首页 > 最新文献

2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing最新文献

英文 中文
Application of Three-Dimensional Audio to Copyrighted Multimedia Contents 三维音频在版权多媒体内容中的应用
R. Nishimura, S. Enomoto, P. Mokhtari, H. Takemoto
Copyright is important to protect proprietary properties of multimedia contents, but it possibly poses a challenge in applying complicated signal processing to commercial multimedia products. It is usually forbidden to make a copy of copyrighted materials so that signal processing should be applied on the fly. As a result, such signal processing needs considerable computational costs and requires special devices and software, leading users to hesitate to adopt it. In this article, a method is introduced which enables users to listen to surround sound audio tracks as three-dimensional (3D) audio, without infringement of copyright, with a common multimedia player currently available on a usual PC. The 3D sound can be one that would be heard in an appropriate listening room with a set of ideal loudspeakers, and also can be properly individualized to each listener. Although the method adds a temporal delay in audio contents relative to visual contents, the delay can fall within an acceptable range with respect to the human perception of multimedia contents.
版权是保护多媒体内容的专有属性的重要手段,但在将复杂的信号处理应用到商业多媒体产品中可能会带来挑战。通常禁止复制受版权保护的材料,以便动态应用信号处理。因此,这种信号处理需要相当大的计算成本,并且需要特殊的设备和软件,导致用户对采用它犹豫不决。在本文中,介绍了一种方法,使用户能够在不侵犯版权的情况下,使用普通PC上的普通多媒体播放器收听环绕声音轨作为三维(3D)音频。3D声音可以在合适的听音室里用一套理想的扬声器听到,也可以根据每个听者适当地个性化。尽管该方法在音频内容中增加了相对于视觉内容的时间延迟,但是相对于人对多媒体内容的感知,所述延迟可以落在可接受的范围内。
{"title":"Application of Three-Dimensional Audio to Copyrighted Multimedia Contents","authors":"R. Nishimura, S. Enomoto, P. Mokhtari, H. Takemoto","doi":"10.1109/IIH-MSP.2013.84","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.84","url":null,"abstract":"Copyright is important to protect proprietary properties of multimedia contents, but it possibly poses a challenge in applying complicated signal processing to commercial multimedia products. It is usually forbidden to make a copy of copyrighted materials so that signal processing should be applied on the fly. As a result, such signal processing needs considerable computational costs and requires special devices and software, leading users to hesitate to adopt it. In this article, a method is introduced which enables users to listen to surround sound audio tracks as three-dimensional (3D) audio, without infringement of copyright, with a common multimedia player currently available on a usual PC. The 3D sound can be one that would be heard in an appropriate listening room with a set of ideal loudspeakers, and also can be properly individualized to each listener. Although the method adds a temporal delay in audio contents relative to visual contents, the delay can fall within an acceptable range with respect to the human perception of multimedia contents.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116179567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Study of Information Planning Method for Large Enterprise Group Based on Strategic Business Analysis 基于战略经营分析的大型企业集团信息规划方法研究
Weixiong Chen, Zhiqiang Ye, Jiaan Yi
Considering the new questions in Strategic Information Planning (SIP), we put forward a improved SIP methodology based on Strategic Business Analysis (SBA). It bring forward a formula for Strategic Matching Degree (SMD), so as to identify the key business and key information system. It also proposes a key business analysis & adjustment process under dynamic environment. As a result, the SBA method can reduce IT investment and increase IT planning work efficiency.
针对战略信息规划(SIP)中的新问题,提出了一种基于战略业务分析(SBA)的改进的SIP方法。提出了战略匹配度(SMD)的计算公式,以确定关键业务和关键信息系统。并提出了动态环境下的关键业务分析与调整流程。因此,SBA方法可以减少IT投资,提高IT规划工作效率。
{"title":"The Study of Information Planning Method for Large Enterprise Group Based on Strategic Business Analysis","authors":"Weixiong Chen, Zhiqiang Ye, Jiaan Yi","doi":"10.1109/IIH-MSP.2013.164","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.164","url":null,"abstract":"Considering the new questions in Strategic Information Planning (SIP), we put forward a improved SIP methodology based on Strategic Business Analysis (SBA). It bring forward a formula for Strategic Matching Degree (SMD), so as to identify the key business and key information system. It also proposes a key business analysis & adjustment process under dynamic environment. As a result, the SBA method can reduce IT investment and increase IT planning work efficiency.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115837491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Contourlet-Domain Image Signature for Content Authentication 面向内容认证的contourlet域图像签名
Xiaofeng Wang, Lixin Zhang, Kemu Pang
An image signature approach for content authentication is proposed. In the proposal, Contour let transformation is used to extract image feature, and the statistics of Contour let transformation coefficients are used to generate image signature. Then a tampering detection and tampering localization algorithm are developed by using generated image signature. Proposed method is robust for perceptually insignificant distortions introduced by content-preserving manipulations such as JPEG compression, adding noise, filtering, etc. It is sensitive to the changes caused by malicious attacks, and it possesses the functionality to detect the changed image regions.
提出了一种用于内容认证的图像签名方法。该算法利用轮廓let变换提取图像特征,利用轮廓let变换系数的统计量生成图像签名。然后利用生成的图像签名,提出了一种篡改检测和篡改定位算法。该方法对于JPEG压缩、添加噪声、滤波等内容保留操作所带来的感知上不显著的失真具有鲁棒性。它对恶意攻击引起的变化非常敏感,并具有检测图像区域变化的功能。
{"title":"A Contourlet-Domain Image Signature for Content Authentication","authors":"Xiaofeng Wang, Lixin Zhang, Kemu Pang","doi":"10.1109/IIH-MSP.2013.143","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.143","url":null,"abstract":"An image signature approach for content authentication is proposed. In the proposal, Contour let transformation is used to extract image feature, and the statistics of Contour let transformation coefficients are used to generate image signature. Then a tampering detection and tampering localization algorithm are developed by using generated image signature. Proposed method is robust for perceptually insignificant distortions introduced by content-preserving manipulations such as JPEG compression, adding noise, filtering, etc. It is sensitive to the changes caused by malicious attacks, and it possesses the functionality to detect the changed image regions.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":" 40","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132188296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on Method for Estimating F0 of Steady Complex Tone in Noisy Reverberant Environments 噪声混响环境下稳定复音F0估计方法研究
Kenichiro Miwa, M. Unoki
This paper proposes a method for robustly and accurately estimating fundamental frequency (F0) of the steady complex tone on the basis of an amplitude modulation/demodulation technique. It is based on the well-known mechanism of pitch perception for AM tone. The comparative results revealed that the percentage correct rates of the estimated F0s using a few recent methods (TEMPO, PHIA, and CmpCep) were drastically reduced as the SNR decreased and as the reverberation time increased. The results also demonstrated that the proposed method robustly and accurately estimated F0 in both noisy and reverberant environments.
本文提出了一种基于调幅/解调技术的稳定复音基频(F0)鲁棒准确估计方法。它是基于众所周知的调幅音调的音高感知机制。比较结果表明,使用几种最新方法(TEMPO, PHIA和CmpCep)估计F0s的百分比正确率随着信噪比的降低和混响时间的增加而急剧降低。结果还表明,该方法在噪声和混响环境下都能鲁棒准确地估计出F0。
{"title":"Study on Method for Estimating F0 of Steady Complex Tone in Noisy Reverberant Environments","authors":"Kenichiro Miwa, M. Unoki","doi":"10.1109/IIH-MSP.2013.119","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.119","url":null,"abstract":"This paper proposes a method for robustly and accurately estimating fundamental frequency (F0) of the steady complex tone on the basis of an amplitude modulation/demodulation technique. It is based on the well-known mechanism of pitch perception for AM tone. The comparative results revealed that the percentage correct rates of the estimated F0s using a few recent methods (TEMPO, PHIA, and CmpCep) were drastically reduced as the SNR decreased and as the reverberation time increased. The results also demonstrated that the proposed method robustly and accurately estimated F0 in both noisy and reverberant environments.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131580634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research and Application of Business Intelligence in the Nuclear Power Maintenance 商业智能在核电维修中的研究与应用
Zinian Shi
With the continuously development of enterprise informatization, the effect of group enterprise scale effect and fine management preliminary reveals, scientific decision-making difficulty is greatly increased, business intelligence applications demand urgently. Against this backdrop, this paper through the research of BI and a company using the BI components for nuclear power maintenance business intelligence analysis as an example for the BI platform description, elaborate the importance of the development of enterprise business intelligence, analysis and put forward three trends of group business intelligence application in the future will show.
随着企业信息化的不断发展,集团化企业规模效应和精细化管理效应初步显现,科学决策难度大大增加,商业智能应用需求迫切。在此背景下,本文通过对BI的研究,并以某公司利用BI组件进行核电维修商业智能分析为例,对BI平台进行描述,阐述了企业商业智能发展的重要性,分析并提出了集团商业智能未来应用将呈现的三个趋势。
{"title":"Research and Application of Business Intelligence in the Nuclear Power Maintenance","authors":"Zinian Shi","doi":"10.1109/IIH-MSP.2013.159","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.159","url":null,"abstract":"With the continuously development of enterprise informatization, the effect of group enterprise scale effect and fine management preliminary reveals, scientific decision-making difficulty is greatly increased, business intelligence applications demand urgently. Against this backdrop, this paper through the research of BI and a company using the BI components for nuclear power maintenance business intelligence analysis as an example for the BI platform description, elaborate the importance of the development of enterprise business intelligence, analysis and put forward three trends of group business intelligence application in the future will show.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132980386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Pervasive Stress Monitoring System Based on Biological Signals 基于生物信号的无孔不入应力监测系统
Guoqing Zhao, Bin Hu, Xiaowei Li, Chengsheng Mao, R. Huang
In this research, we focus on detecting stress based on electroencephalogram (EEG) method. An experiment has been conducted with 59 subjects, the results show that three EEG features from Fpz point, LZ-complexity, alpha relative power and the ratio of alpha power to beta power, are effective respectively in the stress detection using K-Nearest-Neighbor classifier, however Naive Bayesian classifier is not suitable for the stress prediction based EEG data. Meanwhile, we introduced the stress index for indicating stress level. Based on these work, we build a pervasive stress detection system which enables people to monitor their stress level opportunely. The proposed system provides services both for ordinary users in "User Panel" and psychiatrists in "Doctor Panel". The "User Panel" integrates biological signals acquisition which collects user's EEG data for stress classification, self-assessment questionnaire as reference to stress index, history record for logging user's state, and chatting with doctor, aiming to keep in touch with psychiatrists if necessary. In "Doctor Panel", psychiatrists can view all users' historical status and chat with them.
在本研究中,我们主要研究基于脑电图(EEG)方法的应激检测。对59名被试进行了实验,结果表明:Fpz点、lz复杂度、alpha相对功率和alpha功率与beta功率之比3个EEG特征分别在k -最近邻分类器的应力检测中是有效的,而朴素贝叶斯分类器不适用于基于应力预测的脑电数据。同时,引入了应力指标来表示应力水平。在这些工作的基础上,我们建立了一个无处不在的压力检测系统,使人们能够及时监测自己的压力水平。建议的系统为“用户组”的普通用户和“医生组”的精神病医生提供服务。“用户面板”集成了生物信号采集,收集用户脑电图数据进行压力分类,以压力指数为参考的自我评估问卷,记录用户状态的历史记录,与医生聊天,必要时与精神科医生保持联系。在“医生面板”中,精神科医生可以查看所有用户的历史状态并与他们聊天。
{"title":"A Pervasive Stress Monitoring System Based on Biological Signals","authors":"Guoqing Zhao, Bin Hu, Xiaowei Li, Chengsheng Mao, R. Huang","doi":"10.1109/IIH-MSP.2013.137","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.137","url":null,"abstract":"In this research, we focus on detecting stress based on electroencephalogram (EEG) method. An experiment has been conducted with 59 subjects, the results show that three EEG features from Fpz point, LZ-complexity, alpha relative power and the ratio of alpha power to beta power, are effective respectively in the stress detection using K-Nearest-Neighbor classifier, however Naive Bayesian classifier is not suitable for the stress prediction based EEG data. Meanwhile, we introduced the stress index for indicating stress level. Based on these work, we build a pervasive stress detection system which enables people to monitor their stress level opportunely. The proposed system provides services both for ordinary users in \"User Panel\" and psychiatrists in \"Doctor Panel\". The \"User Panel\" integrates biological signals acquisition which collects user's EEG data for stress classification, self-assessment questionnaire as reference to stress index, history record for logging user's state, and chatting with doctor, aiming to keep in touch with psychiatrists if necessary. In \"Doctor Panel\", psychiatrists can view all users' historical status and chat with them.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133647623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Subjective Evaluation of High-Definition Virtual Sound Field Using a 157-Channel Surrounding Loudspeaker Array 157声道环绕式扬声器阵列高清虚拟声场主观评价
Y. Iwaya, T. Tsuchiya
In recent years, computation power to simulate sound fields from the three-dimensional numerical models has progressed fast, for example, using GPU cluster systems. However, the intervals among loudspeakers used in reproduction of the rendered sound field are insufficient to avoid spatial aliasing. Therefore, it is impossible to reproduce the rendered sound field accurately with current loudspeaker systems. Nevertheless, subjective impression of reproduction field with an insufficient system might be similar to intended sound field. The intended spatial attributes to render, such as sound position, sound directivity, reverberation, should be evaluated subjectively. For this report we performed a subjective evaluation of the sound fields rendered with a graphical processing unit (GPU) cluster. The sound fields were reproduced by a surrounding loudspeaker array. The number of loudspeakers in the array was 157. However the distance among loudspeakers was 50 cm and was insufficient to reproduce frequencies higher than 340 Hz. Listeners answered their subjective impressions on distance and directivity of sound source of a singing voice. We confirmed listeners could perceive the rendered distances in part when the directivity of the sound source was also rendered.
近年来,利用三维数值模型模拟声场的计算能力得到了快速的发展,例如利用GPU集群系统。然而,用于再现声场的扬声器之间的间隔不足以避免空间混叠。因此,目前的扬声器系统不可能准确地再现渲染的声场。然而,在系统不充分的情况下,对再现场的主观印象可能与预期声场相似。要渲染的预期空间属性,如声音位置、声音指向性、混响,应该进行主观评估。在本报告中,我们对图形处理单元(GPU)集群渲染的声场进行了主观评估。声场由周围的扬声器阵列再现。阵列中的扬声器数量为157个。然而,扬声器之间的距离为50厘米,不足以再现高于340赫兹的频率。听众回答了他们对声源距离和指向性的主观印象。我们证实,当声源的指向性也被渲染时,听众可以部分地感知渲染的距离。
{"title":"Subjective Evaluation of High-Definition Virtual Sound Field Using a 157-Channel Surrounding Loudspeaker Array","authors":"Y. Iwaya, T. Tsuchiya","doi":"10.1109/IIH-MSP.2013.85","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.85","url":null,"abstract":"In recent years, computation power to simulate sound fields from the three-dimensional numerical models has progressed fast, for example, using GPU cluster systems. However, the intervals among loudspeakers used in reproduction of the rendered sound field are insufficient to avoid spatial aliasing. Therefore, it is impossible to reproduce the rendered sound field accurately with current loudspeaker systems. Nevertheless, subjective impression of reproduction field with an insufficient system might be similar to intended sound field. The intended spatial attributes to render, such as sound position, sound directivity, reverberation, should be evaluated subjectively. For this report we performed a subjective evaluation of the sound fields rendered with a graphical processing unit (GPU) cluster. The sound fields were reproduced by a surrounding loudspeaker array. The number of loudspeakers in the array was 157. However the distance among loudspeakers was 50 cm and was insufficient to reproduce frequencies higher than 340 Hz. Listeners answered their subjective impressions on distance and directivity of sound source of a singing voice. We confirmed listeners could perceive the rendered distances in part when the directivity of the sound source was also rendered.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115180716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-threshold Image Segmentation Based on Firefly Algorithm 基于Firefly算法的多阈值图像分割
Chao Yu, Bi Jin, Y. Lu, Xiwei Chen, Zhengming Yi, Kai Zhang, Shaoliang Wang
Multi-threshold image segmentation have achieved good results, but multi-threshold searching can be very time consuming, in order to improve the efficiency of multi-threshold searching, in this paper, the Firefly Algorithm is applied to solve multi-threshold searching. With maximum entropy as the optimization objective function, more information of images can be reserved, then using the Firefly Algorithm's heuristic searching, the optimal thresholds of image segmentation can be found. Experimental results show that compared to Genetic Algorithm, our proposed Firefly Algorithm has a higher convergence speed and produces a better segmentation effect when applied to image segmentation.
多阈值图像分割已经取得了很好的效果,但是多阈值搜索非常耗时,为了提高多阈值搜索的效率,本文采用萤火虫算法求解多阈值搜索。以最大熵为优化目标函数,保留更多的图像信息,利用萤火虫算法的启发式搜索,找到图像分割的最优阈值。实验结果表明,与遗传算法相比,我们提出的萤火虫算法具有更快的收敛速度和更好的图像分割效果。
{"title":"Multi-threshold Image Segmentation Based on Firefly Algorithm","authors":"Chao Yu, Bi Jin, Y. Lu, Xiwei Chen, Zhengming Yi, Kai Zhang, Shaoliang Wang","doi":"10.1109/IIH-MSP.2013.110","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.110","url":null,"abstract":"Multi-threshold image segmentation have achieved good results, but multi-threshold searching can be very time consuming, in order to improve the efficiency of multi-threshold searching, in this paper, the Firefly Algorithm is applied to solve multi-threshold searching. With maximum entropy as the optimization objective function, more information of images can be reserved, then using the Firefly Algorithm's heuristic searching, the optimal thresholds of image segmentation can be found. Experimental results show that compared to Genetic Algorithm, our proposed Firefly Algorithm has a higher convergence speed and produces a better segmentation effect when applied to image segmentation.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115413579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Security Analysis on Cyber-physical System Using Attack Tree 基于攻击树的网络物理系统安全分析
Feng Xie, Tianbo Lu, Xiaobo Guo, Jingli Liu, Yong Peng, Yang Gao
Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. Existing risk assessment for CPS always focuses on the reliability assessment, using Probability Risk Assessment (PRA). In this way, the assessment of physical part and cyber part is isolated as PRA is difficult to quantify the risks from the cyber world. Methodologies should be developed to assess the both parts as a whole system, considering this integrated system has a high coupling between the physical layer and cyber layer. In this paper, a risk assessment idea for CPS with the use of attack tree is proposed. Firstly, it presents a detailed description about the threat and vulnerability attributes of each leaf in an attack tree and tells how to assign value to its threat and vulnerability vector. Then this paper focuses on calculating the threat and vulnerability vector of an attack path with the use of the leaf vector values. Finally, damage is taken into account and an idea to calculate the risk value of the whole attack path is given.
信息物理系统(cyber - physical System, CPS)是为了提高物理性能而将物理系统与网络能力相结合的系统的系统。在与国计民生密切相关的领域得到了广泛的应用,因此CPS的安全问题已经引起了全球的关注,迫切需要对CPS进行适当的风险评估。现有的CPS风险评估多侧重于可靠性评估,多采用概率风险评估(PRA)。这样,由于PRA难以量化来自网络世界的风险,因此对物理部分和网络部分的评估是孤立的。考虑到这个集成系统在物理层和网络层之间具有高度耦合,应该开发方法来评估这两个部分作为一个整体系统。本文提出了一种基于攻击树的CPS风险评估思想。首先,对攻击树中每个叶子的威胁和漏洞属性进行详细描述,并对其威胁和漏洞向量进行赋值;然后利用叶向量值计算攻击路径的威胁向量和漏洞向量。最后,在考虑损伤的基础上,提出了一种计算整个攻击路径风险值的思路。
{"title":"Security Analysis on Cyber-physical System Using Attack Tree","authors":"Feng Xie, Tianbo Lu, Xiaobo Guo, Jingli Liu, Yong Peng, Yang Gao","doi":"10.1109/IIH-MSP.2013.113","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.113","url":null,"abstract":"Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. Existing risk assessment for CPS always focuses on the reliability assessment, using Probability Risk Assessment (PRA). In this way, the assessment of physical part and cyber part is isolated as PRA is difficult to quantify the risks from the cyber world. Methodologies should be developed to assess the both parts as a whole system, considering this integrated system has a high coupling between the physical layer and cyber layer. In this paper, a risk assessment idea for CPS with the use of attack tree is proposed. Firstly, it presents a detailed description about the threat and vulnerability attributes of each leaf in an attack tree and tells how to assign value to its threat and vulnerability vector. Then this paper focuses on calculating the threat and vulnerability vector of an attack path with the use of the leaf vector values. Finally, damage is taken into account and an idea to calculate the risk value of the whole attack path is given.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
License Plate Recognition for Moving Vehicles Using a Moving Camera 基于移动摄像头的移动车辆车牌识别
Chao-Ho Chen, Tsong-Yi Chen, Min-Tsung Wu, T. Tang, Wu-Chih Hu
This paper is dedicated to a license plate recognition (LPR) system for moving vehicles by using car video camera. The proposed LPR method mainly consists of preprocessing, plate location, and character segmentation & recognition. At irst, the possible regions of license plate are enhanced from the captured images through the proposed edge detection method and gradient-based binarization. Then, the correct plate regions are selected by analyzing the horizontal projection and the corner distribution. A vertical Sobel processing is performed on the segmented license-plate region and then the proposed weighted-binarization method is employed to segment each character of the license, followed by the skew correction. Finally, a probabilistic neural network (PNN) technique is applied to recognize each segmented character. Experimental results show that the accuracy rates of license-plate location and license-plate recognition can achieve 91.7% and 88.5%, respectively.
本文研究了一种基于车载摄像机的移动车辆车牌识别系统。本文提出的LPR方法主要包括预处理、车牌定位和字符分割与识别。首先,利用所提出的边缘检测方法和基于梯度的二值化方法,从采集的车牌图像中增强车牌可能存在的区域;然后,通过分析水平投影和角点分布,选择正确的板区;首先对分割后的车牌区域进行垂直索贝尔处理,然后利用所提出的加权二值化方法对车牌的每个字符进行分割,然后进行偏态校正。最后,应用概率神经网络(PNN)技术对每个被分割的字符进行识别。实验结果表明,车牌定位和车牌识别的准确率分别可达到91.7%和88.5%。
{"title":"License Plate Recognition for Moving Vehicles Using a Moving Camera","authors":"Chao-Ho Chen, Tsong-Yi Chen, Min-Tsung Wu, T. Tang, Wu-Chih Hu","doi":"10.1109/IIH-MSP.2013.129","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.129","url":null,"abstract":"This paper is dedicated to a license plate recognition (LPR) system for moving vehicles by using car video camera. The proposed LPR method mainly consists of preprocessing, plate location, and character segmentation & recognition. At irst, the possible regions of license plate are enhanced from the captured images through the proposed edge detection method and gradient-based binarization. Then, the correct plate regions are selected by analyzing the horizontal projection and the corner distribution. A vertical Sobel processing is performed on the segmented license-plate region and then the proposed weighted-binarization method is employed to segment each character of the license, followed by the skew correction. Finally, a probabilistic neural network (PNN) technique is applied to recognize each segmented character. Experimental results show that the accuracy rates of license-plate location and license-plate recognition can achieve 91.7% and 88.5%, respectively.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"88 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1