Pub Date : 2018-07-01DOI: 10.1109/CCE.2018.8465739
Thi My Chinh Chu, H. Zepernick
In this paper, we study the employment of power-domain non-orthogonal multiple access (NOMA) concepts for a cooperative cognitive relay network (CCRN) downlink system in order to allow a base station (BS) to simultaneously transmit signals to a primary user (PU) and a secondary user (SU). As such, the considered system falls into the field of cognitive radio inspired power-domain NOMA. In this scheme, the interference power constraint of the PU imposed to SUs in conventional underlay CCRNs is replaced by controlling the power allocation coefficients at the BS and relay. Specifically, expressions for the symbol error rates at the PU and SU for different modulation schemes as well as expressions for the achievable rates are derived. On this basis, the effect of system parameters such as total transmit power and power allocation coefficients on the performance of the CCRN with power-domain NOMA is numerically studied. These numerical results provide insights into selecting favorable operation modes of the CCRN employing power-domain NOMA.
{"title":"Symbol Error Rate and Achievable Rate of Cognitive Cooperative Radio Networks Utilizing Non-Orthogonal Multiple Access","authors":"Thi My Chinh Chu, H. Zepernick","doi":"10.1109/CCE.2018.8465739","DOIUrl":"https://doi.org/10.1109/CCE.2018.8465739","url":null,"abstract":"In this paper, we study the employment of power-domain non-orthogonal multiple access (NOMA) concepts for a cooperative cognitive relay network (CCRN) downlink system in order to allow a base station (BS) to simultaneously transmit signals to a primary user (PU) and a secondary user (SU). As such, the considered system falls into the field of cognitive radio inspired power-domain NOMA. In this scheme, the interference power constraint of the PU imposed to SUs in conventional underlay CCRNs is replaced by controlling the power allocation coefficients at the BS and relay. Specifically, expressions for the symbol error rates at the PU and SU for different modulation schemes as well as expressions for the achievable rates are derived. On this basis, the effect of system parameters such as total transmit power and power allocation coefficients on the performance of the CCRN with power-domain NOMA is numerically studied. These numerical results provide insights into selecting favorable operation modes of the CCRN employing power-domain NOMA.","PeriodicalId":118716,"journal":{"name":"2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130987862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/CCE.2018.8465758
Vu Quoc Tuan, N. Nguyen, Meng-Syuan Wu, C. Jen, B. T. Tung, Chu Duc Trinh
This study reports the results on the development of an electrical impedance-based protein detection circuit board for the protein detection biochip. A digital quadrature phase shift module, which can generate two sine waves with 90-degree difference in phase in a large frequency range is employed for lock-in amplifier block for impedance profiling. A microcontroller is used for frequency selection and data acquisition. The measurement module is connected with a computer to display the impedance profile. The implemented board were applied to protein detection biochip to detect the presence of the protein of interest in an essay sample. Experiment is performed for 10 μM Bovine serum albumin (BSA) labeled with fluorescein isothiocyanate (FITC-BSA) protein sample in 10 mM PBS medium solution with the frequency range from 10 kHz to 200 kHz. The measured results reveal a clear impedance change between before and after trapping protein on the microelectrodes of the biochip. The developed electrical impedance spectroscopy board enables rapid and effective protein detection at low concentration.
本研究报告了一种用于蛋白质检测生物芯片的基于电阻抗的蛋白质检测电路板的开发结果。锁相放大器采用数字正交移相模块,该模块可以在大频率范围内产生两个相位差为90度的正弦波。单片机用于频率选择和数据采集。测量模块与计算机连接,显示阻抗曲线。所实现的板应用于蛋白质检测生物芯片,以检测论文样品中感兴趣的蛋白质的存在。实验采用10 μM异硫氰酸荧光素(FITC-BSA)蛋白标记牛血清白蛋白(BSA)样品,在10 mM PBS介质溶液中,频率范围为10 kHz ~ 200 kHz。测量结果显示,在生物芯片的微电极上捕获蛋白质前后,阻抗发生了明显的变化。开发的电阻抗谱板可以在低浓度下快速有效地检测蛋白质。
{"title":"Development of an Impedance Spectroscopy Measurement Circuit Board for Protein Detection","authors":"Vu Quoc Tuan, N. Nguyen, Meng-Syuan Wu, C. Jen, B. T. Tung, Chu Duc Trinh","doi":"10.1109/CCE.2018.8465758","DOIUrl":"https://doi.org/10.1109/CCE.2018.8465758","url":null,"abstract":"This study reports the results on the development of an electrical impedance-based protein detection circuit board for the protein detection biochip. A digital quadrature phase shift module, which can generate two sine waves with 90-degree difference in phase in a large frequency range is employed for lock-in amplifier block for impedance profiling. A microcontroller is used for frequency selection and data acquisition. The measurement module is connected with a computer to display the impedance profile. The implemented board were applied to protein detection biochip to detect the presence of the protein of interest in an essay sample. Experiment is performed for 10 μM Bovine serum albumin (BSA) labeled with fluorescein isothiocyanate (FITC-BSA) protein sample in 10 mM PBS medium solution with the frequency range from 10 kHz to 200 kHz. The measured results reveal a clear impedance change between before and after trapping protein on the microelectrodes of the biochip. The developed electrical impedance spectroscopy board enables rapid and effective protein detection at low concentration.","PeriodicalId":118716,"journal":{"name":"2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131880620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/CCE.2018.8465764
V. B. Surya Prasath, D. N. Thanh, N. H. Hai
Image denoising and selective smoothing are important research problems in the area of image processing and computer vision. Partial differential equation (PDE) model filters were widely utilized due to their robust anisotropic diffusion properties that preserve edges. Spatial regularization via Gaussian low-pass filtering is used in well posed anisotropic diffusion PDE for image restoration that involves a crucial scale parameter. In this work, we provide an appropriate scale selection approach that obtains improved selective smoothing with nonlinear diffusion. Experimental results indicate the promise of such a strategy on a variety of synthetic and real noisy images. Further, compared to other diffusion PDE models the proposed technique improves the quality of final denoised images in terms of higher peak signal to noise ratio and structural similarity.
{"title":"On Selecting the Appropriate Scale in Image Selective Smoothing by Nonlinear Diffusion","authors":"V. B. Surya Prasath, D. N. Thanh, N. H. Hai","doi":"10.1109/CCE.2018.8465764","DOIUrl":"https://doi.org/10.1109/CCE.2018.8465764","url":null,"abstract":"Image denoising and selective smoothing are important research problems in the area of image processing and computer vision. Partial differential equation (PDE) model filters were widely utilized due to their robust anisotropic diffusion properties that preserve edges. Spatial regularization via Gaussian low-pass filtering is used in well posed anisotropic diffusion PDE for image restoration that involves a crucial scale parameter. In this work, we provide an appropriate scale selection approach that obtains improved selective smoothing with nonlinear diffusion. Experimental results indicate the promise of such a strategy on a variety of synthetic and real noisy images. Further, compared to other diffusion PDE models the proposed technique improves the quality of final denoised images in terms of higher peak signal to noise ratio and structural similarity.","PeriodicalId":118716,"journal":{"name":"2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114492271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/CCE.2018.8465718
Q. Nguyen, Truong Thu Huong, Kim Phuc, Minh Le Nguyen, P. Castagliola, Salim Lardjane
One-class support vector machines (OCSVM) have been recently applied in intrusion detection. Typically, OCSVM is kernelized by radial basis functions (RBF, or Gaussian kernel) whereas selecting Gaussian kernel hyperparameter is based upon availability of attacks, which is rarely applicable in practice. This paper investigates the application of nested OCSVM to detect intruders in network systems with data-driven hyperparameter optimization. The nested OCSVM is able to improve the efficiency over the proposed OCSVM applied in intrusion detection. In addition, the information of the farthest and the nearest neighbors of each sample is used to construct the objective cost instead of labeling based metrics such as geometric mean accuracy. The efficiency of this method is illustrated over the KDD99 dataset whereas the resulting estimated boundary, as well as intrusion detection performance, are comparable with existing methods. The experimental results show that the nested OCSVM method performs better than OCSVM for intrusion detection. The nested OCSVM with 12 density levels achieves 98.28% in accuracy and higher true alarming rate (TP) comparing to OCSVM.
{"title":"Nested One-Class Support Vector Machines for Network Intrusion Detection","authors":"Q. Nguyen, Truong Thu Huong, Kim Phuc, Minh Le Nguyen, P. Castagliola, Salim Lardjane","doi":"10.1109/CCE.2018.8465718","DOIUrl":"https://doi.org/10.1109/CCE.2018.8465718","url":null,"abstract":"One-class support vector machines (OCSVM) have been recently applied in intrusion detection. Typically, OCSVM is kernelized by radial basis functions (RBF, or Gaussian kernel) whereas selecting Gaussian kernel hyperparameter is based upon availability of attacks, which is rarely applicable in practice. This paper investigates the application of nested OCSVM to detect intruders in network systems with data-driven hyperparameter optimization. The nested OCSVM is able to improve the efficiency over the proposed OCSVM applied in intrusion detection. In addition, the information of the farthest and the nearest neighbors of each sample is used to construct the objective cost instead of labeling based metrics such as geometric mean accuracy. The efficiency of this method is illustrated over the KDD99 dataset whereas the resulting estimated boundary, as well as intrusion detection performance, are comparable with existing methods. The experimental results show that the nested OCSVM method performs better than OCSVM for intrusion detection. The nested OCSVM with 12 density levels achieves 98.28% in accuracy and higher true alarming rate (TP) comparing to OCSVM.","PeriodicalId":118716,"journal":{"name":"2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125906108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/cce.2018.8465707
{"title":"ICCE 2018 TOC","authors":"","doi":"10.1109/cce.2018.8465707","DOIUrl":"https://doi.org/10.1109/cce.2018.8465707","url":null,"abstract":"","PeriodicalId":118716,"journal":{"name":"2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128321707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/CCE.2018.8465577
L. T. Hoang, Chuyen T. Nguyen, A. Pham
This paper proposes a novel time- and energy-efficient identification protocol in dense radio frequency identifi-cation (RFID) systems. The protocol is based on the conventional M-ary collision tree (MCT) where tags involving a collision are classified into other M sub-trees. Nevertheless, different from the MCT, we design a transmission mechanism by which each tag only responds to the reader by a small number of bits for a collision detection. The mechanism is relied on a collision window and Manchester encoding that are widely used for RFID systems. Thanks to the mechanism, the number of bits transmitted by tags is significantly reduced, which improves the overall system performance in terms of both time and energy consumption. Performance analysis is investigated to validate the correctness of the mechanism. Computer simulations are also performed using Monte-Carlo method. The obtained results are then compared with those of the MCT to confirm the effectiveness of the proposed protocol.
{"title":"A Novel Time- and Energy-Efficient Tag Identification Protocol in Dense RFID Systems","authors":"L. T. Hoang, Chuyen T. Nguyen, A. Pham","doi":"10.1109/CCE.2018.8465577","DOIUrl":"https://doi.org/10.1109/CCE.2018.8465577","url":null,"abstract":"This paper proposes a novel time- and energy-efficient identification protocol in dense radio frequency identifi-cation (RFID) systems. The protocol is based on the conventional M-ary collision tree (MCT) where tags involving a collision are classified into other M sub-trees. Nevertheless, different from the MCT, we design a transmission mechanism by which each tag only responds to the reader by a small number of bits for a collision detection. The mechanism is relied on a collision window and Manchester encoding that are widely used for RFID systems. Thanks to the mechanism, the number of bits transmitted by tags is significantly reduced, which improves the overall system performance in terms of both time and energy consumption. Performance analysis is investigated to validate the correctness of the mechanism. Computer simulations are also performed using Monte-Carlo method. The obtained results are then compared with those of the MCT to confirm the effectiveness of the proposed protocol.","PeriodicalId":118716,"journal":{"name":"2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128477562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/CCE.2018.8465755
Thi My Chinh Chu, H. Zepernick
In this paper, we employ power-domain non-orthogonal multiple access (NOMA) to simultaneously transmit signals to both a primary user (PU) and a secondary user (SU) of a cognitive cooperative radio network (CCRN). Higher priority is given to the PU over the SU by keeping the power allocation coefficients at the base station (BS) and relay (R) above a certain threshold. In this way, similar as the interference power limit imposed by the PU in a conventional underlay CCRN, the power allocation coefficients at the BS and R of the CCRN can be controlled to maintain a given outage performance. Analytical expressions of the cumulative distribution function of the end-to-end signal-to-interference-plus-noise ratios at the PU and SU are derived and then used to assess the outage probabilities of both users. Numerical results are presented to study the impact of system parameters on outage performance of the CCRN with power-domain NOMA. In addition, it is illustrated that increased downlink performance can be obtained by combining power-domain NOMA with CCRNs.
{"title":"Downlink Outage Analysis for Cognitive Cooperative Radio Networks Employing Non-Orthogonal Multiple Access","authors":"Thi My Chinh Chu, H. Zepernick","doi":"10.1109/CCE.2018.8465755","DOIUrl":"https://doi.org/10.1109/CCE.2018.8465755","url":null,"abstract":"In this paper, we employ power-domain non-orthogonal multiple access (NOMA) to simultaneously transmit signals to both a primary user (PU) and a secondary user (SU) of a cognitive cooperative radio network (CCRN). Higher priority is given to the PU over the SU by keeping the power allocation coefficients at the base station (BS) and relay (R) above a certain threshold. In this way, similar as the interference power limit imposed by the PU in a conventional underlay CCRN, the power allocation coefficients at the BS and R of the CCRN can be controlled to maintain a given outage performance. Analytical expressions of the cumulative distribution function of the end-to-end signal-to-interference-plus-noise ratios at the PU and SU are derived and then used to assess the outage probabilities of both users. Numerical results are presented to study the impact of system parameters on outage performance of the CCRN with power-domain NOMA. In addition, it is illustrated that increased downlink performance can be obtained by combining power-domain NOMA with CCRNs.","PeriodicalId":118716,"journal":{"name":"2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129378873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/CCE.2018.8465730
Nguyen Duy Phong, Linh Ho Manh, Kiem Nguyen Khac, Dao Ngoc Chien
A circular polarization dual-feed array antenna for X-band satellite is proposed. In this paper, sequential phased rotation principle applied for 2×2 sub-arrays and 4×4 array is introduced. A dual feeding network for single element is analyzed and designed in such a way that it can obtain 90 degree phase difference and 1:1 power ratio for each output port. The capacitive annular gaps are placed on inside of square driver patch for impedance matching. Consequently, X-band ranging from 8.04 to 8.4 GHz is covered completely and axial ratio is less than 2 dB. An 4×4 array antenna has a simulated gain of 13.76 dBi is achieved at 8.2 GHz. The whole antenna achieves a compact size and shows a great potential in satellite communication.
{"title":"Circular Polarization Dual-Feed Array Antenna for X-Band Satellite Communication","authors":"Nguyen Duy Phong, Linh Ho Manh, Kiem Nguyen Khac, Dao Ngoc Chien","doi":"10.1109/CCE.2018.8465730","DOIUrl":"https://doi.org/10.1109/CCE.2018.8465730","url":null,"abstract":"A circular polarization dual-feed array antenna for X-band satellite is proposed. In this paper, sequential phased rotation principle applied for 2×2 sub-arrays and 4×4 array is introduced. A dual feeding network for single element is analyzed and designed in such a way that it can obtain 90 degree phase difference and 1:1 power ratio for each output port. The capacitive annular gaps are placed on inside of square driver patch for impedance matching. Consequently, X-band ranging from 8.04 to 8.4 GHz is covered completely and axial ratio is less than 2 dB. An 4×4 array antenna has a simulated gain of 13.76 dBi is achieved at 8.2 GHz. The whole antenna achieves a compact size and shows a great potential in satellite communication.","PeriodicalId":118716,"journal":{"name":"2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128817083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/CCE.2018.8465731
A. Nguyen-Ngoc, Simon Raffeck, Stanislav Lange, Stefan Geissler, T. Zinner, P. Tran-Gia
The increased popularity of Software Defined Networking (SDN) drives the development and research of all involved components. In particular, state-of-the-art SDN controllers are a central part of the resulting network architecture and have a large impact on the performance of the entire network. Hence, it is necessary to quantify various performance indicators of the SDN controller in order to assess its feasibility in the context of different network characteristics such as topology and network size w.r.t. the number of nodes and links.To this end, we extend the open-source controller benchmarking tool OFCProbe with several novel modules that are capable of recording relevant performance metrics and demonstrate their use in the context of benchmarking the ONOS controller. Furthermore, we investigate the impact of different types of topology characteristics on the performance of the controller.In this work, we focus on several performance indicators for SDN controllers. First, the time that the ONOS controller needs to discover the network topology and update its internal representation of the topology. Second, we investigate the duration of the installation of flow rules that are used for reactive path provisioning. Finally, we measure the response time of the controller when dealing with asynchronous messages.
{"title":"Benchmarking the ONOS Controller with OFCProbe","authors":"A. Nguyen-Ngoc, Simon Raffeck, Stanislav Lange, Stefan Geissler, T. Zinner, P. Tran-Gia","doi":"10.1109/CCE.2018.8465731","DOIUrl":"https://doi.org/10.1109/CCE.2018.8465731","url":null,"abstract":"The increased popularity of Software Defined Networking (SDN) drives the development and research of all involved components. In particular, state-of-the-art SDN controllers are a central part of the resulting network architecture and have a large impact on the performance of the entire network. Hence, it is necessary to quantify various performance indicators of the SDN controller in order to assess its feasibility in the context of different network characteristics such as topology and network size w.r.t. the number of nodes and links.To this end, we extend the open-source controller benchmarking tool OFCProbe with several novel modules that are capable of recording relevant performance metrics and demonstrate their use in the context of benchmarking the ONOS controller. Furthermore, we investigate the impact of different types of topology characteristics on the performance of the controller.In this work, we focus on several performance indicators for SDN controllers. First, the time that the ONOS controller needs to discover the network topology and update its internal representation of the topology. Second, we investigate the duration of the installation of flow rules that are used for reactive path provisioning. Finally, we measure the response time of the controller when dealing with asynchronous messages.","PeriodicalId":118716,"journal":{"name":"2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114133448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/CCE.2018.8465710
Nai-Kuei Chen, Shi-Yao Zhou, Chih-Chien Cheng, Chung-Yen Su
The researches of Internet of things are getting more and more popular these years. To exchange secret data through the internet, the reversible data hiding technique plays an important role. As we know, since medical images generally consist of many pure black and white points, traditional reversible data hiding techniques encounter some bottlenecks in medical images. These points are called boundary points and they may cause the overflow and underflow problems to happen after data hiding. In this paper, we propose a new reversible data hiding method to solve these problems. The method is a hybrid scheme based on the one-dimension and two-dimension difference expansions. We introduce an efficient classification to interchange the expansion schemes. In addition, we introduce boundary expandable schemes. We demonstrate the effectiveness of the proposed method across a wide range of medical images. Compared with the previous methods, the proposed one has higher hiding capacity, higher image quality, and less size of location map. To get further applications precisely, we also demonstrate the proposed scheme on a mobile device to show its application on the internet of healthcare.
{"title":"Reversible Data Hiding for Medical Images Using Boundary Expandable Schemes","authors":"Nai-Kuei Chen, Shi-Yao Zhou, Chih-Chien Cheng, Chung-Yen Su","doi":"10.1109/CCE.2018.8465710","DOIUrl":"https://doi.org/10.1109/CCE.2018.8465710","url":null,"abstract":"The researches of Internet of things are getting more and more popular these years. To exchange secret data through the internet, the reversible data hiding technique plays an important role. As we know, since medical images generally consist of many pure black and white points, traditional reversible data hiding techniques encounter some bottlenecks in medical images. These points are called boundary points and they may cause the overflow and underflow problems to happen after data hiding. In this paper, we propose a new reversible data hiding method to solve these problems. The method is a hybrid scheme based on the one-dimension and two-dimension difference expansions. We introduce an efficient classification to interchange the expansion schemes. In addition, we introduce boundary expandable schemes. We demonstrate the effectiveness of the proposed method across a wide range of medical images. Compared with the previous methods, the proposed one has higher hiding capacity, higher image quality, and less size of location map. To get further applications precisely, we also demonstrate the proposed scheme on a mobile device to show its application on the internet of healthcare.","PeriodicalId":118716,"journal":{"name":"2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}