then the image segmentation process is applied to segment the target area by using color and shape features. In doing so, a dynamic thresholding is applied to handle the possible effects of illumination variations and the bull's eyes or the target concentric circles are segmented by using geometrical properties of circles and ellipses to calculate hit scores. Thus the system can have a capability of scoring inside and outside the concentric circles separately. The proposed method is tested by using our own video sequences taken in the self-conducted experiments performed by four archers on two different days shooting 6 arrows. The test results show that the proposed scoring system is promising with an accuracy rate of 100%.
提出了一种用于射箭目标自动评分系统的图像处理方法。具体而言,该系统首先对目标图像进行形态学操作,获得箭头命中的粗边界,然后利用图像分割过程,利用颜色和形状特征对目标区域进行分割。在此过程中,应用动态阈值处理光照变化可能产生的影响,并利用圆和椭圆的几何特性对靶心或目标同心圆进行分割,计算命中分数。因此,该系统可以分别在同心圆内和圆外刻分。我们用四名弓箭手在两个不同的日子里发射6支箭进行了自我实验,并使用我们自己的视频序列对所提出的方法进行了测试。测试结果表明,该评分系统具有良好的应用前景,准确率达到100%。
{"title":"Image Processing Approach to Automatic Scoring System for Archery Targets","authors":"Thi Thi Zin, I. Oka, Takuya Sasayama, S. Ata, Hitoshi Watanabe, H. Sasano","doi":"10.1109/IIH-MSP.2013.73","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.73","url":null,"abstract":"This paper proposes an image processing approach to automatic scoring system for archery targets. Specifically, the proposed system first performs Morphological operations on the target image to obtain thick boundaries of the arrow hits and then the image segmentation process is applied to segment the target area by using color and shape features. In doing so, a dynamic thresholding is applied to handle the possible effects of illumination variations and the bull's eyes or the target concentric circles are segmented by using geometrical properties of circles and ellipses to calculate hit scores. Thus the system can have a capability of scoring inside and outside the concentric circles separately. The proposed method is tested by using our own video sequences taken in the self-conducted experiments performed by four archers on two different days shooting 6 arrows. The test results show that the proposed scoring system is promising with an accuracy rate of 100%.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126664133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1