Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716166
Chinchen Chang
In most data-hiding schemes, the area of interest in the cover image should be protected from being modified. In this paper, we propose a data-hiding scheme in which the changeable and unchangeable pixels can be specified by the data-hider. To reduce the size of extra information, the location map used to depict the location information of changeable and unchangeable pixels is compressed by Huffman coding. Therefore, only a little additional information, a private key, is needed to depict the changeable pixels in which the Huffman code is embedded. The experimental results show that our proposed scheme can efficiently embed and successfully extract the secret information.
{"title":"Keynote Address V A restricted region-based data-hiding scheme","authors":"Chinchen Chang","doi":"10.1109/ICCT.2008.4716166","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716166","url":null,"abstract":"In most data-hiding schemes, the area of interest in the cover image should be protected from being modified. In this paper, we propose a data-hiding scheme in which the changeable and unchangeable pixels can be specified by the data-hider. To reduce the size of extra information, the location map used to depict the location information of changeable and unchangeable pixels is compressed by Huffman coding. Therefore, only a little additional information, a private key, is needed to depict the changeable pixels in which the Huffman code is embedded. The experimental results show that our proposed scheme can efficiently embed and successfully extract the secret information.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122044663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716123
Pouria Zand, Mohsen Shiva
In this paper the model for coloring the edge (channel assignment) and eliminating the secondary interference is introduced. This algorithm is run in the network manager with our routing and scheduling algorithm. One of the constraints in coloring the edge is when we have broadcasting transmission together with the unicast transmission in one time-slot; for this situation several solutions such as changing the coloring algorithm or having a multicast transmission in time, or considering only the unicast transmission which increases the length of frame are proposed. We also have a brief introduction of ISA-SP100 and wireless HART standards.
{"title":"The centralized channel assignment algorithm for multi-channel single -transceiver WMNs with IEEE 802. 15. 4 MAC layer","authors":"Pouria Zand, Mohsen Shiva","doi":"10.1109/ICCT.2008.4716123","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716123","url":null,"abstract":"In this paper the model for coloring the edge (channel assignment) and eliminating the secondary interference is introduced. This algorithm is run in the network manager with our routing and scheduling algorithm. One of the constraints in coloring the edge is when we have broadcasting transmission together with the unicast transmission in one time-slot; for this situation several solutions such as changing the coloring algorithm or having a multicast transmission in time, or considering only the unicast transmission which increases the length of frame are proposed. We also have a brief introduction of ISA-SP100 and wireless HART standards.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121035473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716155
Xianghua Xu, Wanyong Chen, Jian Wan, Ritai Yu
In wireless sensor networks (WSN), faults occurring to sensor nodes are common due to the sensor device itself and the harsh deployment environment. In order to avoid degradation of service due to faults, it is necessary for the WSN to be able to detect faults early. In this paper we propose a localized fault diagnosis algorithm which executes in tree-like networks effectively. It is based on local comparisons of sensed data and dissemination of the test results to the remaining sensors. Furthermore, Times redundancy is used to diagnose the intermittent fault in sensing and communication. Simulation results show the proposed algorithm has high detection accuracy and low false alarm rate.
{"title":"Distributed fault diagnosis of wireless sensor networks","authors":"Xianghua Xu, Wanyong Chen, Jian Wan, Ritai Yu","doi":"10.1109/ICCT.2008.4716155","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716155","url":null,"abstract":"In wireless sensor networks (WSN), faults occurring to sensor nodes are common due to the sensor device itself and the harsh deployment environment. In order to avoid degradation of service due to faults, it is necessary for the WSN to be able to detect faults early. In this paper we propose a localized fault diagnosis algorithm which executes in tree-like networks effectively. It is based on local comparisons of sensed data and dissemination of the test results to the remaining sensors. Furthermore, Times redundancy is used to diagnose the intermittent fault in sensing and communication. Simulation results show the proposed algorithm has high detection accuracy and low false alarm rate.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115633032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716172
R. Qiang, Jiang Tingbiao
Using embedded processor chip ARM9-S3C2410 and DSP-MCX314As motion control chip as the core to build the hardware platform of embedded networked numerical control (NC) system is proposed in this paper. The software structure of embedded networked NC system is founded, including system software and user software. The embedded Linux operating system can deal with multitask well and satisfy the real-time and reliability of motion control. At last, the principle of achieving networked NC system based on embedded Web boa server is introduced. Developing networked NC system with embedded technology is the direction of future development. It has the advantages of full use of resources, the compact system and provides a wealth of features and superior performance with a lower cost.
{"title":"Research on embedded networked numerical control system based on ARM and DSP","authors":"R. Qiang, Jiang Tingbiao","doi":"10.1109/ICCT.2008.4716172","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716172","url":null,"abstract":"Using embedded processor chip ARM9-S3C2410 and DSP-MCX314As motion control chip as the core to build the hardware platform of embedded networked numerical control (NC) system is proposed in this paper. The software structure of embedded networked NC system is founded, including system software and user software. The embedded Linux operating system can deal with multitask well and satisfy the real-time and reliability of motion control. At last, the principle of achieving networked NC system based on embedded Web boa server is introduced. Developing networked NC system with embedded technology is the direction of future development. It has the advantages of full use of resources, the compact system and provides a wealth of features and superior performance with a lower cost.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716128
Muqing Wu, Qinjuan Zhang
In the current routing mechanism for Mobile Ad hoc Networks, service differentiation is not realized completely, resulting in resources wastage for best-effort (BE) traffic and deficiency for real-time traffic, such as voice and video. A novel service differentiated multi-path routing mechanism is proposed, in which service differentiation is realized in network layer based on multi-path routing. Multiple paths found in the route discovery procedure are evaluated, sorted and chosen according to the packet service type. Simulations show that the resource requirement of real-time traffic is better satisfied and the overall performance is improved effectively, that is, the end-to-end delay is decreased and the packet delivery ratio is increased evidently.
{"title":"Service differentiated multi-path routing mechanism for MANET","authors":"Muqing Wu, Qinjuan Zhang","doi":"10.1109/ICCT.2008.4716128","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716128","url":null,"abstract":"In the current routing mechanism for Mobile Ad hoc Networks, service differentiation is not realized completely, resulting in resources wastage for best-effort (BE) traffic and deficiency for real-time traffic, such as voice and video. A novel service differentiated multi-path routing mechanism is proposed, in which service differentiation is realized in network layer based on multi-path routing. Multiple paths found in the route discovery procedure are evaluated, sorted and chosen according to the packet service type. Simulations show that the resource requirement of real-time traffic is better satisfied and the overall performance is improved effectively, that is, the end-to-end delay is decreased and the packet delivery ratio is increased evidently.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128818401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716210
Tianding Chen
It utilizes back-propagation neural network (BPNN) as the recognition system tool. The identification is done by the back propagation neural network (BPNN). Moreover, we improve BPNN some limitation, such as slow learning speed in the training process, leading to partial minimum values that are difficult to converge, and the need to retrain an enormous volume of data whenever new training samples are added or deleted. The technologies and related models used for recognizing the license plates are clearly described and given to demonstrate the effectiveness of the proposed model. Experimental results show that our system can effectively recognize most license plates character, including 10 numbers and 26 alphabet characters. The recognition rate is 90%.
{"title":"Notice of RetractionA scheme of improved training in license plate character recognition","authors":"Tianding Chen","doi":"10.1109/ICCT.2008.4716210","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716210","url":null,"abstract":"It utilizes back-propagation neural network (BPNN) as the recognition system tool. The identification is done by the back propagation neural network (BPNN). Moreover, we improve BPNN some limitation, such as slow learning speed in the training process, leading to partial minimum values that are difficult to converge, and the need to retrain an enormous volume of data whenever new training samples are added or deleted. The technologies and related models used for recognizing the license plates are clearly described and given to demonstrate the effectiveness of the proposed model. Experimental results show that our system can effectively recognize most license plates character, including 10 numbers and 26 alphabet characters. The recognition rate is 90%.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127334584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716180
Yu Lu, Zhaoyang Zhang, Zhi Liu, Xuli Shi
This paper proposed a novel approach to segment objects from the H.264 compressed video with moving background. At first, the noisy motion vectors are eliminated from the motion field by vector median filtering. Then the predicted motion field reconstructed by backward estimation is used to accumulate the motion field, which is followed by global motion compensation. After that, the hypothesis testing is used for initial region classification. Finally, the graph cuts technique is applied to partition objects by minimizing the energy function formulated by the model of Markov Random Field. The experimental results demonstrate efficient performance and good segmentation quality of the proposed method.
{"title":"Object segmentation using Graph Cuts for the H.264 compressed video with moving background","authors":"Yu Lu, Zhaoyang Zhang, Zhi Liu, Xuli Shi","doi":"10.1109/ICCT.2008.4716180","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716180","url":null,"abstract":"This paper proposed a novel approach to segment objects from the H.264 compressed video with moving background. At first, the noisy motion vectors are eliminated from the motion field by vector median filtering. Then the predicted motion field reconstructed by backward estimation is used to accumulate the motion field, which is followed by global motion compensation. After that, the hypothesis testing is used for initial region classification. Finally, the graph cuts technique is applied to partition objects by minimizing the energy function formulated by the model of Markov Random Field. The experimental results demonstrate efficient performance and good segmentation quality of the proposed method.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122295378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716285
Wen-Ku Su, Pei-Yu Shih, Tsung-Ching Lin, T. Truong
In this paper, a new decoding algorithm of the extended binary Golay code is proposed. Based on the proposition developed in this paper, all probable patterns of occurred weight-4 error, which are always decoded to the same weight-3 error pattern, are determined from an iterative invert-one-bit scheme instead of the look-up table of weight-7 codewords. And the most possible one will be obtained by estimating the emblematic probability values of all probable patterns. The simulation result of this decoder in AWGN shows that more than 99% of four errors are corrected if Eb/N0 is greater than 5 dB.
{"title":"Decoding the extended binary Golay code by an iterative invert-one-bit scheme","authors":"Wen-Ku Su, Pei-Yu Shih, Tsung-Ching Lin, T. Truong","doi":"10.1109/ICCT.2008.4716285","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716285","url":null,"abstract":"In this paper, a new decoding algorithm of the extended binary Golay code is proposed. Based on the proposition developed in this paper, all probable patterns of occurred weight-4 error, which are always decoded to the same weight-3 error pattern, are determined from an iterative invert-one-bit scheme instead of the look-up table of weight-7 codewords. And the most possible one will be obtained by estimating the emblematic probability values of all probable patterns. The simulation result of this decoder in AWGN shows that more than 99% of four errors are corrected if Eb/N0 is greater than 5 dB.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121718423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716165
Zhang Ping
Summary form only given. This paper introduces the developments of TDD based Giga bits per second (Gbps) wireless communication system in wireless technology innovation (WTI) institute of BUPT. Radio link transmission design are presented in this paper, including promising key techniques of physical layer such as Channel measurement and modeling, multiple input multiple output (MIMO), low density parity check (LDPC) code, channel estimation and PAPR suppression etc., and MAC layer design such as access network architecture and scheduling. Link-level simulations prove the advantages of the design.
{"title":"Keynote Address IV Gbps wireless communication system","authors":"Zhang Ping","doi":"10.1109/ICCT.2008.4716165","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716165","url":null,"abstract":"Summary form only given. This paper introduces the developments of TDD based Giga bits per second (Gbps) wireless communication system in wireless technology innovation (WTI) institute of BUPT. Radio link transmission design are presented in this paper, including promising key techniques of physical layer such as Channel measurement and modeling, multiple input multiple output (MIMO), low density parity check (LDPC) code, channel estimation and PAPR suppression etc., and MAC layer design such as access network architecture and scheduling. Link-level simulations prove the advantages of the design.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"2006 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127640248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716196
Wei Wei-min, Wang Shuozhong, Tan ZhenJun
Re-sampled signals show periodicity in its nth derivative and covariance, and it can be used to estimate the scaling ratio. Calculate the second-order difference along the vertical (horizontal) direction of image. Compute the mean of absolute difference along the horizontal (vertical) direction and obtain a vector, which will be appended with zero to make its length equal to an integer power of 2. Calculate DFT to the vector and produce the frequency-magnitude curve. Detect the peak frequency in the curve and obtain the scaling ratio along the horizontal (vertical) direction. It is applicable to different interpolation schemes, no matter whether the image has been JPEG compressed before or after interpolation. Experimental results show that the proposed method can judge whether or not a photo captured by the digital camera is undergone the digital zoom, and approximately estimate the scaling ratio.
{"title":"Notice of RetractionEstimation of rescaling factor and detection of image splicing","authors":"Wei Wei-min, Wang Shuozhong, Tan ZhenJun","doi":"10.1109/ICCT.2008.4716196","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716196","url":null,"abstract":"Re-sampled signals show periodicity in its nth derivative and covariance, and it can be used to estimate the scaling ratio. Calculate the second-order difference along the vertical (horizontal) direction of image. Compute the mean of absolute difference along the horizontal (vertical) direction and obtain a vector, which will be appended with zero to make its length equal to an integer power of 2. Calculate DFT to the vector and produce the frequency-magnitude curve. Detect the peak frequency in the curve and obtain the scaling ratio along the horizontal (vertical) direction. It is applicable to different interpolation schemes, no matter whether the image has been JPEG compressed before or after interpolation. Experimental results show that the proposed method can judge whether or not a photo captured by the digital camera is undergone the digital zoom, and approximately estimate the scaling ratio.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128913332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}