首页 > 最新文献

International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)最新文献

英文 中文
Segregating unique service object from multi-web sources for effective visualization 从多个web源中分离出唯一的服务对象,以实现有效的可视化
S. Jayanthi, S. Prema
Web services describe a standardized way of integrating Web-based applications using the XML (Extensible Markup Language), SOAP (Simple Object Access Protocol), WSDL and UDDI (Universal Description Discovery and Integration) open standards over an Internet protocol backbone. WSDL (Web Service Definition Language) is used for describing the available services. The dynamic approach starts with crawling on the Web for Web Services, simultaneously gathering the WSDL service descriptions and related documents. The Web APIs provide the methodology for building unique service objects from multiple web resources. In this semantic search engine, if the web user gets satisfied with the description they can crawl into the webpage, otherwise they can shift to another link. This query enhancement process is exploited to learn useful information that helps to generate related queries. In this research work the add-on is automatically generated when compared with the existing system. Add-on is programs that are integrated into the browser application, usually providing additional functionality. Finally this work gives an overview of how to segregate the unique service object (USO) using Bookshelf Data Structure from web resources and use it to semantically annotate the resulting services in visual mode.
Web服务描述了一种使用XML(可扩展标记语言)、SOAP(简单对象访问协议)、WSDL和UDDI(通用描述发现和集成)开放标准在Internet协议主干上集成基于Web的应用程序的标准化方法。WSDL (Web服务定义语言)用于描述可用的服务。动态方法首先在Web上搜索Web服务,同时收集WSDL服务描述和相关文档。Web api提供了从多个Web资源构建唯一服务对象的方法。在这个语义搜索引擎中,如果网络用户对描述感到满意,他们可以爬进网页,否则他们可以转移到另一个链接。该查询增强过程用于学习有助于生成相关查询的有用信息。在本研究中,通过与现有系统的比较,自动生成附加组件。插件是集成到浏览器应用程序中的程序,通常提供附加功能。最后,本文概述了如何使用书架数据结构从web资源中分离出唯一服务对象(USO),并使用它以可视化的方式对结果服务进行语义注释。
{"title":"Segregating unique service object from multi-web sources for effective visualization","authors":"S. Jayanthi, S. Prema","doi":"10.1109/ICPRIME.2012.6208283","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208283","url":null,"abstract":"Web services describe a standardized way of integrating Web-based applications using the XML (Extensible Markup Language), SOAP (Simple Object Access Protocol), WSDL and UDDI (Universal Description Discovery and Integration) open standards over an Internet protocol backbone. WSDL (Web Service Definition Language) is used for describing the available services. The dynamic approach starts with crawling on the Web for Web Services, simultaneously gathering the WSDL service descriptions and related documents. The Web APIs provide the methodology for building unique service objects from multiple web resources. In this semantic search engine, if the web user gets satisfied with the description they can crawl into the webpage, otherwise they can shift to another link. This query enhancement process is exploited to learn useful information that helps to generate related queries. In this research work the add-on is automatically generated when compared with the existing system. Add-on is programs that are integrated into the browser application, usually providing additional functionality. Finally this work gives an overview of how to segregate the unique service object (USO) using Bookshelf Data Structure from web resources and use it to semantically annotate the resulting services in visual mode.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131119007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mammogram image segmentation using fuzzy clustering 基于模糊聚类的乳房x线图像分割
R. Boss, K. Thangavel, D. Daniel
This paper proposes mammogram image segmentation using Fuzzy C-Means (FCM) clustering algorithm. The median filter is used for pre-processing of image. It is normally used to reduce noise in an image. The 14 Haralick features are extracted from mammogram image using Gray Level Co-occurrence Matrix (GLCM) for different angles. The features are clustered by K-Means and FCM algorithms inorder to segment the region of interests for further classification. The performance of segmentation result of the proposed algorithm is measured according to the error values such as Mean Square Error (MSE) and Root Means Square Error (RMSE). The Mammogram images used in our experiment are obtained from MIAS database.
本文提出了一种基于模糊c均值(FCM)聚类算法的乳房x线图像分割方法。采用中值滤波器对图像进行预处理。它通常用于减少图像中的噪声。利用灰度共生矩阵(GLCM)对不同角度的乳房x线照片提取14个哈拉利克特征。通过K-Means和FCM算法对特征进行聚类,以分割感兴趣的区域进行进一步分类。根据均方误差(Mean Square error, MSE)和均方根误差(Root Mean Square error, RMSE)等误差值来衡量该算法的分割效果。在我们的实验中使用的乳房x光图像是从MIAS数据库中获得的。
{"title":"Mammogram image segmentation using fuzzy clustering","authors":"R. Boss, K. Thangavel, D. Daniel","doi":"10.1109/ICPRIME.2012.6208360","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208360","url":null,"abstract":"This paper proposes mammogram image segmentation using Fuzzy C-Means (FCM) clustering algorithm. The median filter is used for pre-processing of image. It is normally used to reduce noise in an image. The 14 Haralick features are extracted from mammogram image using Gray Level Co-occurrence Matrix (GLCM) for different angles. The features are clustered by K-Means and FCM algorithms inorder to segment the region of interests for further classification. The performance of segmentation result of the proposed algorithm is measured according to the error values such as Mean Square Error (MSE) and Root Means Square Error (RMSE). The Mammogram images used in our experiment are obtained from MIAS database.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131240500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Design and implementation of secure, platform-free, and network-based remote controlling and monitoring system 安全、无平台、基于网络的远程控制与监控系统的设计与实现
C. L. Chowdhary, P. Mouli
In present scenario, it is challenging to access widely distributed and huge data from many network systems to a single network system. There are several problems like, monitoring of remote devices and controlling of its operations. A reliable, secure and platform-free remote controller, with ability of monitoring, can overcome such problems. In this paper, a new design of network-based remote controlling and monitoring system is proposed which is platform-free and more secure in comparison with other existing systems. The basic concept is to use the network base for the purpose of real-time remote monitoring and controlling of processing equipment.
在目前的情况下,将分布广泛的海量数据从多个网络系统中接入到一个单一的网络系统中是一项挑战。有几个问题,如远程设备的监控和控制其操作。一个可靠、安全、无平台、具有监控功能的遥控器可以克服这些问题。本文提出了一种新的基于网络的远程控制与监控系统的设计方案,与现有的系统相比,该系统具有无平台性和更高的安全性。其基本概念是利用网络基地对加工设备进行实时远程监控。
{"title":"Design and implementation of secure, platform-free, and network-based remote controlling and monitoring system","authors":"C. L. Chowdhary, P. Mouli","doi":"10.1109/ICPRIME.2012.6208342","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208342","url":null,"abstract":"In present scenario, it is challenging to access widely distributed and huge data from many network systems to a single network system. There are several problems like, monitoring of remote devices and controlling of its operations. A reliable, secure and platform-free remote controller, with ability of monitoring, can overcome such problems. In this paper, a new design of network-based remote controlling and monitoring system is proposed which is platform-free and more secure in comparison with other existing systems. The basic concept is to use the network base for the purpose of real-time remote monitoring and controlling of processing equipment.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121140440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Image compression using H.264 and deflate algorithm 图像压缩采用H.264和deflate算法
M. Sundaresan, E. Devika
Compound image is combination of text, graphics and pictures. Compression is the process of reducing the amount of data required to represent information. It also reduces the time required for the data to be sent over the Internet or Web pages. Compound image compression is done on the basis of lossy and lossless compression. Lossy compression is a data encoding method that compresses data by discarding (losing) some data in the image. Lossless compression is used to compress the image without any loss of data in the image. Image compression is done using lossy compression and lossless compression. In this paper different techniques are used for compressing compound images. The performance of these techniques has been compared.
复合图像是文字、图形和图片的组合。压缩是减少表示信息所需的数据量的过程。它还减少了通过Internet或Web页面发送数据所需的时间。复合图像压缩是在有损压缩和无损压缩的基础上进行的。有损压缩是一种通过丢弃(丢失)图像中的一些数据来压缩数据的数据编码方法。无损压缩是指在不丢失图像数据的情况下对图像进行压缩。图像压缩分为有损压缩和无损压缩两种。本文采用了不同的技术来压缩复合图像。对这些技术的性能进行了比较。
{"title":"Image compression using H.264 and deflate algorithm","authors":"M. Sundaresan, E. Devika","doi":"10.1109/ICPRIME.2012.6208351","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208351","url":null,"abstract":"Compound image is combination of text, graphics and pictures. Compression is the process of reducing the amount of data required to represent information. It also reduces the time required for the data to be sent over the Internet or Web pages. Compound image compression is done on the basis of lossy and lossless compression. Lossy compression is a data encoding method that compresses data by discarding (losing) some data in the image. Lossless compression is used to compress the image without any loss of data in the image. Image compression is done using lossy compression and lossless compression. In this paper different techniques are used for compressing compound images. The performance of these techniques has been compared.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127132572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Geometric feature based face-sketch recognition 基于几何特征的人脸素描识别
S. Pramanik, D. Bhattacharjee
This paper presents a novel facial sketch image or face-sketch recognition approach based on facial feature extraction. To recognize a face-sketch, we have concentrated on a set of geometric face features like eyes, nose, eyebrows, lips, etc and their length and width ratio because it is difficult to match photos and sketches because they belong to two different modalities. In this system, first the facial features/components from training images are extracted, then ratios of length, width, and area etc. are calculated and those are stored as feature vectors for individual images. After that the mean feature vectors are computed and subtracted from each feature vector for centering of the feature vectors. In the next phase, feature vector for the incoming probe face-sketch is also computed in similar fashion. Here, K-NN classifier is used to recognize probe face-sketch. It is experimentally verified that the proposed method is robust against faces are in a frontal pose, with normal lighting and neutral expression and have no occlusions. The experiment has been conducted with 80 male and female face images from different face databases. It has useful applications for both law enforcement and digital entertainment.
提出了一种基于人脸特征提取的人脸素描图像或人脸素描识别方法。为了识别人脸草图,我们集中研究了一组几何面部特征,如眼睛、鼻子、眉毛、嘴唇等,以及它们的长宽比,因为照片和草图属于两种不同的模态,很难匹配。在该系统中,首先从训练图像中提取面部特征/成分,然后计算长度、宽度和面积等的比率,并将其存储为单个图像的特征向量。然后计算平均特征向量,并从每个特征向量中减去特征向量的中心。在下一阶段,也以类似的方式计算输入的探针面部草图的特征向量。本文采用K-NN分类器对探针人脸进行识别。实验验证了该方法对正面、光照正常、表情中性、无遮挡的人脸具有较强的鲁棒性。该实验使用了来自不同面部数据库的80张男性和女性面部图像。它对执法和数字娱乐都有很好的应用。
{"title":"Geometric feature based face-sketch recognition","authors":"S. Pramanik, D. Bhattacharjee","doi":"10.1109/ICPRIME.2012.6208381","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208381","url":null,"abstract":"This paper presents a novel facial sketch image or face-sketch recognition approach based on facial feature extraction. To recognize a face-sketch, we have concentrated on a set of geometric face features like eyes, nose, eyebrows, lips, etc and their length and width ratio because it is difficult to match photos and sketches because they belong to two different modalities. In this system, first the facial features/components from training images are extracted, then ratios of length, width, and area etc. are calculated and those are stored as feature vectors for individual images. After that the mean feature vectors are computed and subtracted from each feature vector for centering of the feature vectors. In the next phase, feature vector for the incoming probe face-sketch is also computed in similar fashion. Here, K-NN classifier is used to recognize probe face-sketch. It is experimentally verified that the proposed method is robust against faces are in a frontal pose, with normal lighting and neutral expression and have no occlusions. The experiment has been conducted with 80 male and female face images from different face databases. It has useful applications for both law enforcement and digital entertainment.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117029467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Computational unfoldment of mammograms 乳房x线照片的计算展开
M. Joshi, A. Bhale
The importance of mammograms in early breast cancer detection is an accepted fact. Mammograms (either an analog x-ray film or a digital softcopy) are computationally empowered to extract significant information. Several computational techniques/algorithms process mammograms to highlight and reveal otherwise unseen features. Thus mammographic images are computationally unfolded to obtain appropriate information that can be used for further analysis. Computational analysis of mammograms is an essential tool, which is used by numerous specialists for various purposes. In this paper we review such research work reported in the literature in recent years. Our focus is in particular on computational preprocessing of mammograms. Preprocessing involves enhancement of mammographic images as well as extraction of relevant features from images. We grouped various image enhancement research approaches systematically. We also categorized various research techniques based on the types of features that are extracted and used to obtain intended results. Although mammograms are used mostly for breast cancer detection, the research is not confined to this aspect only. Several other areas that deal with mammograms are also explored by researchers including image compression, Content based Image Retrieval (CBIR) etc. Variety in these research applications is also discussed and presented in this paper.
乳房x光检查在早期乳腺癌检测中的重要性是公认的事实。乳房x光片(无论是模拟x射线胶片还是数字软拷贝)都具有计算能力,可以提取重要信息。一些计算技术/算法处理乳房x光片以突出和显示其他未见的特征。因此,乳房x线摄影图像被计算展开,以获得可用于进一步分析的适当信息。乳房x光片的计算分析是一种重要的工具,被许多专家用于各种目的。本文对近年来文献报道的此类研究工作进行了综述。我们的重点是乳房x线照片的计算预处理。预处理包括乳房x线摄影图像的增强以及从图像中提取相关特征。我们对各种图像增强的研究方法进行了系统的分类。我们还根据提取和用于获得预期结果的特征类型对各种研究技术进行了分类。虽然乳房x光检查主要用于乳腺癌的检测,但研究并不局限于这方面。研究人员还探讨了乳房x线照片处理的其他几个领域,包括图像压缩、基于内容的图像检索(CBIR)等。本文还讨论和介绍了这些研究应用的多样性。
{"title":"Computational unfoldment of mammograms","authors":"M. Joshi, A. Bhale","doi":"10.1109/ICPRIME.2012.6208366","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208366","url":null,"abstract":"The importance of mammograms in early breast cancer detection is an accepted fact. Mammograms (either an analog x-ray film or a digital softcopy) are computationally empowered to extract significant information. Several computational techniques/algorithms process mammograms to highlight and reveal otherwise unseen features. Thus mammographic images are computationally unfolded to obtain appropriate information that can be used for further analysis. Computational analysis of mammograms is an essential tool, which is used by numerous specialists for various purposes. In this paper we review such research work reported in the literature in recent years. Our focus is in particular on computational preprocessing of mammograms. Preprocessing involves enhancement of mammographic images as well as extraction of relevant features from images. We grouped various image enhancement research approaches systematically. We also categorized various research techniques based on the types of features that are extracted and used to obtain intended results. Although mammograms are used mostly for breast cancer detection, the research is not confined to this aspect only. Several other areas that deal with mammograms are also explored by researchers including image compression, Content based Image Retrieval (CBIR) etc. Variety in these research applications is also discussed and presented in this paper.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117221623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network programming and mining classifier for intrusion detection using probability classification 基于概率分类的入侵检测网络规划与挖掘分类器
P. Prasenna, A. V. T. RaghavRamana, R. Krishnakumar, A. Devanbu
In conventional network security simply relies on mathematical algorithms and low counter measures to taken to prevent intrusion detection system, although most of this approaches in terms of theoretically challenged to implement. Therefore, a variety of algorithms have been committed to this challenge. Instead of generating large number of rules the evolution optimization techniques like Genetic Network Programming (GNP) can be used. The GNP is based on directed graph, In this paper the security issues related to deploy a data mining-based IDS in a real time environment is focused upon. We generalize the problem of GNP with association rule mining and propose a fuzzy weighted association rule mining with GNP framework suitable for both continuous and discrete attributes. Our proposal follows an Apriori algorithm based fuzzy WAR and GNP and avoids pre and post processing thus eliminating the extra steps during rules generation. This method can sufficient to evaluate misuse and anomaly detection. Experiments on KDD99Cup and DARPA98 data show the high detection rate and accuracy compared with other conventional method.
传统的网络安全仅仅依靠数学算法和较低的防御措施来采取入侵检测系统,尽管大多数这种方法在理论上难以实现。因此,各种各样的算法都致力于解决这一挑战。可以使用遗传网络规划(GNP)等进化优化技术来代替生成大量规则。本文重点研究了在实时环境中部署基于数据挖掘的入侵检测系统的安全问题。将关联规则挖掘广义化GNP问题,提出了一种适用于连续属性和离散属性的模糊加权关联规则挖掘框架。我们的建议遵循基于模糊WAR和GNP的Apriori算法,避免了预处理和后处理,从而消除了规则生成过程中的额外步骤。该方法可以充分评估误用和异常检测。在KDD99Cup和DARPA98数据上的实验表明,与其他常规方法相比,该方法具有较高的检出率和准确率。
{"title":"Network programming and mining classifier for intrusion detection using probability classification","authors":"P. Prasenna, A. V. T. RaghavRamana, R. Krishnakumar, A. Devanbu","doi":"10.1109/ICPRIME.2012.6208344","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208344","url":null,"abstract":"In conventional network security simply relies on mathematical algorithms and low counter measures to taken to prevent intrusion detection system, although most of this approaches in terms of theoretically challenged to implement. Therefore, a variety of algorithms have been committed to this challenge. Instead of generating large number of rules the evolution optimization techniques like Genetic Network Programming (GNP) can be used. The GNP is based on directed graph, In this paper the security issues related to deploy a data mining-based IDS in a real time environment is focused upon. We generalize the problem of GNP with association rule mining and propose a fuzzy weighted association rule mining with GNP framework suitable for both continuous and discrete attributes. Our proposal follows an Apriori algorithm based fuzzy WAR and GNP and avoids pre and post processing thus eliminating the extra steps during rules generation. This method can sufficient to evaluate misuse and anomaly detection. Experiments on KDD99Cup and DARPA98 data show the high detection rate and accuracy compared with other conventional method.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122624894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Deceptive phishing detection system: From audio and text messages in Instant Messengers using Data Mining approach 欺骗性网络钓鱼检测系统:基于数据挖掘方法的即时通讯语音和文本信息
M. M. Ali, L. Rajamani
Deceptive Phishing is the major problem in Instant Messengers, much of sensitive and personal information, disclosed through socio-engineered text messages for which solution is proposed[2] but, detection of phishing through voice chatting technique in Instant Messengers is not yet done which is the motivating factor to carry out the work and solution to address this problem of privacy in Instant Messengers (IM) is proposed using Association Rule Mining (ARM) technique a Data Mining approach integrated with Speech Recognition system. Words are recognized from speech with the help of FFT spectrum analysis and LPC coefficients methodologies. Online criminal's now-a-days adapted voice chatting technique along with text messages collaboratively or either of them in IM's and wraps out personal information leads to threat and hindrance for privacy. In order to focus on privacy preserving we developed and experimented Anti Phishing Detection system (APD) in IM's to detect deceptive phishing for text and audio collaboratively.
欺骗性网络钓鱼是即时通讯工具中的主要问题,许多敏感和个人信息通过社会工程文本消息泄露,对此提出了解决方案[2],但是,利用语音聊天技术检测即时通讯软件中的网络钓鱼的研究尚未完成,这是开展这项工作的激励因素,并提出了利用关联规则挖掘(ARM)技术和语音识别系统相结合的数据挖掘方法来解决即时通讯软件(IM)中的隐私问题。在FFT频谱分析和LPC系数方法的帮助下,从语音中识别单词。当今网络犯罪分子将语音聊天技术与文本信息协同使用,或者在IM中使用其中之一,并包装个人信息,导致隐私受到威胁和阻碍。为了保护用户的隐私,我们开发并试验了IM中的反网络钓鱼检测系统(APD),以协同检测文本和音频的欺骗性网络钓鱼。
{"title":"Deceptive phishing detection system: From audio and text messages in Instant Messengers using Data Mining approach","authors":"M. M. Ali, L. Rajamani","doi":"10.1109/ICPRIME.2012.6208390","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208390","url":null,"abstract":"Deceptive Phishing is the major problem in Instant Messengers, much of sensitive and personal information, disclosed through socio-engineered text messages for which solution is proposed[2] but, detection of phishing through voice chatting technique in Instant Messengers is not yet done which is the motivating factor to carry out the work and solution to address this problem of privacy in Instant Messengers (IM) is proposed using Association Rule Mining (ARM) technique a Data Mining approach integrated with Speech Recognition system. Words are recognized from speech with the help of FFT spectrum analysis and LPC coefficients methodologies. Online criminal's now-a-days adapted voice chatting technique along with text messages collaboratively or either of them in IM's and wraps out personal information leads to threat and hindrance for privacy. In order to focus on privacy preserving we developed and experimented Anti Phishing Detection system (APD) in IM's to detect deceptive phishing for text and audio collaboratively.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127870962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Comparison of DTW and HMM for isolated word recognition DTW和HMM在孤立词识别中的比较
S. C. Sajjan, C. Vijaya
This study proposes limited vocabulary isolated word recognition using Linear Predictive Coding(LPC) and Mel Frequency Cepstral Coefficients(MFCC) for feature extraction, Dynamic Time Warping(DTW) and discrete Hidden Markov Model (HMM) for recognition and their comparisons. Feature extraction is carried over the speech frame of 300 samples with 100 samples overlap at 8 KHz sampling rate of the input speech. MFCC analysis provides better recognition rate than LPC as it operates on a logarithmic scale which resembles human auditory system whereas LPC has uniform resolution over the frequency plane. This is followed by pattern recognition. Since the voice signal tends to have different temporal rate, DTW is one of the methods that provide non-linear alignment between two voice signals. Another method called HMM that statistically models the words is also presented. Experimentally it is observed that recognition accuracy is better for HMM compared with DTW. The database used is TI-46 isolated word corpus zero-nine from Linguist Data Consortium.
本研究提出了使用线性预测编码(LPC)和Mel频率倒谱系数(MFCC)进行特征提取,动态时间扭曲(DTW)和离散隐马尔可夫模型(HMM)进行识别并比较有限词汇孤立词的方法。在输入语音的8 KHz采样率下,对300个样本的语音帧进行特征提取,其中100个样本重叠。MFCC分析具有比LPC更好的识别率,因为它在类似于人类听觉系统的对数尺度上运行,而LPC在频率平面上具有均匀的分辨率。接下来是模式识别。由于语音信号往往具有不同的时间速率,DTW是在两个语音信号之间提供非线性对准的方法之一。本文还介绍了另一种称为HMM的方法,该方法可以对单词进行统计建模。实验结果表明,HMM的识别精度优于DTW。使用的数据库是来自Linguist Data Consortium的TI-46孤立词语料库zero- 9。
{"title":"Comparison of DTW and HMM for isolated word recognition","authors":"S. C. Sajjan, C. Vijaya","doi":"10.1109/ICPRIME.2012.6208391","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208391","url":null,"abstract":"This study proposes limited vocabulary isolated word recognition using Linear Predictive Coding(LPC) and Mel Frequency Cepstral Coefficients(MFCC) for feature extraction, Dynamic Time Warping(DTW) and discrete Hidden Markov Model (HMM) for recognition and their comparisons. Feature extraction is carried over the speech frame of 300 samples with 100 samples overlap at 8 KHz sampling rate of the input speech. MFCC analysis provides better recognition rate than LPC as it operates on a logarithmic scale which resembles human auditory system whereas LPC has uniform resolution over the frequency plane. This is followed by pattern recognition. Since the voice signal tends to have different temporal rate, DTW is one of the methods that provide non-linear alignment between two voice signals. Another method called HMM that statistically models the words is also presented. Experimentally it is observed that recognition accuracy is better for HMM compared with DTW. The database used is TI-46 isolated word corpus zero-nine from Linguist Data Consortium.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128671487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Interpolation based image watermarking resisting to geometrical attacks 基于插值的抗几何攻击图像水印
J. Veerappan, G. Pitchammal
The main theme of this application is to provide an algorithm for grayscale and color image watermark to manage the attacks such as rotation, scaling and translation. In the existing watermarking algorithms, those exploited robust features are more or less related to the pixel position, so they cannot be more robust against the attacks. In order to solve this problem this application focus on certain parameters rather than the pixel position for watermarking. Two statistical features such as the histogram shape and the mean of Gaussian filtered low-frequency component of images are taken for this proposed application to make the watermarking algorithm robust to attacks and also interpolation technique is used to increase the number of bites to be needed.
本应用程序的主题是为灰度和彩色图像水印提供一种算法来管理旋转,缩放和平移等攻击。在现有的水印算法中,所利用的鲁棒性特征或多或少与像素位置有关,因此对攻击的鲁棒性无法提高。为了解决这个问题,本应用侧重于某些参数而不是像素位置进行水印。利用直方图形状和高斯滤波图像低频分量的均值这两个统计特征使水印算法对攻击具有鲁棒性,并采用插值技术增加了所需的咬数。
{"title":"Interpolation based image watermarking resisting to geometrical attacks","authors":"J. Veerappan, G. Pitchammal","doi":"10.1109/ICPRIME.2012.6208353","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208353","url":null,"abstract":"The main theme of this application is to provide an algorithm for grayscale and color image watermark to manage the attacks such as rotation, scaling and translation. In the existing watermarking algorithms, those exploited robust features are more or less related to the pixel position, so they cannot be more robust against the attacks. In order to solve this problem this application focus on certain parameters rather than the pixel position for watermarking. Two statistical features such as the histogram shape and the mean of Gaussian filtered low-frequency component of images are taken for this proposed application to make the watermarking algorithm robust to attacks and also interpolation technique is used to increase the number of bites to be needed.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121909923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1