In this paper, a novel feature extraction algorithm,called Slant discriminant analysis (SDA), is proposed. SDA aims to use the relation of rows and columns of image samples to extract the directional feature of the image samples. The proposed algorithm is applied to image classification on Yale face Database.The experimental results demonstrate the effectiveness of the proposed algorithm.
{"title":"Slant Discriminant Analysis for Image Feature Extraction","authors":"Li-Yan Zhao, Dong Zou, Guanghong Gao","doi":"10.1109/IIH-MSP.2013.97","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.97","url":null,"abstract":"In this paper, a novel feature extraction algorithm,called Slant discriminant analysis (SDA), is proposed. SDA aims to use the relation of rows and columns of image samples to extract the directional feature of the image samples. The proposed algorithm is applied to image classification on Yale face Database.The experimental results demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123545557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chen-Yu Chiang, Yu-Ping Hung, Sin-Horng Chen, Yih-Ru Wang
In this paper, a novel parametric prosody coding approach for Mandarin speech is proposed. It employs a hierarchical prosodic model (HPM) as a prosody generating model in the encoder to analyze the speech prosody of the input utterance to obtain a parametric representation of four prosodic-acoustic features of syllable pitch contour, syllable duration, syllable energy level, and syllable-juncture pause duration for encoding. In the decoder, the four prosodic-acoustic features are reconstructed by a synthesis operation using the decoded HPM parameters. The reconstructed prosodic features are lastly used in an HMM-based speech synthesizer to help to generate the reconstructed speech. Experimental results show that the reconstructed speech has good quality at low data rates of 114.9 bits/s for a speaker-dependent task. An informal listening test confirmed decoded speeches sounded very fluently.
{"title":"A New Model-Based Prosody Coder for Mandarin Speech","authors":"Chen-Yu Chiang, Yu-Ping Hung, Sin-Horng Chen, Yih-Ru Wang","doi":"10.1109/IIH-MSP.2013.24","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.24","url":null,"abstract":"In this paper, a novel parametric prosody coding approach for Mandarin speech is proposed. It employs a hierarchical prosodic model (HPM) as a prosody generating model in the encoder to analyze the speech prosody of the input utterance to obtain a parametric representation of four prosodic-acoustic features of syllable pitch contour, syllable duration, syllable energy level, and syllable-juncture pause duration for encoding. In the decoder, the four prosodic-acoustic features are reconstructed by a synthesis operation using the decoded HPM parameters. The reconstructed prosodic features are lastly used in an HMM-based speech synthesizer to help to generate the reconstructed speech. Experimental results show that the reconstructed speech has good quality at low data rates of 114.9 bits/s for a speaker-dependent task. An informal listening test confirmed decoded speeches sounded very fluently.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131013552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.167
Jiangli Qu, X. Liu
With the cold and hot functional test and core load of the nuclear power unit to come, operating staff will hold an overall commissioning test on the equipments. In order to track, solve and approve the technical issues in a better way, professionals are required to assign those issues in accordance to the work procedure, and share the execution and accomplishment condition of the work in time. Therefore, it is necessary to develop a feedback and tracking system to manage technical issues focusing on the equipment maintenance, which will help follow up the process by series of codes and symbols. It can also provide a knowledge base for issues arising from nuclear unit maintenance activities to guarantee good operation of the plant.
{"title":"Design and Application of the Feedback and Tracking System for Nuclear Power Unit Maintenance Technical Issues","authors":"Jiangli Qu, X. Liu","doi":"10.1109/IIH-MSP.2013.167","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.167","url":null,"abstract":"With the cold and hot functional test and core load of the nuclear power unit to come, operating staff will hold an overall commissioning test on the equipments. In order to track, solve and approve the technical issues in a better way, professionals are required to assign those issues in accordance to the work procedure, and share the execution and accomplishment condition of the work in time. Therefore, it is necessary to develop a feedback and tracking system to manage technical issues focusing on the equipment maintenance, which will help follow up the process by series of codes and symbols. It can also provide a knowledge base for issues arising from nuclear unit maintenance activities to guarantee good operation of the plant.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132801310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Primavera, S. Cecchi, F. Piazza, Junfeng Li, Yonghong Yan
In the recent years, hybrid reverberation algorithms have been widely explored aiming to reproduce the acoustic behavior of real environment at low computational load. On this basis, exploiting the advantages introduced from hybrid reverberation structures, a novel approach for the reproduction of moving listener position through impulse responses (IR) interpolation has been presented in this paper. In particular, the presented methodology allows to remove redundant information in large IR database also decreasing the memory usage and the computational complexity required to perform the auralization operation. The effectiveness of the proposed approach has been proved taking into account a real IR database and also providing comparison with the existing state-of-art techniques in terms of objective and subjective measures.
{"title":"Hybrid Reverberator Using Multiple Impulse Responses for Audio Rendering Improvement","authors":"A. Primavera, S. Cecchi, F. Piazza, Junfeng Li, Yonghong Yan","doi":"10.1109/IIH-MSP.2013.86","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.86","url":null,"abstract":"In the recent years, hybrid reverberation algorithms have been widely explored aiming to reproduce the acoustic behavior of real environment at low computational load. On this basis, exploiting the advantages introduced from hybrid reverberation structures, a novel approach for the reproduction of moving listener position through impulse responses (IR) interpolation has been presented in this paper. In particular, the presented methodology allows to remove redundant information in large IR database also decreasing the memory usage and the computational complexity required to perform the auralization operation. The effectiveness of the proposed approach has been proved taking into account a real IR database and also providing comparison with the existing state-of-art techniques in terms of objective and subjective measures.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114215778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of digital image processing technology, image capture and image tampering are easy to obtain with the help of portable devices and software tools. Subsequently, digital image forensics has become increasingly important, in which recaptured image detection is one branch. In this paper, a set of features based on image texture are used to identify the recaptured images. Because the recapture process generally accompanies with some image quality losses, which can be reflected from the texture features, we study the effectiveness of LBPV and the proposed Relative-Contrast. Then, these two kinds of features are combined to make a distinction between real-scene images and the corresponding recaptured ones. With a support vector machine classifier, the experimental results show that the proposed features perform well.
{"title":"Recaptured Image Detection Based on Texture Features","authors":"Xiaobo Zhai, R. Ni, Yao Zhao","doi":"10.1109/IIH-MSP.2013.67","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.67","url":null,"abstract":"With the development of digital image processing technology, image capture and image tampering are easy to obtain with the help of portable devices and software tools. Subsequently, digital image forensics has become increasingly important, in which recaptured image detection is one branch. In this paper, a set of features based on image texture are used to identify the recaptured images. Because the recapture process generally accompanies with some image quality losses, which can be reflected from the texture features, we study the effectiveness of LBPV and the proposed Relative-Contrast. Then, these two kinds of features are combined to make a distinction between real-scene images and the corresponding recaptured ones. With a support vector machine classifier, the experimental results show that the proposed features perform well.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ho-En Liao, Guan-Yu Lin, M. Sheu, S. Siao, Sin-Siang Wan
The paper proposes a computation efficient constant false alarm rate (CFAR) algorithm, AND-CFAR, for frequency modulated continuous-wave (FMCW) radar receiver. The criterion of AND-CFAR algorithm adopts criteria combing Cell-Averaging (CA) and Order Statistics (OS) CFAR algorithms with 'AND' operation, and the frequency estimation is thus improved. While considering application in embedded systems, it is necessary to lower computation complexity of AND-CFAR algorithm. Therefore, a computation efficiency AND-CFAR algorithm is proposed to reduce the computation effort in CA and OS CFAR algorithms. Base band processing of FMCW receiver, which is composed of a band pass filter (BPF), a FFT and a AND-CFAR, is simulated to show the validity of the algorithm proposed. And, then, the base band FMCW receiver is implemented in two DSP chips to show the saving in execution periods with AND-CFAR algorithm proposed.
{"title":"A Computation Efficiency AND-CFAR for FMCW Radar Receiver","authors":"Ho-En Liao, Guan-Yu Lin, M. Sheu, S. Siao, Sin-Siang Wan","doi":"10.1109/IIH-MSP.2013.36","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.36","url":null,"abstract":"The paper proposes a computation efficient constant false alarm rate (CFAR) algorithm, AND-CFAR, for frequency modulated continuous-wave (FMCW) radar receiver. The criterion of AND-CFAR algorithm adopts criteria combing Cell-Averaging (CA) and Order Statistics (OS) CFAR algorithms with 'AND' operation, and the frequency estimation is thus improved. While considering application in embedded systems, it is necessary to lower computation complexity of AND-CFAR algorithm. Therefore, a computation efficiency AND-CFAR algorithm is proposed to reduce the computation effort in CA and OS CFAR algorithms. Base band processing of FMCW receiver, which is composed of a band pass filter (BPF), a FFT and a AND-CFAR, is simulated to show the validity of the algorithm proposed. And, then, the base band FMCW receiver is implemented in two DSP chips to show the saving in execution periods with AND-CFAR algorithm proposed.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To reduce the heavy computational complexity of uni-directional and bi-directional predictions in multiview video coding (MVC), this paper proposes a multiview video coding algorithm. Uni-directional prediction is optimized. By using the geometry relationship between disparity and motion vectors, an iterative process is preformed. In each process, a new adaptive search range is used to revise motion/disparity vector. At last, optimal motion and disparity vectors are achieved. For bi-directional prediction, TZSearch algorithm is utilized to accelerate prediction. Furthermore, an early termination strategy is devised on the basis of relationships among bi-directional prediction, model error, quantization parameter and temporal level. Experimental results show that computational complexity can be significantly reduced while maintaining video coding performance compared with JMVC full search algorithm.
{"title":"Multiview Video Coding Algorithm Based on HBP Prediction Structure","authors":"Yuxin Song, Ke-bin Jia","doi":"10.1109/IIH-MSP.2013.52","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.52","url":null,"abstract":"To reduce the heavy computational complexity of uni-directional and bi-directional predictions in multiview video coding (MVC), this paper proposes a multiview video coding algorithm. Uni-directional prediction is optimized. By using the geometry relationship between disparity and motion vectors, an iterative process is preformed. In each process, a new adaptive search range is used to revise motion/disparity vector. At last, optimal motion and disparity vectors are achieved. For bi-directional prediction, TZSearch algorithm is utilized to accelerate prediction. Furthermore, an early termination strategy is devised on the basis of relationships among bi-directional prediction, model error, quantization parameter and temporal level. Experimental results show that computational complexity can be significantly reduced while maintaining video coding performance compared with JMVC full search algorithm.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131837331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Individualization of the head-related transfer function (HRTF) to each listener is important for the listener to localize sound sources accurately. If an inappropriate HRTF is used, the sound localization is incorrect and there is a lower sense of presence. We investigate the admissible ranges for individualization of P1, N1, and N2 frequencies, which are spectral cues of HRTFs to localize sounds, in particular, on the median plane. The admissible ranges for individualization are the valid ranges of the spectral cues on the HRTFs at which each listener can localize presented sounds. We did listening tests to estimate the admissible ranges of P1, N1 and N2. The results suggest that N1 should be accurate, the admissible range is narrow, P1 and N2 are not strict, and also that strict tuning of P1 and N2 is not required. When applying a reconstructed HRTF for a certain listener selected from those of others in the database based on the condition that the N1, N2, and P1 of those HRTFs are limited to the admissible ranges, accuracy of sound localization approaches that applying the most appropriate HRTF for the listener.
{"title":"Admissible Range for Individualization of Head-Related Transfer Function in Median Plane","authors":"M. Akagi, Hideki Hisatsune","doi":"10.1109/IIH-MSP.2013.89","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.89","url":null,"abstract":"Individualization of the head-related transfer function (HRTF) to each listener is important for the listener to localize sound sources accurately. If an inappropriate HRTF is used, the sound localization is incorrect and there is a lower sense of presence. We investigate the admissible ranges for individualization of P1, N1, and N2 frequencies, which are spectral cues of HRTFs to localize sounds, in particular, on the median plane. The admissible ranges for individualization are the valid ranges of the spectral cues on the HRTFs at which each listener can localize presented sounds. We did listening tests to estimate the admissible ranges of P1, N1 and N2. The results suggest that N1 should be accurate, the admissible range is narrow, P1 and N2 are not strict, and also that strict tuning of P1 and N2 is not required. When applying a reconstructed HRTF for a certain listener selected from those of others in the database based on the condition that the N1, N2, and P1 of those HRTFs are limited to the admissible ranges, accuracy of sound localization approaches that applying the most appropriate HRTF for the listener.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134523089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a new adaptive multi-thretholding image denoising method based on the decomposition order is presented, which is built upon the ideas of Embedded Zero tree Wavelet (EZW) encoder and separate character of signals and noises. This method is not increase in operation amounts but excellent in image denoising results.
{"title":"Adaptive Multi-thresholding Image Denoising Method","authors":"Ling-Zhen Song, Li Zhang","doi":"10.1109/IIH-MSP.2013.16","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.16","url":null,"abstract":"In this paper, a new adaptive multi-thretholding image denoising method based on the decomposition order is presented, which is built upon the ideas of Embedded Zero tree Wavelet (EZW) encoder and separate character of signals and noises. This method is not increase in operation amounts but excellent in image denoising results.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133516073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. On the other hand, a pirate can only clip half of a frame to remove watermarks. In the circumstances, it should be taken into consideration to resist collusion attacks and clip attacks while developing a watermarking scheme for stereoscopic videos. Thus, the proposed watermarking method embed two watermarks into the two images of a stereoscopic video frame, respectively. To resist collusion attacks, the proposed scheme identify similar portions of the two images containing in a stereoscopic video frame. Then, identical modification will be applied on the same positions of the similar portions. As shown in experimental results, test images with watermarks embedded are still have high quality. Although two watermarks may overlap with each other after the proposed scheme, they still have high embedding effectiveness. Moreover, watermark embedding method adopted in the proposed watermarking scheme has been well-studied. It has been indicated that the embedded watermarks are still detectable after common image processing operations. Thus, the proposed scheme is suitable for copyright protection of stereoscopic videos.
{"title":"A Wavelet-Based Image Watermarking Scheme for Stereoscopic Video Frames","authors":"Yueh-Hong Chen, Hsiang-Cheh Huang","doi":"10.1109/IIH-MSP.2013.15","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.15","url":null,"abstract":"In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. On the other hand, a pirate can only clip half of a frame to remove watermarks. In the circumstances, it should be taken into consideration to resist collusion attacks and clip attacks while developing a watermarking scheme for stereoscopic videos. Thus, the proposed watermarking method embed two watermarks into the two images of a stereoscopic video frame, respectively. To resist collusion attacks, the proposed scheme identify similar portions of the two images containing in a stereoscopic video frame. Then, identical modification will be applied on the same positions of the similar portions. As shown in experimental results, test images with watermarks embedded are still have high quality. Although two watermarks may overlap with each other after the proposed scheme, they still have high embedding effectiveness. Moreover, watermark embedding method adopted in the proposed watermarking scheme has been well-studied. It has been indicated that the embedded watermarks are still detectable after common image processing operations. Thus, the proposed scheme is suitable for copyright protection of stereoscopic videos.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116115968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}