In this paper, we develop a whole frame loss recovery method for H.264 by using block-based motion vector extrapolation in the decoder. Firstly,we propose a variable-size block motion vetor extrapolation algorithm to construct the motion vectors for the lost frame from available neighboring frame. Then, a more complete motion vector field is obtained by performing median filtering. At last, the blocks without motion vectors are concealed by using linear interpolation algorithm. Experimental results show that this method can alleviate the shortcomings of the fixed-size method effectively and provide better performance than other concealment methods.
{"title":"Whole Frame Loss Recovery Algorithm for H.264 Decoders","authors":"Min Li, Bo Wang","doi":"10.1109/IAS.2009.170","DOIUrl":"https://doi.org/10.1109/IAS.2009.170","url":null,"abstract":"In this paper, we develop a whole frame loss recovery method for H.264 by using block-based motion vector extrapolation in the decoder. Firstly,we propose a variable-size block motion vetor extrapolation algorithm to construct the motion vectors for the lost frame from available neighboring frame. Then, a more complete motion vector field is obtained by performing median filtering. At last, the blocks without motion vectors are concealed by using linear interpolation algorithm. Experimental results show that this method can alleviate the shortcomings of the fixed-size method effectively and provide better performance than other concealment methods.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new method is proposed to overcome illumination intensity difference influences the recognition result which occurs during collecting session in this paper. The problem is not effective solved in original algorithm. This algorithm proposes to match after moving two matching feature surfaces to one equivalence gray plane. It also uses the theory of gray surface matching based on feature analysis but another distance is considered for reducing calculation quantity. Firstly, it calculates the gray difference of two pixels which comes from doing subtraction between two different surfaces and gets the gray difference surface. Secondly, it computes the square of the gray difference surface and considers this square as the distance between the two surfaces. At last, it compares the result with a given threshold to implement iris recognition. Simulation and experimental results are shown to illustrate this method performance for both correct recognition rate and the whole recognition time.
{"title":"An Improved Iris Recognition Method Based on Gray Surface Matching","authors":"Dong-Mei Wu, Jiang-Nan Wang","doi":"10.1109/IAS.2009.57","DOIUrl":"https://doi.org/10.1109/IAS.2009.57","url":null,"abstract":"A new method is proposed to overcome illumination intensity difference influences the recognition result which occurs during collecting session in this paper. The problem is not effective solved in original algorithm. This algorithm proposes to match after moving two matching feature surfaces to one equivalence gray plane. It also uses the theory of gray surface matching based on feature analysis but another distance is considered for reducing calculation quantity. Firstly, it calculates the gray difference of two pixels which comes from doing subtraction between two different surfaces and gets the gray difference surface. Secondly, it computes the square of the gray difference surface and considers this square as the distance between the two surfaces. At last, it compares the result with a given threshold to implement iris recognition. Simulation and experimental results are shown to illustrate this method performance for both correct recognition rate and the whole recognition time.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128846782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to improve the average recall rate and the average precision rate of image retrieval, an improved fusion algorithm of the weighted features is presented. Firstly,the shape features of images are extracted by using the moment invariant method based on 7 central moments. Meanwhile,the texture features of images are calculated by using the Gray-level Co-occurrence matrix. Then the elements of the vectors are normalized respectively. In the next step, the Euclidian distance,the squared Euclidian distance and the City-Block distance are calculated. The Mean values of the 3 kinds of distances are obtained and used as the shape distance and the texture distance. Finally,the weighted feature vectors are fused and the similarities between images are obtained and used as the measure bases to implement the image retrieval. The experiments show that the tangible results of image retrieval are realized and the average recall rate and the average precision rate are improved.
{"title":"An Improved Fusion Algorithm of the Weighted Features and its Application in Image Retrieval","authors":"Mei Wang, Li Wang","doi":"10.1109/IAS.2009.95","DOIUrl":"https://doi.org/10.1109/IAS.2009.95","url":null,"abstract":"In order to improve the average recall rate and the average precision rate of image retrieval, an improved fusion algorithm of the weighted features is presented. Firstly,the shape features of images are extracted by using the moment invariant method based on 7 central moments. Meanwhile,the texture features of images are calculated by using the Gray-level Co-occurrence matrix. Then the elements of the vectors are normalized respectively. In the next step, the Euclidian distance,the squared Euclidian distance and the City-Block distance are calculated. The Mean values of the 3 kinds of distances are obtained and used as the shape distance and the texture distance. Finally,the weighted feature vectors are fused and the similarities between images are obtained and used as the measure bases to implement the image retrieval. The experiments show that the tangible results of image retrieval are realized and the average recall rate and the average precision rate are improved.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131867209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in web services. On the basis of studying service-oriented architecture and web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.
{"title":"A Method for Accessing Trusted Services Based on Service-Oriented Architecture","authors":"Xin Yu, Yu Bai","doi":"10.1109/IAS.2009.173","DOIUrl":"https://doi.org/10.1109/IAS.2009.173","url":null,"abstract":"Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in web services. On the basis of studying service-oriented architecture and web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to solve the data integrity, non-repudiation, confidentiality and operation inefficiency of the mobile e-commerce, in this paper, mobile e-commerce Security Model is established. The design is based on mobile e-commerce architecture, analyzing the digital signature authentication process and data security transmission procedure in the system. Delamination modularized software design method is applied, and simulation results is carried out in the system based on OPNET and C++. The system adds the WIM smart card in the mobile terminal, and uses elliptic curve cryptography (ECC) encryption arithmetic, it complete the data encryption integrity authentication personal identification fast. By analysis of the procedure of the system and simulation results, the system has the advantage of fast operation, high security and high channel availability, which can satisfies the basic needs of mobile e-commerce.
{"title":"Application and Research of Mobile E-commerce Security Based on WPKI","authors":"Feng Tian, Xiao-bing Han, Ying Wei","doi":"10.1109/IAS.2009.243","DOIUrl":"https://doi.org/10.1109/IAS.2009.243","url":null,"abstract":"In order to solve the data integrity, non-repudiation, confidentiality and operation inefficiency of the mobile e-commerce, in this paper, mobile e-commerce Security Model is established. The design is based on mobile e-commerce architecture, analyzing the digital signature authentication process and data security transmission procedure in the system. Delamination modularized software design method is applied, and simulation results is carried out in the system based on OPNET and C++. The system adds the WIM smart card in the mobile terminal, and uses elliptic curve cryptography (ECC) encryption arithmetic, it complete the data encryption integrity authentication personal identification fast. By analysis of the procedure of the system and simulation results, the system has the advantage of fast operation, high security and high channel availability, which can satisfies the basic needs of mobile e-commerce.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115565855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this article, we present a modified robust image watermarking scheme based on the scale-invariant feature transform (SIFT). The watermark is embedded into some local regions extracted from the original image. During embedding, the initial region is divided into some cirque sub-regions with the same area, and each watermark bit is embedded into one sub-region. Besides, it is embedded in the Non-subsampled Contourlet Transform (NSCT) domain to enhance watermark robustness. Experimental results have demonstrated the efficiency of the proposed scheme.
{"title":"A Modified Feature Based Image Watermarking Scheme in NSCT Domain","authors":"Liu Yang, B. Guo, Jianmin Lv","doi":"10.1109/IAS.2009.339","DOIUrl":"https://doi.org/10.1109/IAS.2009.339","url":null,"abstract":"In this article, we present a modified robust image watermarking scheme based on the scale-invariant feature transform (SIFT). The watermark is embedded into some local regions extracted from the original image. During embedding, the initial region is divided into some cirque sub-regions with the same area, and each watermark bit is embedded into one sub-region. Besides, it is embedded in the Non-subsampled Contourlet Transform (NSCT) domain to enhance watermark robustness. Experimental results have demonstrated the efficiency of the proposed scheme.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122133302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Text copying is easy to do but not easy to be detected. Copy detection is a delicate ground. It determines whether a document is copied from others or not. It helps to verify and to detect paper redistribution, thesis plagiarism or copyright violation. A novel method of Chinese text copy detection design and implementation is discussed in this paper, based on theory of Mathematical Expression of Chinese Characters. It can implement the functions include Characteristic reconstruction, registration and detection. Experimental results show that the system has the advantages on detecting accuracy and high speed.
{"title":"Research on System of Chinese Document Copy Detection","authors":"Yuzhu Cheng, Chunrong Qiu, Weiqi Tang, W. Deng","doi":"10.1109/IAS.2009.210","DOIUrl":"https://doi.org/10.1109/IAS.2009.210","url":null,"abstract":"Text copying is easy to do but not easy to be detected. Copy detection is a delicate ground. It determines whether a document is copied from others or not. It helps to verify and to detect paper redistribution, thesis plagiarism or copyright violation. A novel method of Chinese text copy detection design and implementation is discussed in this paper, based on theory of Mathematical Expression of Chinese Characters. It can implement the functions include Characteristic reconstruction, registration and detection. Experimental results show that the system has the advantages on detecting accuracy and high speed.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124037433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a new adaptive image denoising scheme by combining the nonsubsampled Contourlet transform (NSCT) and total variation model. The original image is first decomposed using NSCT .Then the mean squared error (MSE) is estimated based on Stein’s unbiased risk estimation(SURE). The noise of each decomposed subband is reduced using the linear adaptive threshold function, which can be constructed based on the MSE, producing the preliminary primary denoised image after reconstruction. Then the preliminary primary denoised image is further filtered using the total variation model, producing the final denoised image. Experiments show that the proposed scheme can remove the pseudo-Gibbs artifacts and image noise effectively. Besides, it outperforms the existing schemes in regard of both the peak-signal-to-noise-ratio (PSNR) and the edge preservation ability.
{"title":"A New Adaptive Image Denoising Method Combining the Nonsubsampled Contourlet Transform and Total Variation","authors":"Xiaoyue Wu, B. Guo, Shengli Qu, Zhuo Wang","doi":"10.1109/IAS.2009.18","DOIUrl":"https://doi.org/10.1109/IAS.2009.18","url":null,"abstract":"This paper presents a new adaptive image denoising scheme by combining the nonsubsampled Contourlet transform (NSCT) and total variation model. The original image is first decomposed using NSCT .Then the mean squared error (MSE) is estimated based on Stein’s unbiased risk estimation(SURE). The noise of each decomposed subband is reduced using the linear adaptive threshold function, which can be constructed based on the MSE, producing the preliminary primary denoised image after reconstruction. Then the preliminary primary denoised image is further filtered using the total variation model, producing the final denoised image. Experiments show that the proposed scheme can remove the pseudo-Gibbs artifacts and image noise effectively. Besides, it outperforms the existing schemes in regard of both the peak-signal-to-noise-ratio (PSNR) and the edge preservation ability.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125980427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new watermark method for detecting image tampering is proposed in this paper. First, an authentication number is created by using a pair of watermark pixels as the coefficients of a linear function. The central pixel of a host block as the input data to the linear function. The authentication information of that block is then embedded into the host image using the LSB matching revisited embedding procedure. In the detection stage, ISB matching revisited will be applied to extract the authentication information and to verify whether the image blocks have been tampered with. The authentication information establishes the block feature correlation. This kind of correlation helps resist VQ attack.
{"title":"A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation","authors":"Chin-Feng Lee, Kuo-Nan Chen, Chinchen Chang, Meng-Cheng Tsai","doi":"10.1109/IAS.2009.147","DOIUrl":"https://doi.org/10.1109/IAS.2009.147","url":null,"abstract":"A new watermark method for detecting image tampering is proposed in this paper. First, an authentication number is created by using a pair of watermark pixels as the coefficients of a linear function. The central pixel of a host block as the input data to the linear function. The authentication information of that block is then embedded into the host image using the LSB matching revisited embedding procedure. In the detection stage, ISB matching revisited will be applied to extract the authentication information and to verify whether the image blocks have been tampered with. The authentication information establishes the block feature correlation. This kind of correlation helps resist VQ attack.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127079196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ultrasonic Ranging System is different precision when it has been used in an occasion. Generally its errors are larger and often can not meet the application requirements. In this paper, new ultrasonic ranging system which can be used to non-contact measure distance in special occasion was designed by single-chip, ultrasonic ranging technology and sensor technology. Distance measurement data and temperature were displayed through LCD screen and the transmitting and receiving of ultrasonic were controlled by single-chip microcomputer according to the time difference location method to measure the distance. in order to improve measurement accuracy, temperature sensor has used to measure temperature and compensate temperature, the system also uses a voice broadcast system, which makes it higher accuracy, more convenient and extensive applications.
{"title":"Study on Ultrasonic Ranging System Design","authors":"Lihua Deng","doi":"10.1109/IAS.2009.352","DOIUrl":"https://doi.org/10.1109/IAS.2009.352","url":null,"abstract":"Ultrasonic Ranging System is different precision when it has been used in an occasion. Generally its errors are larger and often can not meet the application requirements. In this paper, new ultrasonic ranging system which can be used to non-contact measure distance in special occasion was designed by single-chip, ultrasonic ranging technology and sensor technology. Distance measurement data and temperature were displayed through LCD screen and the transmitting and receiving of ultrasonic were controlled by single-chip microcomputer according to the time difference location method to measure the distance. in order to improve measurement accuracy, temperature sensor has used to measure temperature and compensate temperature, the system also uses a voice broadcast system, which makes it higher accuracy, more convenient and extensive applications.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127399266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}