Pub Date : 2006-12-18DOI: 10.1109/IIH-MSP.2006.118
J. Kolibal, Daniel Howard
We illustrate the use of a novel family of stochastic methods for function recovery and illustrate their applicability to several problems involving one and two dimensional data.
我们说明了使用一种新的随机方法的函数恢复,并说明了他们的一些问题,涉及一维和二维数据的适用性。
{"title":"Implications of a Novel Family of Stochastic Methods for Function Recovery","authors":"J. Kolibal, Daniel Howard","doi":"10.1109/IIH-MSP.2006.118","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.118","url":null,"abstract":"We illustrate the use of a novel family of stochastic methods for function recovery and illustrate their applicability to several problems involving one and two dimensional data.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115460081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chaotic signal is very important for chaotic communication and chaotic encryption. In his paper a method of producing chaotic signals with arbitrary magnitude and spectrum is presented, which is based on the Lorentz system by introducing some parameters of the system to realize the selected magnitude and spectrum. Furthermore, the validity of this method by theory and simulation is shown. In addition, this kind of generators is easily implemented, and the signal is suitable for protecting the information in communication systems.
{"title":"Chaotic Signal Design with Selected Parameters","authors":"Baishan Zhao, Yi-Sheng Zhu","doi":"10.1109/IIH-MSP.2006.71","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.71","url":null,"abstract":"Chaotic signal is very important for chaotic communication and chaotic encryption. In his paper a method of producing chaotic signals with arbitrary magnitude and spectrum is presented, which is based on the Lorentz system by introducing some parameters of the system to realize the selected magnitude and spectrum. Furthermore, the validity of this method by theory and simulation is shown. In addition, this kind of generators is easily implemented, and the signal is suitable for protecting the information in communication systems.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127445927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A kind of digital audio watermarking algorithm based on discrete wavelet transform (DWT) is proposed in the paper. In the paper, we adopt remote sensing image as watermarking image (such as satellite image). In order to enhance the remote sensing image into the audio, watermarking information is dealt with error diffusion method which is one kind of half-toning technique. Using chaos sequence for synchronization code and embedded it into audio with the water-marking, the watermarking thus has the ability of selfsynchronization. The algorithm quantizes the lowestfrequency coefficients of DWT of the audio signals, so that the watermarking can be detected in a blinding way. The experimental results indicate the algorithm is robust to Gauss-yawp, loss compression and more than 12 attacking means by stirmarkaudio attacking software.
{"title":"Digital Audio Watermarking Algorithm Based on Quantizing Coefficients","authors":"Zhao Xu, Ke Wang, Xiao-hua Qiao","doi":"10.1109/IIH-MSP.2006.86","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.86","url":null,"abstract":"A kind of digital audio watermarking algorithm based on discrete wavelet transform (DWT) is proposed in the paper. In the paper, we adopt remote sensing image as watermarking image (such as satellite image). In order to enhance the remote sensing image into the audio, watermarking information is dealt with error diffusion method which is one kind of half-toning technique. Using chaos sequence for synchronization code and embedded it into audio with the water-marking, the watermarking thus has the ability of selfsynchronization. The algorithm quantizes the lowestfrequency coefficients of DWT of the audio signals, so that the watermarking can be detected in a blinding way. The experimental results indicate the algorithm is robust to Gauss-yawp, loss compression and more than 12 attacking means by stirmarkaudio attacking software.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a PCA based method to reduce the dimensionality of DCT coefficients for visual only lip-reading systems. A three-stage pixel based visual front end is adopted. First, DCT or block-based DCT features are extracted. Second, Principal Component Analysis is applied for dimension reduction. Finally, all the feature vectors are normalized into a uniform scale. This work investigates this three-stage method, comparing with PCA and two DCT based approaches whose features are selected manually. In the latter manner, PCA coefficients are selected according to energy while the reduction of DCT coefficients leans to the left components in the left-top corner. Experiments prove that the dimension reduction task based on PCA does improve the recognition accuracy when the final dimension is below a certain value. They also show that DCT and block-based DCT work similarly for lip reading task, outperforming PCA slightly.
{"title":"A PCA Based Visual DCT Feature Extraction Method for Lip-Reading","authors":"Xiaopeng Hong, H. Yao, Yuqi Wan, Rong Chen","doi":"10.1109/IIH-MSP.2006.35","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.35","url":null,"abstract":"This paper proposes a PCA based method to reduce the dimensionality of DCT coefficients for visual only lip-reading systems. A three-stage pixel based visual front end is adopted. First, DCT or block-based DCT features are extracted. Second, Principal Component Analysis is applied for dimension reduction. Finally, all the feature vectors are normalized into a uniform scale. This work investigates this three-stage method, comparing with PCA and two DCT based approaches whose features are selected manually. In the latter manner, PCA coefficients are selected according to energy while the reduction of DCT coefficients leans to the left components in the left-top corner. Experiments prove that the dimension reduction task based on PCA does improve the recognition accuracy when the final dimension is below a certain value. They also show that DCT and block-based DCT work similarly for lip reading task, outperforming PCA slightly.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126051767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-18DOI: 10.1109/IIH-MSP.2006.116
Zheng Fang, Yao Zhao
At present, most image watermarking scheme can not resist geometrical attacks, which restricts the application of digital watermarking techniques. In this paper, an image watermarking scheme based on histogram is proposed, since the histogram is not sensitive to geometrical transformation. Different groups of the image histogram bars are chosen, and the message is embedded to sum of every group by using Quantization Index Modulation (QIM). In watermark embedding scheme, an exact modification from histogram to image is proposed, and it can guarantee the distortion of image as little as possible. In watermark detection process, the same groups of image histogram bars are selected, and the message is extracted from the sum of each group by using nearest distance rule. Experimental results show the scheme is robust to geometrical attacks as well as compression and filtering.
目前,大多数图像水印方案不能抵抗几何攻击,这限制了数字水印技术的应用。针对直方图对几何变换不敏感的特点,提出了一种基于直方图的图像水印方案。选择不同组的图像直方图条,利用量化指数调制(quantialization Index Modulation, QIM)将信息嵌入到每组的和中。在水印嵌入方案中,提出了从直方图到图像的精确修改,可以保证图像的失真尽可能小。在水印检测过程中,选取相同组的图像直方图条,利用最近距离规则从每组的和中提取信息。实验结果表明,该方案对几何攻击具有较强的鲁棒性,对压缩和滤波具有较强的鲁棒性。
{"title":"Image Watermarking Resisting to Geometrical Attacks Based on Histogram","authors":"Zheng Fang, Yao Zhao","doi":"10.1109/IIH-MSP.2006.116","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.116","url":null,"abstract":"At present, most image watermarking scheme can not resist geometrical attacks, which restricts the application of digital watermarking techniques. In this paper, an image watermarking scheme based on histogram is proposed, since the histogram is not sensitive to geometrical transformation. Different groups of the image histogram bars are chosen, and the message is embedded to sum of every group by using Quantization Index Modulation (QIM). In watermark embedding scheme, an exact modification from histogram to image is proposed, and it can guarantee the distortion of image as little as possible. In watermark detection process, the same groups of image histogram bars are selected, and the message is extracted from the sum of each group by using nearest distance rule. Experimental results show the scheme is robust to geometrical attacks as well as compression and filtering.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes the design and implementation of a synthesizable, flexible, alternative current-plasma display panel (AC-PDP) signal processor (APSP) as an intellectual property (IP) core for system-on-a-chip (SoC) application. The APSP adopts the Improved Address and Display Separation (ADS) method we proposed to overcome the dynamic false contour (DFC) problem. The Finite State Machine (FSM) Design of the APSP are discussed in this paper. The Post-Place & Route simulation waveform based on VHDL is also proposed in this paper.
{"title":"Design of AC-PDP Signal Processor for SoC Application","authors":"Song Qiu, Wai-yun Li, Jin-gao Liu, Wenjing Hu","doi":"10.1109/IIH-MSP.2006.81","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.81","url":null,"abstract":"This paper describes the design and implementation of a synthesizable, flexible, alternative current-plasma display panel (AC-PDP) signal processor (APSP) as an intellectual property (IP) core for system-on-a-chip (SoC) application. The APSP adopts the Improved Address and Display Separation (ADS) method we proposed to overcome the dynamic false contour (DFC) problem. The Finite State Machine (FSM) Design of the APSP are discussed in this paper. The Post-Place & Route simulation waveform based on VHDL is also proposed in this paper.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114979267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-18DOI: 10.1109/IIH-MSP.2006.123
Linna Zhou, Cui-Qing Liu, X. Ping, Tao Zhang, Yun-He Wang
A novel information hiding method in digital audio signal by using the encoding redundancy of perfect codes is presented in this paper. Researches on perfect codes and its syndrome of the codeword show that the syndrome of a codeword depends only on the error, not on the codeword transmitting. A mapping encoding between secret message and codeword error map is built. According to the error map, we can embed secret messages by modifying the codeword of perfect codes. In this paper we propose a particular example of perfect codes that carrying secret messages with its encoding redundancy. Theoretical analysis and experimental results show that this method has good security.
{"title":"Information Hiding Method in Digital Audio Signal Based on Perfect Codes","authors":"Linna Zhou, Cui-Qing Liu, X. Ping, Tao Zhang, Yun-He Wang","doi":"10.1109/IIH-MSP.2006.123","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.123","url":null,"abstract":"A novel information hiding method in digital audio signal by using the encoding redundancy of perfect codes is presented in this paper. Researches on perfect codes and its syndrome of the codeword show that the syndrome of a codeword depends only on the error, not on the codeword transmitting. A mapping encoding between secret message and codeword error map is built. According to the error map, we can embed secret messages by modifying the codeword of perfect codes. In this paper we propose a particular example of perfect codes that carrying secret messages with its encoding redundancy. Theoretical analysis and experimental results show that this method has good security.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-18DOI: 10.1109/IIH-MSP.2006.105
R. Ji, H. Yao, Shaohui Liu, Liang Wang
The least-significant-bit (LSB) substitution which is commonly used in steganography would degrade the quality of host image significantly when embedding high-capacity information. To overcome this drawback, we present an optimal block mapping LSB method based on genetic algorithm, which is out of researchers¿ concern but fundamentally important. Additionally we discuss the rule to select the best block size. The main idea is to minimize the degradation of the stego image by finding a best mapping function between host and secret image blocks at global scope. The experimental result is promising. The advantage of our method over most commonly used LSB strategy is obvious in enhancing PSNR value while having a secluded statistic peculiarity.
{"title":"Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution","authors":"R. Ji, H. Yao, Shaohui Liu, Liang Wang","doi":"10.1109/IIH-MSP.2006.105","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.105","url":null,"abstract":"The least-significant-bit (LSB) substitution which is commonly used in steganography would degrade the quality of host image significantly when embedding high-capacity information. To overcome this drawback, we present an optimal block mapping LSB method based on genetic algorithm, which is out of researchers¿ concern but fundamentally important. Additionally we discuss the rule to select the best block size. The main idea is to minimize the degradation of the stego image by finding a best mapping function between host and secret image blocks at global scope. The experimental result is promising. The advantage of our method over most commonly used LSB strategy is obvious in enhancing PSNR value while having a secluded statistic peculiarity.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130991635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The direction chain code has been widely used in image retrieval for its simplicity and low storage requirement. One problem with the chain code is that it lacks of the spatial information of the image content, which limits its use in image retrieval. In this paper, two novel methods, called Chain Code Coherence Vector (CCCV) and Chain Code Distribution Vector (CCDV) are presented, which not only have the advantages of being invariant to the position, rotation and scaling but also contain the spatial information of the image content. In the end, two different distance measures are presented to measure the similarity of shape information embedded in the CCCV and CCDV. Experiment demonstrates the efficiency of our proposed algorithms.
{"title":"Chain Code Distribution-Based Image Retrieval","authors":"Junding Sun, Xiaosheng Wu","doi":"10.1109/IIH-MSP.2006.69","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.69","url":null,"abstract":"The direction chain code has been widely used in image retrieval for its simplicity and low storage requirement. One problem with the chain code is that it lacks of the spatial information of the image content, which limits its use in image retrieval. In this paper, two novel methods, called Chain Code Coherence Vector (CCCV) and Chain Code Distribution Vector (CCDV) are presented, which not only have the advantages of being invariant to the position, rotation and scaling but also contain the spatial information of the image content. In the end, two different distance measures are presented to measure the similarity of shape information embedded in the CCCV and CCDV. Experiment demonstrates the efficiency of our proposed algorithms.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133660818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since name card recognition based on built-in cameras has become popular people now pay more attention to the robustness and effectiveness of the system. In spite of the maturity of OCR some bottlenecks in lower processing level such as spatial correction and segmentation weak its power. Traditional models treating the card image as an orthogonal projection with only affine distortion are too simple and thus perspective correction is needed to enhance the recognition rate.Due to the complexity of the layout of Chinese name cards text segmentation also attaches strong significance to the performance. In this paper a improved name card recognition system would be devised and implemented. Two new algorithms for perspective correction and text segmentation would be proposed respectively.
{"title":"An Improved Design and Implementation of Chinese Name Card Recognition System on Mobile Devices","authors":"Chi Cui","doi":"10.1109/IIH-MSP.2006.51","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.51","url":null,"abstract":"Since name card recognition based on built-in cameras has become popular people now pay more attention to the robustness and effectiveness of the system. In spite of the maturity of OCR some bottlenecks in lower processing level such as spatial correction and segmentation weak its power. Traditional models treating the card image as an orthogonal projection with only affine distortion are too simple and thus perspective correction is needed to enhance the recognition rate.Due to the complexity of the layout of Chinese name cards text segmentation also attaches strong significance to the performance. In this paper a improved name card recognition system would be devised and implemented. Two new algorithms for perspective correction and text segmentation would be proposed respectively.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"42 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113974458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}