首页 > 最新文献

2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing最新文献

英文 中文
Fast Video Encoding Algorithm Based on Motion Estimation for H.264/AVC 基于运动估计的H.264/AVC快速视频编码算法
Yuan Gao, Pengyu Liu
Motion estimation is the most time consuming part in H.264/AVC. In this paper, according to computing redundancy of UMHexagonS algorithm, the method of motion vector distribution prediction is proposed and combines with designed patterns to achieve adaptive sub-regional searching. Simulation results show that the proposed motion estimation scheme achieves reducing 21.48% motion estimation encoding time with a good rate-distortion performance compared to UMHexagonS algorithm in JM18.4. The proposed algorithm improves the performance of real-time encoding.
运动估计是H.264/AVC中最耗时的部分。本文根据UMHexagonS算法的计算冗余性,提出了运动矢量分布预测方法,并结合设计模式实现自适应子区域搜索。仿真结果表明,与JM18.4中的UMHexagonS算法相比,所提出的运动估计方案可减少21.48%的运动估计编码时间,并具有良好的率失真性能。该算法提高了实时编码的性能。
{"title":"Fast Video Encoding Algorithm Based on Motion Estimation for H.264/AVC","authors":"Yuan Gao, Pengyu Liu","doi":"10.1109/IIH-MSP.2013.42","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.42","url":null,"abstract":"Motion estimation is the most time consuming part in H.264/AVC. In this paper, according to computing redundancy of UMHexagonS algorithm, the method of motion vector distribution prediction is proposed and combines with designed patterns to achieve adaptive sub-regional searching. Simulation results show that the proposed motion estimation scheme achieves reducing 21.48% motion estimation encoding time with a good rate-distortion performance compared to UMHexagonS algorithm in JM18.4. The proposed algorithm improves the performance of real-time encoding.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132039512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experiments on Genetic Programming Based Image Artefact Detection 基于遗传规划的图像伪影检测实验
Feng-Cheng Chang, Hsiang-Cheh Huang
One of the interesting image processing applications is to detect and/or restore a damaged image. Because image damage would vary in different ways, a straightforward method is to use a program to represent the damage. Then, the type of artefact can be searched by applying programs to the original image and comparing with the target image. The run-time environment of a program is the structure of the execution resources. In this paper, we define a cellular automaton based structure as the run-time environment and use genetic programming (GP) to find the proper program for the given image artefacts. The results show that an effective GP engine requires careful configuration. The important lesson learned from the experiments is also discussed.
一个有趣的图像处理应用是检测和/或恢复损坏的图像。因为图像损坏会以不同的方式变化,所以一个直接的方法是使用一个程序来表示损坏。然后,通过对原始图像应用程序,并与目标图像进行比较,可以搜索到伪影的类型。程序的运行时环境是执行资源的结构。在本文中,我们定义了一个基于元胞自动机的结构作为运行环境,并使用遗传规划(GP)为给定的图像伪影找到合适的程序。结果表明,一个有效的GP引擎需要仔细配置。讨论了从实验中得到的重要经验教训。
{"title":"Experiments on Genetic Programming Based Image Artefact Detection","authors":"Feng-Cheng Chang, Hsiang-Cheh Huang","doi":"10.1109/IIH-MSP.2013.11","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.11","url":null,"abstract":"One of the interesting image processing applications is to detect and/or restore a damaged image. Because image damage would vary in different ways, a straightforward method is to use a program to represent the damage. Then, the type of artefact can be searched by applying programs to the original image and comparing with the target image. The run-time environment of a program is the structure of the execution resources. In this paper, we define a cellular automaton based structure as the run-time environment and use genetic programming (GP) to find the proper program for the given image artefacts. The results show that an effective GP engine requires careful configuration. The important lesson learned from the experiments is also discussed.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128511201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Stage Verification Based on Watermarking for Electronic Passport 基于水印的电子护照两阶段验证
Zhifang Wang, Lei Yang, Yue Cheng, Qun Ding
This paper provides a novel two-stage verification scheme based on watermarking for electronic passport. The watermarking includes the multimodal biometric feature of the passport owner and the parity check codes of multimodal feature. The first part is taken as the template to do field certification which confirms whether the person is the true passport holder. The parity check codes verify the integrity of the passport. ORL face database and PolyU palm print database are selected as the experimental subjects. Experimental results show the availability and anslysis the impact of different embedding capacity for the multimodal biometric recognition.
提出了一种新的基于水印的电子护照两阶段验证方案。该水印包括护照持有人的多模态生物特征和多模态特征的奇偶校验码。以第一部分为模板进行现场认证,确认该人是否为真实护照持有人。奇偶校验码验证护照的完整性。选择ORL人脸数据库和理大掌纹数据库作为实验对象。实验结果表明了该方法的有效性,并分析了不同嵌入容量对多模态生物特征识别的影响。
{"title":"Two-Stage Verification Based on Watermarking for Electronic Passport","authors":"Zhifang Wang, Lei Yang, Yue Cheng, Qun Ding","doi":"10.1109/IIH-MSP.2013.19","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.19","url":null,"abstract":"This paper provides a novel two-stage verification scheme based on watermarking for electronic passport. The watermarking includes the multimodal biometric feature of the passport owner and the parity check codes of multimodal feature. The first part is taken as the template to do field certification which confirms whether the person is the true passport holder. The parity check codes verify the integrity of the passport. ORL face database and PolyU palm print database are selected as the experimental subjects. Experimental results show the availability and anslysis the impact of different embedding capacity for the multimodal biometric recognition.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128756083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cryptographic Approach for Steganography 隐写术的密码方法
J. Bahi, C. Guyeux, Pierre-Cyrille Héam
In this research work, security concepts are formalized in steganography, and the common paradigms based on information theory are replaced by another ones inspired from cryptography, more practicable are closer than what is usually done in other cryptographic domains. These preliminaries lead to a first proof of a cryptographically secure information hiding scheme.
本研究将隐写术中的安全概念形式化,并将基于信息论的通用范式替换为受密码学启发的另一种范式,比其他密码学领域通常所做的更接近实际。这些初步工作导致了加密安全信息隐藏方案的第一个证明。
{"title":"A Cryptographic Approach for Steganography","authors":"J. Bahi, C. Guyeux, Pierre-Cyrille Héam","doi":"10.1109/IIH-MSP.2013.134","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.134","url":null,"abstract":"In this research work, security concepts are formalized in steganography, and the common paradigms based on information theory are replaced by another ones inspired from cryptography, more practicable are closer than what is usually done in other cryptographic domains. These preliminaries lead to a first proof of a cryptographically secure information hiding scheme.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115160509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prediction-Based Reversible Data Hiding for Medical Images with Genetic Algorithms 基于预测的遗传算法医学图像可逆数据隐藏
Hsiang-Cheh Huang, Ting-Hsuan Wang, Yueh-Hong Chen, J. Hung
Reversible data hiding is a newly developed topic in watermarking researches. At the encoder, it relies on slightly modifying the characteristics of original images for embedding secret information. At the decoder, original image and secret information can be separated from marked image with slight amount of overhead. In this paper, we propose the scheme by predicting the difference between output and input images for making reversible data hiding possible. By carefully selecting prediction coefficients, which are optimized by genetic algorithm, the output image quality can be preserved, while the enhanced amount of embedding capacity can be observed. We apply the algorithm to medical images for protecting patients' cases from possible human errors incurred. With the training of genetic algorithm, simulation results with our algorithm have demonstrated the enhanced embedding capacity, while keeping the output image quality. Optimized prediction coefficients with genetic algorithm lead to better performances with our scheme.
可逆数据隐藏是水印研究中的一个新课题。在编码器上,它依靠对原始图像特征的轻微修改来嵌入秘密信息。在解码器中,原始图像和秘密信息可以从标记图像中分离出来,开销很小。在本文中,我们提出了一种方案,通过预测输出和输入图像之间的差异,使可逆数据隐藏成为可能。通过仔细选择预测系数,并通过遗传算法对预测系数进行优化,在保证输出图像质量的同时,可以观察到嵌入容量的增强。我们将该算法应用于医学图像,以保护患者免受可能发生的人为错误的影响。通过对遗传算法的训练,仿真结果表明,该算法在保持输出图像质量的前提下,增强了嵌入能力。利用遗传算法对预测系数进行优化,得到了较好的预测性能。
{"title":"Prediction-Based Reversible Data Hiding for Medical Images with Genetic Algorithms","authors":"Hsiang-Cheh Huang, Ting-Hsuan Wang, Yueh-Hong Chen, J. Hung","doi":"10.1109/IIH-MSP.2013.10","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.10","url":null,"abstract":"Reversible data hiding is a newly developed topic in watermarking researches. At the encoder, it relies on slightly modifying the characteristics of original images for embedding secret information. At the decoder, original image and secret information can be separated from marked image with slight amount of overhead. In this paper, we propose the scheme by predicting the difference between output and input images for making reversible data hiding possible. By carefully selecting prediction coefficients, which are optimized by genetic algorithm, the output image quality can be preserved, while the enhanced amount of embedding capacity can be observed. We apply the algorithm to medical images for protecting patients' cases from possible human errors incurred. With the training of genetic algorithm, simulation results with our algorithm have demonstrated the enhanced embedding capacity, while keeping the output image quality. Optimized prediction coefficients with genetic algorithm lead to better performances with our scheme.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127206467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-face Recognition at a Distance Using Light-Field Camera 利用光场相机进行远距离多人脸识别
Ramachandra Raghavendra, K. Raja, Bian Yang, C. Busch
In this paper, we address the problem of identifying multiple faces present at different distance using Light-Field Camera (LFC). Since a LFC can provide different focus (or depth) images in single capture, we are motivated to investigate its applicability to identify multiple faces at a distance by exploring its all-in-focus property. We first collect the new face dataset using LFC and then carry out extensive experiments to evaluate the merits and demerits of LFC, especially in identifying multiple faces at a distance. We explore the applicability of light field camera for face recognition applications in at-a-distance surveillance scenario.
在本文中,我们解决了使用光场相机(LFC)识别存在于不同距离的多个人脸的问题。由于LFC可以在单次捕获中提供不同的焦点(或深度)图像,因此我们有动机通过探索其全聚焦特性来研究其在远距离识别多个人脸的适用性。我们首先使用LFC收集新的人脸数据集,然后进行大量的实验来评估LFC的优缺点,特别是在远距离识别多人脸方面。我们探讨了光场摄像机在远程监控场景中人脸识别应用的适用性。
{"title":"Multi-face Recognition at a Distance Using Light-Field Camera","authors":"Ramachandra Raghavendra, K. Raja, Bian Yang, C. Busch","doi":"10.1109/IIH-MSP.2013.93","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.93","url":null,"abstract":"In this paper, we address the problem of identifying multiple faces present at different distance using Light-Field Camera (LFC). Since a LFC can provide different focus (or depth) images in single capture, we are motivated to investigate its applicability to identify multiple faces at a distance by exploring its all-in-focus property. We first collect the new face dataset using LFC and then carry out extensive experiments to evaluate the merits and demerits of LFC, especially in identifying multiple faces at a distance. We explore the applicability of light field camera for face recognition applications in at-a-distance surveillance scenario.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125598217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Speech Intelligibility Improvement Using the Constraints on Speech Distortion and Noise Over-estimation 基于语音失真和噪声过估计约束的语音清晰度改进
Na Li, C. Bao, Bingyin Xia, Feng Bao
Existing speech enhancement methods can improve speech quality but not speech intelligibility, especially in low SNR conditions. To solve this problem, an algorithm for improving speech intelligibility using the Constraints on Speech Distortion and Noise Over-estimation (CSDNO) is proposed in this paper. Based on the fact that the attenuation distortion and amplification distortion have different impacts on the speech intelligibility, the gain function and noise estimation method used in conventional algorithm are modified in this paper. The performance of the proposed method has been evaluated by Diagnosis Rhyme Test (DRT), fractional Articulation Index (fAI) and frequency-weighted SNR segmental (fwSNRseg) for three types of noises. The experimental results show that, with smaller speech distortion, the proposed method can improve the intelligibility of the enhanced speech in comparison with the reference method.
现有的语音增强方法可以提高语音质量,但不能提高语音清晰度,特别是在低信噪比条件下。为了解决这一问题,本文提出了一种基于语音失真和噪声过估计约束(CSDNO)的提高语音清晰度的算法。基于衰减失真和放大失真对语音清晰度的不同影响,本文对传统算法中使用的增益函数和噪声估计方法进行了改进。采用诊断韵律测试(DRT)、分数发音指数(fAI)和频率加权信噪比分段(fwSNRseg)对三种类型的噪声进行了性能评价。实验结果表明,与参考方法相比,该方法在语音失真较小的情况下,提高了增强语音的可理解性。
{"title":"Speech Intelligibility Improvement Using the Constraints on Speech Distortion and Noise Over-estimation","authors":"Na Li, C. Bao, Bingyin Xia, Feng Bao","doi":"10.1109/IIH-MSP.2013.155","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.155","url":null,"abstract":"Existing speech enhancement methods can improve speech quality but not speech intelligibility, especially in low SNR conditions. To solve this problem, an algorithm for improving speech intelligibility using the Constraints on Speech Distortion and Noise Over-estimation (CSDNO) is proposed in this paper. Based on the fact that the attenuation distortion and amplification distortion have different impacts on the speech intelligibility, the gain function and noise estimation method used in conventional algorithm are modified in this paper. The performance of the proposed method has been evaluated by Diagnosis Rhyme Test (DRT), fractional Articulation Index (fAI) and frequency-weighted SNR segmental (fwSNRseg) for three types of noises. The experimental results show that, with smaller speech distortion, the proposed method can improve the intelligibility of the enhanced speech in comparison with the reference method.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124288527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber-physical System Risk Assessment 网络物理系统风险评估
Yong Peng, Tianbo Lu, Jingli Liu, Yang Gao, Xiaobo Guo, Feng Xie
Cyber Physical System (CPS) is a combination of physical systems with cyber systems, where there is a tight coupling between the two systems. It is widely used in critical national infrastructure, such as electric power, petroleum and chemical industries. Once an attack against the CPS obtains success, the consequence will be unimaginable. A well-designed risk assessment of CPS will provide an overall view of CPS security status and support efficient allocations of safeguard resources. Though there is much relationship between CPS and IT system, they are still different in various aspects, especially the requirement for real-time. Therefore, traditional risk assessment method for IT system can't be directly applied in CPS. New ideas on CPS risk assessment are in urgent need and one idea about this is addressed in this paper. Firstly, it presents a depict description of a three-level CPS architecture and makes an analysis on the corresponding security features in each level. Secondly, it sums up traditional risk assessment methods analyzes the differences between cyber physical system security and traditional IT system security. Finally, the authors blaze a trail under the new perspective of CPS after breaking the restriction of traditional risk assessment methods and propose a risk assessment idea for CPS.
网络物理系统(CPS)是物理系统与网络系统的结合,两者之间存在紧密耦合。广泛应用于电力、石油、化工等国家关键基础设施。一旦对CPS的攻击取得成功,后果将不堪设想。精心设计的CPS风险评估将提供CPS安全状况的整体视图,并支持有效分配保障资源。虽然CPS和IT系统之间有很多联系,但是在很多方面还是有区别的,尤其是对实时性的要求。因此,传统的IT系统风险评估方法不能直接应用于CPS。目前迫切需要新的CPS风险评估思路,本文提出了这方面的一种思路。首先对三级CPS体系结构进行了描述,并对每一层对应的安全特性进行了分析。其次,总结了传统的风险评估方法,分析了网络物理系统安全与传统it系统安全的区别。最后,突破传统风险评估方法的限制,在新的CPS视角下进行探索,提出了CPS风险评估思路。
{"title":"Cyber-physical System Risk Assessment","authors":"Yong Peng, Tianbo Lu, Jingli Liu, Yang Gao, Xiaobo Guo, Feng Xie","doi":"10.1109/IIH-MSP.2013.116","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.116","url":null,"abstract":"Cyber Physical System (CPS) is a combination of physical systems with cyber systems, where there is a tight coupling between the two systems. It is widely used in critical national infrastructure, such as electric power, petroleum and chemical industries. Once an attack against the CPS obtains success, the consequence will be unimaginable. A well-designed risk assessment of CPS will provide an overall view of CPS security status and support efficient allocations of safeguard resources. Though there is much relationship between CPS and IT system, they are still different in various aspects, especially the requirement for real-time. Therefore, traditional risk assessment method for IT system can't be directly applied in CPS. New ideas on CPS risk assessment are in urgent need and one idea about this is addressed in this paper. Firstly, it presents a depict description of a three-level CPS architecture and makes an analysis on the corresponding security features in each level. Secondly, it sums up traditional risk assessment methods analyzes the differences between cyber physical system security and traditional IT system security. Finally, the authors blaze a trail under the new perspective of CPS after breaking the restriction of traditional risk assessment methods and propose a risk assessment idea for CPS.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124401082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Visual Cryptography Schemes for Graph Based Access Structures 基于图的访问结构的可视化密码方案
S. Cimato
Visual cryptography schemes (VCS) have been introduced by Naor and Shamir [NS94] and involve a dealer encoding a secret image into shares that are distributed to a number of participants. In general, the collection of subsets of participants that can recover the secret is organized in an access structure. In this paper we consider graph based access structures, where participants are nodes of a graph G and only subsets containing an edge are allowed to reconstruct the secret image. We provide some bounds on the pixel expansion of path and cycle graphs, showing also a simple construction for such graphs for a generic number of n participants.
视觉加密方案(VCS)已由Naor和Shamir [NS94]引入,涉及到交易商将秘密图像编码为分发给多个参与者的股份。通常,可以恢复秘密的参与者子集的集合被组织在一个访问结构中。本文考虑基于图的访问结构,其中参与者是图G的节点,并且只允许包含边缘的子集重构秘密图像。我们给出了路径图和循环图的像素展开的一些边界,并给出了一般参与数为n的路径图和循环图的一个简单构造。
{"title":"Visual Cryptography Schemes for Graph Based Access Structures","authors":"S. Cimato","doi":"10.1109/IIH-MSP.2013.98","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.98","url":null,"abstract":"Visual cryptography schemes (VCS) have been introduced by Naor and Shamir [NS94] and involve a dealer encoding a secret image into shares that are distributed to a number of participants. In general, the collection of subsets of participants that can recover the secret is organized in an access structure. In this paper we consider graph based access structures, where participants are nodes of a graph G and only subsets containing an edge are allowed to reconstruct the secret image. We provide some bounds on the pixel expansion of path and cycle graphs, showing also a simple construction for such graphs for a generic number of n participants.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121670812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subsampling Based Neighborhood Preserving Embedding for Image Classification 基于子采样的邻域保持嵌入图像分类
Li-Yan Zhao, Dong Zou, Guanghong Gao
In this paper, a novel image feature extraction algorithm, called Subsampling based neighborhood preserving embedding (SNPE), is proposed. SNPE aims to preserve the neighborhood of the subsampling image samples. The proposed algorithm is applied to image classification on Finger-Knuckle-Print database. The experimental results confirm the effectiveness of the proposed algorithm.
提出了一种新的图像特征提取算法——基于子采样的邻域保持嵌入算法(SNPE)。SNPE的目的是保持子采样图像样本的邻域。将该算法应用于指关节指纹数据库的图像分类。实验结果验证了该算法的有效性。
{"title":"Subsampling Based Neighborhood Preserving Embedding for Image Classification","authors":"Li-Yan Zhao, Dong Zou, Guanghong Gao","doi":"10.1109/IIH-MSP.2013.96","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.96","url":null,"abstract":"In this paper, a novel image feature extraction algorithm, called Subsampling based neighborhood preserving embedding (SNPE), is proposed. SNPE aims to preserve the neighborhood of the subsampling image samples. The proposed algorithm is applied to image classification on Finger-Knuckle-Print database. The experimental results confirm the effectiveness of the proposed algorithm.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124804803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1