Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782878
Cheng-Hung Chen, Yen-Yun Liao, Shu-Wei Liu
This study presents tribal particle swarm optimization (TPSO) to optimize the parameters of the specific neurofuzzy inference system (NIS) for forecasting sunspot numbers. The proposed TPSO uses particle swarm optimization (PSO) as evolution strategies of the tribes optimization algorithm (TOA) to balance local and global exploration of the search space. Experimental results demonstrated that the proposed TPSO method converges quickly and yields a lower RMS error than other current methods.
{"title":"Neurofuzzy inference systems based on tribal particle swarm optimization for forecasting sunspot numbers","authors":"Cheng-Hung Chen, Yen-Yun Liao, Shu-Wei Liu","doi":"10.1109/ICICS.2013.6782878","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782878","url":null,"abstract":"This study presents tribal particle swarm optimization (TPSO) to optimize the parameters of the specific neurofuzzy inference system (NIS) for forecasting sunspot numbers. The proposed TPSO uses particle swarm optimization (PSO) as evolution strategies of the tribes optimization algorithm (TOA) to balance local and global exploration of the search space. Experimental results demonstrated that the proposed TPSO method converges quickly and yields a lower RMS error than other current methods.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782791
Jen-Ho Yang, Ya-Fen Chang, Chih-Cheng Huang
In the cloud computing, user authentication is an important security mechanism because it provides the functions of authentication, authorization, and accounting for cloud servers. However, the previously proposed user authentication schemes have many security and efficiency problems. In addition, these schemes can only work on single server environments. To solve the above problems, we propose a new user authentication scheme on multi-server environments for cloud computing in this paper. Compared with the related works, the proposed scheme has less computation costs. In addition, the proposed scheme can be applied to multi-server environments because the ID-based concept is used. Therefore, the proposed user authentication scheme provides efficiency, security, and flexibility for the cloud computing applications.
{"title":"A user authentication scheme on multi-server environments for cloud computing","authors":"Jen-Ho Yang, Ya-Fen Chang, Chih-Cheng Huang","doi":"10.1109/ICICS.2013.6782791","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782791","url":null,"abstract":"In the cloud computing, user authentication is an important security mechanism because it provides the functions of authentication, authorization, and accounting for cloud servers. However, the previously proposed user authentication schemes have many security and efficiency problems. In addition, these schemes can only work on single server environments. To solve the above problems, we propose a new user authentication scheme on multi-server environments for cloud computing in this paper. Compared with the related works, the proposed scheme has less computation costs. In addition, the proposed scheme can be applied to multi-server environments because the ID-based concept is used. Therefore, the proposed user authentication scheme provides efficiency, security, and flexibility for the cloud computing applications.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115239484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782932
B. Lei, Tianfu Wang, Siping Chen, Dong Ni, Haijun Lei
Currently, most medical images are stored and exchanged without any consideration of security, and hence it is highly desirable to provide content protection for medical images that are used in a secured environment. In this paper, a new and robust watermarking method is proposed to address this security issue. Specifically, signature information and textual data are inserted into the original medical images. The integer wavelet transform (IWT) are combined with singular value decomposition (SVD) to provide robustness in the proposed method. Meanwhile, differential evolution (DE) is used to optimally design the quantization steps (QSs) for controlling the watermarking strength. With hybrid techniques such as IWT, SVD, and DE, the proposed watermarking algorithm not only achieves good imperceptibility, but also high robustness. Experimental results demonstrate that the proposed method outperforms existing methods.
{"title":"Robust watermarking scheme for medical image using optimization method","authors":"B. Lei, Tianfu Wang, Siping Chen, Dong Ni, Haijun Lei","doi":"10.1109/ICICS.2013.6782932","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782932","url":null,"abstract":"Currently, most medical images are stored and exchanged without any consideration of security, and hence it is highly desirable to provide content protection for medical images that are used in a secured environment. In this paper, a new and robust watermarking method is proposed to address this security issue. Specifically, signature information and textual data are inserted into the original medical images. The integer wavelet transform (IWT) are combined with singular value decomposition (SVD) to provide robustness in the proposed method. Meanwhile, differential evolution (DE) is used to optimally design the quantization steps (QSs) for controlling the watermarking strength. With hybrid techniques such as IWT, SVD, and DE, the proposed watermarking algorithm not only achieves good imperceptibility, but also high robustness. Experimental results demonstrate that the proposed method outperforms existing methods.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114576074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782830
Yuri Umezaki, S. Goto
With the popularity of mobile devices such as mobile phones and cameras, zooming and displaying an arbitrary region of interest (ROI) from a high-resolution video has gained considerable importance. In this study, we implement two methods - partial decoding and tiled encoding - for ROI-based streaming in High Efficiency Video Coding (HEVC). In partial decoding, only the ROI and dependence area are decoded; this approach reduces the calculation cost. In tiled encoding, video frames are split into a grid of tiles, each of which is encoded independently; this approach requires a compatible decoder, and it reduces the streaming bitrate and decoding calculation cost. We evaluated these two methods in terms of the decoding calculation cost, bandwidth efficiency, and video quality. Experimental results show that partial decoding reduced the decoding calculation cost by 35-55%. Tiled encoding showed optimal decoding calculation cost and bandwidth efficiency for a tile size of 128 pixels.
随着移动设备(如移动电话和相机)的普及,从高分辨率视频中缩放和显示任意感兴趣区域(ROI)变得相当重要。在本研究中,我们针对高效率视讯编码(High Efficiency Video Coding, HEVC)中基于roi的串流,实现了部分解码和平铺编码两种方法。在部分解码中,只对感兴趣区域和相关区域进行解码;这种方法降低了计算成本。在平铺编码中,视频帧被分割成一个平铺网格,每个平铺网格独立编码;这种方法需要一个兼容的解码器,并且降低了流比特率和解码计算成本。我们从解码计算成本、带宽效率和视频质量三个方面对这两种方法进行了评价。实验结果表明,部分译码可使译码计算成本降低35 ~ 55%。对于128像素的平铺编码,显示出最佳的解码计算成本和带宽效率。
{"title":"Image segmentation approach for realizing zoomable streaming HEVC video","authors":"Yuri Umezaki, S. Goto","doi":"10.1109/ICICS.2013.6782830","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782830","url":null,"abstract":"With the popularity of mobile devices such as mobile phones and cameras, zooming and displaying an arbitrary region of interest (ROI) from a high-resolution video has gained considerable importance. In this study, we implement two methods - partial decoding and tiled encoding - for ROI-based streaming in High Efficiency Video Coding (HEVC). In partial decoding, only the ROI and dependence area are decoded; this approach reduces the calculation cost. In tiled encoding, video frames are split into a grid of tiles, each of which is encoded independently; this approach requires a compatible decoder, and it reduces the streaming bitrate and decoding calculation cost. We evaluated these two methods in terms of the decoding calculation cost, bandwidth efficiency, and video quality. Experimental results show that partial decoding reduced the decoding calculation cost by 35-55%. Tiled encoding showed optimal decoding calculation cost and bandwidth efficiency for a tile size of 128 pixels.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782792
Panyaporn Prangjarote, Chih-Yang Lin, C. Yeh
In fingerprint-based secure multimedia distribution systems, the encryption process is performed at the sender side before transmission, and the fingerprint embedding and decryption processes are performed at the receiver side simultaneously. In this paper, a low complexity joint fingerprint and decryption (JFD) scheme based on exclusive-or operations has been proposed, which can be effectively used for traitor tracing. The scheme encrypts only sub-pixels of the entire image using a tiny lookup table generated by a stream cipher. In the decryption process, some pixels can be completely recovered and the fingerprinting process depends on four different directions of sub-image blocks. The method successfully leaves the user's fingerprint during decryption and produces slightly different media copies. The experimental results show that the proposed scheme is highly effective in terms of perceptual security and fingerprinted visual quality.
{"title":"High efficient joint fingerprinting and decryption for multimedia distribution","authors":"Panyaporn Prangjarote, Chih-Yang Lin, C. Yeh","doi":"10.1109/ICICS.2013.6782792","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782792","url":null,"abstract":"In fingerprint-based secure multimedia distribution systems, the encryption process is performed at the sender side before transmission, and the fingerprint embedding and decryption processes are performed at the receiver side simultaneously. In this paper, a low complexity joint fingerprint and decryption (JFD) scheme based on exclusive-or operations has been proposed, which can be effectively used for traitor tracing. The scheme encrypts only sub-pixels of the entire image using a tiny lookup table generated by a stream cipher. In the decryption process, some pixels can be completely recovered and the fingerprinting process depends on four different directions of sub-image blocks. The method successfully leaves the user's fingerprint during decryption and produces slightly different media copies. The experimental results show that the proposed scheme is highly effective in terms of perceptual security and fingerprinted visual quality.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782897
Desi Luo, Qiyue Yu, W. Meng
The physical layer network coding (PNC) takes advantages of signal interference at relay node and improves the channel capacity, therefore, PNC becomes an important research topic. However, the frequency-selective fading channel would destroy the performances of PNC. This paper considers orthogonal frequency division multiplex (OFDM) in PNC, when signals transmitted over a frequency-selective fading channel, and an optimum power allocation scheme is proposed. Simulation results show that the presented system not only eliminates the multi-path interference, but also maximizes the channel capacity by the optimum power allocation.
{"title":"Optimum power allocation for OFDM in physical-layer network coding over a flat frequency-selective fading channel","authors":"Desi Luo, Qiyue Yu, W. Meng","doi":"10.1109/ICICS.2013.6782897","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782897","url":null,"abstract":"The physical layer network coding (PNC) takes advantages of signal interference at relay node and improves the channel capacity, therefore, PNC becomes an important research topic. However, the frequency-selective fading channel would destroy the performances of PNC. This paper considers orthogonal frequency division multiplex (OFDM) in PNC, when signals transmitted over a frequency-selective fading channel, and an optimum power allocation scheme is proposed. Simulation results show that the presented system not only eliminates the multi-path interference, but also maximizes the channel capacity by the optimum power allocation.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125057939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782913
Danyang Zhang, Fan Li, Chao Zhang
In this paper, a dual-decoder-based scheduling algorithm is proposed for H.264 video transmission over wireless networks. In the algorithm, the packet is scheduled by the packet quality contribution index (PQCI). The PQCI is defined and estimated not only by the quality distortion made for the current frame, but also by that made for the frames which directly or indirectly related with the current frame. A dual-decoder-model algorithm is proposed for the PQCI estimation. A novel architecture with two simulated decoders in the sender is developed. The simulations show that the proposed algorithm significantly outperforms the conventional methods in terms of received video qualities.
{"title":"Dual-decoder-model scheduling for H.264 video transmission over wireless networks","authors":"Danyang Zhang, Fan Li, Chao Zhang","doi":"10.1109/ICICS.2013.6782913","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782913","url":null,"abstract":"In this paper, a dual-decoder-based scheduling algorithm is proposed for H.264 video transmission over wireless networks. In the algorithm, the packet is scheduled by the packet quality contribution index (PQCI). The PQCI is defined and estimated not only by the quality distortion made for the current frame, but also by that made for the frames which directly or indirectly related with the current frame. A dual-decoder-model algorithm is proposed for the PQCI estimation. A novel architecture with two simulated decoders in the sender is developed. The simulations show that the proposed algorithm significantly outperforms the conventional methods in terms of received video qualities.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123483357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782776
T. Amin, P. Marziliano
A novel algorithm which accurately determines the glottal closing instants and glottal opening instants from the Differentiated Electroglottographic signals is presented.The glottal closing instants and glottal opening instant are modeled as non-bandlimited signals and methods for sampling and reconstructing signals with Finite Rate of Innovation are then used to recover the glottal closing instants and glottal opening instants. In comparison with existing methods, the proposed scheme achieves improved performance by providing 99% reliable estimates of glottal closing and opening instants respectively.
{"title":"Glottal activity detection using Finite Rate of Innovation methods","authors":"T. Amin, P. Marziliano","doi":"10.1109/ICICS.2013.6782776","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782776","url":null,"abstract":"A novel algorithm which accurately determines the glottal closing instants and glottal opening instants from the Differentiated Electroglottographic signals is presented.The glottal closing instants and glottal opening instant are modeled as non-bandlimited signals and methods for sampling and reconstructing signals with Finite Rate of Innovation are then used to recover the glottal closing instants and glottal opening instants. In comparison with existing methods, the proposed scheme achieves improved performance by providing 99% reliable estimates of glottal closing and opening instants respectively.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129394142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782962
Phyo-Kyaw Sai, Jian-Gang Wang, E. Teoh
Face image based age estimation is an approach to classify face images into one of several pre-defined age-groups. It is challenging because the aging variation is specific to a given individual and is determined by not only the person's gene, but also by many external factors, such as exposure, weather conditions (e.g. ambient humidity), health, gender, living style and living location. Age categorization is a multiclass problem. Lack of a good public aging dataset makes it difficult to estimate age from face image. Due to large multiclass nature of human ages, it is difficult to collect large aging database. In this paper, we proposed a novel approach to collect high quality aging face images. Application Programming Interface (API) services provided by Microsoft Search Engine Bing are adopted for this purpose. Automatic collection of age-specified query images was implemented in C# programming interface with Microsoft BING API services. The experimental results of age estimation has verified that our approach is a good way to collect aging images in huge volume since internet hosts a large number of images with age labeling. It serves as an alternative cheap platform to gather face images for age classification.
{"title":"Web image mining for facial age estimation","authors":"Phyo-Kyaw Sai, Jian-Gang Wang, E. Teoh","doi":"10.1109/ICICS.2013.6782962","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782962","url":null,"abstract":"Face image based age estimation is an approach to classify face images into one of several pre-defined age-groups. It is challenging because the aging variation is specific to a given individual and is determined by not only the person's gene, but also by many external factors, such as exposure, weather conditions (e.g. ambient humidity), health, gender, living style and living location. Age categorization is a multiclass problem. Lack of a good public aging dataset makes it difficult to estimate age from face image. Due to large multiclass nature of human ages, it is difficult to collect large aging database. In this paper, we proposed a novel approach to collect high quality aging face images. Application Programming Interface (API) services provided by Microsoft Search Engine Bing are adopted for this purpose. Automatic collection of age-specified query images was implemented in C# programming interface with Microsoft BING API services. The experimental results of age estimation has verified that our approach is a good way to collect aging images in huge volume since internet hosts a large number of images with age labeling. It serves as an alternative cheap platform to gather face images for age classification.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782974
Y. Ibdah, Yanwu Ding
In this paper, statistical models for cascaded Rayleigh fading channels with and without line-of-sight (LOS) are presented. The models comprise two individual summations of sinusoids with the Doppler frequencies calculated using fewer variables to reduce complexity. Statistical properties, including auto- and cross-correlations of the in-phase, quadrature components, and squared envelopes of the channels, are derived. The time-average statistical properties and the corresponding variance are also investigated to justify the convergence performance of the proposed models. Simulation results are provided to validate the performance of proposed models.
{"title":"Statistical properties for cascaded Rayleigh fading channel models","authors":"Y. Ibdah, Yanwu Ding","doi":"10.1109/ICICS.2013.6782974","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782974","url":null,"abstract":"In this paper, statistical models for cascaded Rayleigh fading channels with and without line-of-sight (LOS) are presented. The models comprise two individual summations of sinusoids with the Doppler frequencies calculated using fewer variables to reduce complexity. Statistical properties, including auto- and cross-correlations of the in-phase, quadrature components, and squared envelopes of the channels, are derived. The time-average statistical properties and the corresponding variance are also investigated to justify the convergence performance of the proposed models. Simulation results are provided to validate the performance of proposed models.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130931099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}