首页 > 最新文献

2017 IEEE 17th International Conference on Communication Technology (ICCT)最新文献

英文 中文
A screening scheme based on energy for speech key-frame 基于能量的语音关键帧筛选方案
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359908
Yingjie Meng, Xiaoyu Teng, Huiran Liu, Sanshuai Cui, Zhiyuan Wang
The research of the existing screening algorithm for speech frame has a great deal of shortcomings, such as its applicability and complexity. Worse still, those frames which are screened by algorithm can't achieve the requirement of express and the screening process greatly damages the original signal. This paper presents a strategy for screening speech keyframe and designs a screening scheme for key-frames based on the strategy. This scheme refers to the speech's logarithm energy and the weighted-zero-crossing rate. The detail process of screening scheme: firstly, screening frames according to the logarithm energy of the speech signals. Meanwhile, combine the speech amplitude and zero-crossing rate for frames screening. Finally, calculate the similarity of the two screening results, and getting the key-frame set. In addition, the scheme has been analyzed and validated from those aspects like continuity, characterization and applicability, in order to verify the effectiveness and availability. The results illustrate that these frames which have been screened by this scheme have advantages of continuity, characterization etc.
现有的语音帧筛选算法的研究存在着适用性和复杂性等诸多不足。更糟糕的是,算法筛选出来的帧不能达到表达的要求,而且筛选过程对原始信号的破坏很大。提出了一种语音关键帧的筛选策略,并在此基础上设计了一种关键帧的筛选方案。该方案是指语音的对数能量和加权过零率。筛选方案的详细过程:首先,根据语音信号的对数能量进行帧筛选。同时,结合语音幅值和过零率进行帧筛选。最后,计算两次筛选结果的相似度,得到关键帧集。并从连续性、表征性、适用性等方面对方案进行了分析和验证,验证了方案的有效性和可用性。结果表明,用该方案筛选出来的帧具有连续性、特征化等优点。
{"title":"A screening scheme based on energy for speech key-frame","authors":"Yingjie Meng, Xiaoyu Teng, Huiran Liu, Sanshuai Cui, Zhiyuan Wang","doi":"10.1109/ICCT.2017.8359908","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359908","url":null,"abstract":"The research of the existing screening algorithm for speech frame has a great deal of shortcomings, such as its applicability and complexity. Worse still, those frames which are screened by algorithm can't achieve the requirement of express and the screening process greatly damages the original signal. This paper presents a strategy for screening speech keyframe and designs a screening scheme for key-frames based on the strategy. This scheme refers to the speech's logarithm energy and the weighted-zero-crossing rate. The detail process of screening scheme: firstly, screening frames according to the logarithm energy of the speech signals. Meanwhile, combine the speech amplitude and zero-crossing rate for frames screening. Finally, calculate the similarity of the two screening results, and getting the key-frame set. In addition, the scheme has been analyzed and validated from those aspects like continuity, characterization and applicability, in order to verify the effectiveness and availability. The results illustrate that these frames which have been screened by this scheme have advantages of continuity, characterization etc.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127548605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and simulation of an adaptive filter in MIMO-PLC system MIMO-PLC系统自适应滤波器的设计与仿真
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359920
Song-nong Li, Xingzhe Hou, Guoqing Xu, Xiao Liu
In recent years, much attention has been paid to multiple-input-multiple-output (MIMO) signal processing in power line communication (PLC), to increase channel capacity and anti-interference ability. In this study, an adaptive filter was designed to reduce the influence of interference and bit error rate in MIMO-PLC random channel. This filter was set in the receiving port of a 3×4 MIMO-PLC system. The bit error rate before and after adding filter was analyzed and compared. Results show that the filter provides a remarkable performance gain on bit error rate in this 3×4 MIMO-PLC system.
近年来,多输入多输出(MIMO)信号处理在电力线通信(PLC)中的应用受到了广泛的关注,以提高信道容量和抗干扰能力。针对MIMO-PLC随机信道中干扰和误码率的影响,设计了一种自适应滤波器。该滤波器设置在3×4 MIMO-PLC系统的接收端口。对加滤波前后的误码率进行了分析和比较。结果表明,该滤波器在3×4 MIMO-PLC系统中提供了显著的误码率性能增益。
{"title":"Design and simulation of an adaptive filter in MIMO-PLC system","authors":"Song-nong Li, Xingzhe Hou, Guoqing Xu, Xiao Liu","doi":"10.1109/ICCT.2017.8359920","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359920","url":null,"abstract":"In recent years, much attention has been paid to multiple-input-multiple-output (MIMO) signal processing in power line communication (PLC), to increase channel capacity and anti-interference ability. In this study, an adaptive filter was designed to reduce the influence of interference and bit error rate in MIMO-PLC random channel. This filter was set in the receiving port of a 3×4 MIMO-PLC system. The bit error rate before and after adding filter was analyzed and compared. Results show that the filter provides a remarkable performance gain on bit error rate in this 3×4 MIMO-PLC system.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130021332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An adaptive PSO-based real-time workflow scheduling algorithm in cloud systems 云系统中基于自适应pso的实时工作流调度算法
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359966
Pengze Guo, Zhi Xue
Cloud computing has emerged as a powerful platform for providing computing resources in the past decade. Developing workflow scheduling algorithms can efficiently reduce the cost of executing tasks in cloud systems. The features of elasticity and heterogeneity of cloud computing bring challenges for scheduling strategies. For real-time workflows, reducing execution time and reducing execution cost are two conflicting objectives. To address this issue, we propose in this paper an improved real-time workflow scheduling algorithm based on particle swarm optimization (PSO). Different from traditional scheduling heuristics which rely on the initial resource pool, our algorithm can adaptively optimize the resource usage. Simulation experiments are conducted to evaluate our algorithm on workflows with different sizes under various deadlines. Compared with the best algorithm ever known, our algorithm shows excellent performance in both cost and makespan.
在过去的十年中,云计算已经成为提供计算资源的强大平台。开发工作流调度算法可以有效地降低云系统中执行任务的成本。云计算的弹性和异构性给调度策略带来了挑战。对于实时工作流,减少执行时间和降低执行成本是两个相互冲突的目标。针对这一问题,本文提出了一种改进的基于粒子群优化(PSO)的实时工作流调度算法。与传统的依赖于初始资源池的调度启发式算法不同,该算法能够自适应优化资源的使用。通过仿真实验对不同期限下不同规模的工作流进行了算法评估。与目前已知的最佳算法相比,该算法在成本和完工时间方面都表现出优异的性能。
{"title":"An adaptive PSO-based real-time workflow scheduling algorithm in cloud systems","authors":"Pengze Guo, Zhi Xue","doi":"10.1109/ICCT.2017.8359966","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359966","url":null,"abstract":"Cloud computing has emerged as a powerful platform for providing computing resources in the past decade. Developing workflow scheduling algorithms can efficiently reduce the cost of executing tasks in cloud systems. The features of elasticity and heterogeneity of cloud computing bring challenges for scheduling strategies. For real-time workflows, reducing execution time and reducing execution cost are two conflicting objectives. To address this issue, we propose in this paper an improved real-time workflow scheduling algorithm based on particle swarm optimization (PSO). Different from traditional scheduling heuristics which rely on the initial resource pool, our algorithm can adaptively optimize the resource usage. Simulation experiments are conducted to evaluate our algorithm on workflows with different sizes under various deadlines. Compared with the best algorithm ever known, our algorithm shows excellent performance in both cost and makespan.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dynamic analysis of VANET using temporal reachability graph 基于时间可达图的VANET动态分析
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359744
Huifang Feng, Junpeng Zhang, Junxia Wang, Youji Xu
The topology dynamic is one of the important characteristics of vehicular ad hoc network (VANET). The study of the temporal topology of VANET plays a significant role in network protocol development and management. The temporal model of VANET as temporal reachability graph model is built. This model not only describes the packet transmission time, but also can capture the store-and-forward mechanism in VANET. The relations of the packet transmission time τ and the maximum tolerated delay time δ to the density, global efficiency and link duration are analyzed. The results show that compared to the static network, the temporal network can capture the information transmission process in VANET better, and the decrease of packet transmission time τ or the increase of maximum tolerated delay time δ contributes to the improvement of transmission efficiency of VANET.
拓扑动态性是车载自组织网络(VANET)的重要特征之一。VANET时间拓扑的研究对网络协议的开发和管理具有重要意义。建立了VANET的时间模型作为时间可达性图模型。该模型不仅描述了分组的传输时间,而且能够捕捉VANET中的存储转发机制。分析了分组传输时间τ和最大容忍延迟时间δ与密度、全局效率和链路持续时间的关系。结果表明,与静态网络相比,时间网络能更好地捕捉VANET中的信息传输过程,数据包传输时间τ的减小或最大容忍延迟时间δ的增大有助于VANET传输效率的提高。
{"title":"Dynamic analysis of VANET using temporal reachability graph","authors":"Huifang Feng, Junpeng Zhang, Junxia Wang, Youji Xu","doi":"10.1109/ICCT.2017.8359744","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359744","url":null,"abstract":"The topology dynamic is one of the important characteristics of vehicular ad hoc network (VANET). The study of the temporal topology of VANET plays a significant role in network protocol development and management. The temporal model of VANET as temporal reachability graph model is built. This model not only describes the packet transmission time, but also can capture the store-and-forward mechanism in VANET. The relations of the packet transmission time τ and the maximum tolerated delay time δ to the density, global efficiency and link duration are analyzed. The results show that compared to the static network, the temporal network can capture the information transmission process in VANET better, and the decrease of packet transmission time τ or the increase of maximum tolerated delay time δ contributes to the improvement of transmission efficiency of VANET.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131070661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security performance analysis for cooperative communication system under Nakagami-m fading channel Nakagami-m衰落信道下协同通信系统的安全性能分析
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359628
Lei Peng, G. Zang, Qian Zhou, Yuanyuan Gao, Chenjing Xi
In this paper, we investigate the secure transmission problem of cooperative communication systems where a potential malicious eavesdropper is existing. Based on the more general Nakagami-m fading channels, we adopt a strategy to improve the system security performance by decoding and forwarding signals at the relay as well as sending interference signals simultaneously. In this model, the outage probability and the intercept probability which represent reliability and security respectively are derived, meanwhile, the influence of the power allocation of each node on the system performance is discussed. Simulations are provided to analyze the tradeoff between reliability and security of the system, and the variation in tradeoff performance under different power allocation.
本文研究了存在潜在恶意窃听者的协作通信系统的安全传输问题。基于更通用的Nakagami-m衰落信道,我们采用在中继处解码和转发信号并同时发送干扰信号的策略来提高系统的安全性能。在该模型中,分别推导了代表可靠性和安全性的中断概率和拦截概率,并讨论了各节点的功率分配对系统性能的影响。仿真分析了系统在可靠性和安全性之间的权衡,以及在不同功率分配下权衡性能的变化。
{"title":"Security performance analysis for cooperative communication system under Nakagami-m fading channel","authors":"Lei Peng, G. Zang, Qian Zhou, Yuanyuan Gao, Chenjing Xi","doi":"10.1109/ICCT.2017.8359628","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359628","url":null,"abstract":"In this paper, we investigate the secure transmission problem of cooperative communication systems where a potential malicious eavesdropper is existing. Based on the more general Nakagami-m fading channels, we adopt a strategy to improve the system security performance by decoding and forwarding signals at the relay as well as sending interference signals simultaneously. In this model, the outage probability and the intercept probability which represent reliability and security respectively are derived, meanwhile, the influence of the power allocation of each node on the system performance is discussed. Simulations are provided to analyze the tradeoff between reliability and security of the system, and the variation in tradeoff performance under different power allocation.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131845892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The technology of deviation compensation for radar phantom tracks 雷达幻迹偏差补偿技术
Pub Date : 2017-10-01 DOI: 10.1109/icct.2017.8359804
Xiang Liu, Dongsheng Li
One important issue when multiple cooperating electronic combat air vehicles (ECAVs) are used to generate phantom radar tracks in a radar network is the position inaccuracy. Under the background of radar network with the centralized fusion architecture, the same-source-testing recognition for phantom track jamming has been proposed in the presence of the difference of spatial distribution property between phantom track and target track. In order to solve this problem, a deviation compensation for phantom radar tracks is presented. Firstly, the effect of the inaccuracies of radar position and ECAVs position to the phantom track is considered. Then, a deviation compensation for the same-source-testing recognition is proposed. Finally, the simulation results show that the method can reduce the recognition rate of phantom track effectively.
在雷达网络中使用多架协同作战的电子作战飞机(ecav)产生雷达幻影航迹的一个重要问题是位置不准确。在集中式融合架构的雷达网络背景下,针对虚拟航迹与目标航迹空间分布特性的差异,提出了虚拟航迹干扰的同源测试识别方法。为了解决这一问题,提出了一种对雷达影迹进行偏差补偿的方法。首先,考虑了雷达位置误差和ECAVs位置误差对虚拟航迹的影响。在此基础上,提出了同源测试识别的偏差补偿方法。仿真结果表明,该方法可以有效地降低伪迹的识别率。
{"title":"The technology of deviation compensation for radar phantom tracks","authors":"Xiang Liu, Dongsheng Li","doi":"10.1109/icct.2017.8359804","DOIUrl":"https://doi.org/10.1109/icct.2017.8359804","url":null,"abstract":"One important issue when multiple cooperating electronic combat air vehicles (ECAVs) are used to generate phantom radar tracks in a radar network is the position inaccuracy. Under the background of radar network with the centralized fusion architecture, the same-source-testing recognition for phantom track jamming has been proposed in the presence of the difference of spatial distribution property between phantom track and target track. In order to solve this problem, a deviation compensation for phantom radar tracks is presented. Firstly, the effect of the inaccuracies of radar position and ECAVs position to the phantom track is considered. Then, a deviation compensation for the same-source-testing recognition is proposed. Finally, the simulation results show that the method can reduce the recognition rate of phantom track effectively.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132093043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SPOIL: Practical location privacy for location based services 用于基于位置的服务的实用位置隐私
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359701
Chen Di, S. Xiaodong, Ge Hailong, Li Hao, Zhou Shilei
This paper presents SPOIL (Shifted POI List), a new method to achieve location privacy for map services on smartphones. Using SPOIL, users can query routes from POI (Point of Interests) A to POI B, while not revealing the locations of A and B to the map server. Different from previous works, SPOIL is transparent to existing map services, assume no trusted third party, and more efficient for smartphones. The basic idea is simple: the client (i.e., smartphone) shifts user-intended POIs to some neighboring POIs instead, and query the map server using the shifted POIs. By carefully selecting places for shifting, we ensure: (1) privacy: on observing the route query, it is difficult for an adversary to identify the user-intended endpoints. (2) usability: the returned route is very similar to the intended one, thus giving useful directions for the user; To make SPOIL efficient for smartphones, we let clients retrieve candidate places for shifting from an additional server, instead of storing all the places and computing nearest ones locally. We implement SPOIL as an Android application, and evaluate it with real query traces. Experimental results show that SPOIL strikes a good balance among privacy, usability and efficiency.
本文提出了一种实现智能手机地图服务位置隐私的新方法——shiftpoi List (SPOIL)。使用SPOIL,用户可以查询从POI(兴趣点)A到POI B的路线,而不会向地图服务器显示A和B的位置。与之前的作品不同,SPOIL对现有的地图服务是透明的,假设没有可信的第三方,对智能手机更高效。基本思想很简单:客户端(即智能手机)将用户预期的poi转移到一些邻近的poi,并使用转移的poi查询地图服务器。通过仔细选择移动的位置,我们确保:(1)隐私:在观察路由查询时,攻击者很难识别用户预期的端点。(2)可用性:返回的路径与预期的路径非常相似,从而为用户提供有用的方向;为了使智能手机的SPOIL更高效,我们让客户端检索候选位置以便从另一个服务器转移,而不是存储所有位置并在本地计算最近的位置。我们将SPOIL实现为Android应用程序,并使用真实的查询跟踪对其进行评估。实验结果表明,该算法在隐私性、可用性和效率之间取得了很好的平衡。
{"title":"SPOIL: Practical location privacy for location based services","authors":"Chen Di, S. Xiaodong, Ge Hailong, Li Hao, Zhou Shilei","doi":"10.1109/ICCT.2017.8359701","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359701","url":null,"abstract":"This paper presents SPOIL (Shifted POI List), a new method to achieve location privacy for map services on smartphones. Using SPOIL, users can query routes from POI (Point of Interests) A to POI B, while not revealing the locations of A and B to the map server. Different from previous works, SPOIL is transparent to existing map services, assume no trusted third party, and more efficient for smartphones. The basic idea is simple: the client (i.e., smartphone) shifts user-intended POIs to some neighboring POIs instead, and query the map server using the shifted POIs. By carefully selecting places for shifting, we ensure: (1) privacy: on observing the route query, it is difficult for an adversary to identify the user-intended endpoints. (2) usability: the returned route is very similar to the intended one, thus giving useful directions for the user; To make SPOIL efficient for smartphones, we let clients retrieve candidate places for shifting from an additional server, instead of storing all the places and computing nearest ones locally. We implement SPOIL as an Android application, and evaluate it with real query traces. Experimental results show that SPOIL strikes a good balance among privacy, usability and efficiency.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132203053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Video dual watermarking algorithm against geometric attack based on ASIFT and contourlet transform 基于ASIFT和contourlet变换的抗几何攻击视频双水印算法
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359931
Shuqin Chen, Zhi Li, Xinyu Cheng, Qingxia Gao
This study proposed a video dual watermarking algorithm based on affine-scale invariant feature transform (ASIFT) and contourlet transform. First, the human visual masking model of a 3D motion in video sequence is studied in depth. The human eye visual masking threshold is obtained as the maximum embedding intensity of watermark using various motion characteristics. Second, the high- and low-frequency sub-band coefficients of the contourlet field are obtained by contourlet transform. Chaotic watermarking sequence is embedded into the high-frequency sub-band coefficient with the highest energy to increase imperceptibility. Third, when the low-frequency sub-band coefficients has the stability of its coefficient histogram against geometric attacks such as rotation and scaling, the watermark signal is embedded in a low-frequency sub-band histogram of adjacent coefficients to increase the watermark of an anti-geometric attack. Finally, ASIFT is used as a trigger to determine whether the video frame is subjected to geometric attacks or not. For geometric distortions, ASIFT is used to regulate the geometrically attacked video frame. The low-frequency sub-band coefficients of the regulated video frame are used for the watermarking extraction algorithm. The high-frequency watermarking extraction algorithm is used directly for the non-geometric distortions. Experimental results show that the proposed algorithm could guarantee watermark invisibility and favorably extract the watermark for common geometric and conventional signal attacks. The proposed algorithm is a strong video-dual watermarking algorithm.
提出了一种基于仿射尺度不变特征变换(ASIFT)和contourlet变换的视频双水印算法。首先,对视频序列中三维运动的人类视觉掩蔽模型进行了深入研究。利用各种运动特征得到人眼视觉掩蔽阈值作为水印的最大嵌入强度。其次,通过contourlet变换得到contourlet场的高、低频子带系数;混沌水印序列被嵌入到能量最高的高频子带系数中,以增加不可感知性。第三,当低频子带系数的系数直方图对旋转、缩放等几何攻击具有稳定性时,将水印信号嵌入相邻系数的低频子带直方图中,增加水印抗几何攻击的能力。最后,使用ASIFT作为触发器来确定视频帧是否受到几何攻击。对于几何畸变,采用ASIFT对受到几何攻击的视频帧进行调节。将调整后的视频帧的低频子带系数用于水印提取算法。对非几何畸变直接采用高频水印提取算法。实验结果表明,该算法能够保证水印的不可见性,并能较好地提取出常见的几何和常规信号攻击的水印。该算法是一种强视频对偶水印算法。
{"title":"Video dual watermarking algorithm against geometric attack based on ASIFT and contourlet transform","authors":"Shuqin Chen, Zhi Li, Xinyu Cheng, Qingxia Gao","doi":"10.1109/ICCT.2017.8359931","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359931","url":null,"abstract":"This study proposed a video dual watermarking algorithm based on affine-scale invariant feature transform (ASIFT) and contourlet transform. First, the human visual masking model of a 3D motion in video sequence is studied in depth. The human eye visual masking threshold is obtained as the maximum embedding intensity of watermark using various motion characteristics. Second, the high- and low-frequency sub-band coefficients of the contourlet field are obtained by contourlet transform. Chaotic watermarking sequence is embedded into the high-frequency sub-band coefficient with the highest energy to increase imperceptibility. Third, when the low-frequency sub-band coefficients has the stability of its coefficient histogram against geometric attacks such as rotation and scaling, the watermark signal is embedded in a low-frequency sub-band histogram of adjacent coefficients to increase the watermark of an anti-geometric attack. Finally, ASIFT is used as a trigger to determine whether the video frame is subjected to geometric attacks or not. For geometric distortions, ASIFT is used to regulate the geometrically attacked video frame. The low-frequency sub-band coefficients of the regulated video frame are used for the watermarking extraction algorithm. The high-frequency watermarking extraction algorithm is used directly for the non-geometric distortions. Experimental results show that the proposed algorithm could guarantee watermark invisibility and favorably extract the watermark for common geometric and conventional signal attacks. The proposed algorithm is a strong video-dual watermarking algorithm.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130862855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Saturated throughput analysis of vehicular ad hoc networks over Rayleigh-fading channels 瑞利衰落信道上车载自组网的饱和吞吐量分析
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359626
Wuwen Lai, Ning Guan, Han Liu, Hua Wang
Throughput is a key network performance for disseminating infotainment services in Vehicular Ad Hoc Networks (VANETs). However, when throughput is analyzed by Markov chain, wireless channel conditions and vehicle speed are not taken into account in modeling Medium Access Control (MAC) operations. In this paper, we propose an improved Markov chain model combining the above two factors to calculate the transmission probability. The saturated throughput is evaluated with considering MAC operations, wireless channel conditions, and vehicle speed. Compared with the basic model, our proposed model can accurately evaluate the saturation throughput with consideration of the aforementioned three factors simultaneously.
在车载自组织网络(VANETs)中,吞吐量是传播信息娱乐服务的关键网络性能。然而,当使用马尔可夫链分析吞吐量时,在对介质访问控制(MAC)操作建模时没有考虑无线信道条件和车辆速度。在本文中,我们提出了一种结合上述两个因素的改进马尔可夫链模型来计算传输概率。考虑MAC操作、无线信道条件和车辆速度,对饱和吞吐量进行了评估。与基本模型相比,本文提出的模型可以准确地评估同时考虑上述三个因素的饱和吞吐量。
{"title":"Saturated throughput analysis of vehicular ad hoc networks over Rayleigh-fading channels","authors":"Wuwen Lai, Ning Guan, Han Liu, Hua Wang","doi":"10.1109/ICCT.2017.8359626","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359626","url":null,"abstract":"Throughput is a key network performance for disseminating infotainment services in Vehicular Ad Hoc Networks (VANETs). However, when throughput is analyzed by Markov chain, wireless channel conditions and vehicle speed are not taken into account in modeling Medium Access Control (MAC) operations. In this paper, we propose an improved Markov chain model combining the above two factors to calculate the transmission probability. The saturated throughput is evaluated with considering MAC operations, wireless channel conditions, and vehicle speed. Compared with the basic model, our proposed model can accurately evaluate the saturation throughput with consideration of the aforementioned three factors simultaneously.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130870360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OFDM MIMO radar waveform design with high range resolution and low sidelobe level 高距离分辨率、低旁瓣电平的OFDM MIMO雷达波形设计
Pub Date : 2017-10-01 DOI: 10.1109/icct.2017.8359797
Ting Bai, Hanying Hu, Xiyu Song
In this paper, we presented a novel waveform design method for orthogonal frequency division multiplexing (OFDM) multiple input multiple output (MIMO) radar with low sidelobe level and high range resolution. The signal model that all OFDM subcarriers are transmitted on each antenna is established to ensure high range resolution. And code domain orthogonality is achieved through complex orthogonal design (COD). Moreover, we transform range sidelobe suppression into an unconstrained optimization problem based on the relationship between the transmitted waveform and the phase. The Integrated Sidelobe Level (ISL) is utilized as the objective function, and then solved by Broyden-Fletcher-Goldfarb-Shanno (BFGS) algorithm. Simulation results show that the proposed method has remarkable performance in suppressing sidelobe and high range resolution.
针对正交频分复用(OFDM)多输入多输出(MIMO)雷达,提出了一种具有低旁瓣电平和高距离分辨率的波形设计方法。为了保证高距离分辨率,建立了在每个天线上传输所有OFDM子载波的信号模型。通过复正交设计实现码域正交性。此外,我们将距离旁瓣抑制转化为基于传输波形与相位关系的无约束优化问题。采用综合旁瓣电平(Integrated sidlobe Level, ISL)作为目标函数,采用BFGS算法求解。仿真结果表明,该方法具有显著的抑制副瓣的性能和较高的距离分辨率。
{"title":"OFDM MIMO radar waveform design with high range resolution and low sidelobe level","authors":"Ting Bai, Hanying Hu, Xiyu Song","doi":"10.1109/icct.2017.8359797","DOIUrl":"https://doi.org/10.1109/icct.2017.8359797","url":null,"abstract":"In this paper, we presented a novel waveform design method for orthogonal frequency division multiplexing (OFDM) multiple input multiple output (MIMO) radar with low sidelobe level and high range resolution. The signal model that all OFDM subcarriers are transmitted on each antenna is established to ensure high range resolution. And code domain orthogonality is achieved through complex orthogonal design (COD). Moreover, we transform range sidelobe suppression into an unconstrained optimization problem based on the relationship between the transmitted waveform and the phase. The Integrated Sidelobe Level (ISL) is utilized as the objective function, and then solved by Broyden-Fletcher-Goldfarb-Shanno (BFGS) algorithm. Simulation results show that the proposed method has remarkable performance in suppressing sidelobe and high range resolution.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130939566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2017 IEEE 17th International Conference on Communication Technology (ICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1