首页 > 最新文献

2006 International Conference on Intelligent Information Hiding and Multimedia最新文献

英文 中文
Implications of a Novel Family of Stochastic Methods for Function Recovery 一组新的功能恢复随机方法的意义
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.118
J. Kolibal, Daniel Howard
We illustrate the use of a novel family of stochastic methods for function recovery and illustrate their applicability to several problems involving one and two dimensional data.
我们说明了使用一种新的随机方法的函数恢复,并说明了他们的一些问题,涉及一维和二维数据的适用性。
{"title":"Implications of a Novel Family of Stochastic Methods for Function Recovery","authors":"J. Kolibal, Daniel Howard","doi":"10.1109/IIH-MSP.2006.118","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.118","url":null,"abstract":"We illustrate the use of a novel family of stochastic methods for function recovery and illustrate their applicability to several problems involving one and two dimensional data.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115460081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Chaotic Signal Design with Selected Parameters 选择参数的混沌信号设计
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.71
Baishan Zhao, Yi-Sheng Zhu
Chaotic signal is very important for chaotic communication and chaotic encryption. In his paper a method of producing chaotic signals with arbitrary magnitude and spectrum is presented, which is based on the Lorentz system by introducing some parameters of the system to realize the selected magnitude and spectrum. Furthermore, the validity of this method by theory and simulation is shown. In addition, this kind of generators is easily implemented, and the signal is suitable for protecting the information in communication systems.
混沌信号是混沌通信和混沌加密的重要组成部分。本文提出了一种基于洛伦兹系统的产生任意幅值和谱的混沌信号的方法,通过引入系统的一些参数来实现对幅值和谱的选择。并通过理论和仿真验证了该方法的有效性。此外,这种发生器易于实现,其信号适用于通信系统中的信息保护。
{"title":"Chaotic Signal Design with Selected Parameters","authors":"Baishan Zhao, Yi-Sheng Zhu","doi":"10.1109/IIH-MSP.2006.71","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.71","url":null,"abstract":"Chaotic signal is very important for chaotic communication and chaotic encryption. In his paper a method of producing chaotic signals with arbitrary magnitude and spectrum is presented, which is based on the Lorentz system by introducing some parameters of the system to realize the selected magnitude and spectrum. Furthermore, the validity of this method by theory and simulation is shown. In addition, this kind of generators is easily implemented, and the signal is suitable for protecting the information in communication systems.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127445927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Digital Audio Watermarking Algorithm Based on Quantizing Coefficients 基于量化系数的数字音频水印算法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.86
Zhao Xu, Ke Wang, Xiao-hua Qiao
A kind of digital audio watermarking algorithm based on discrete wavelet transform (DWT) is proposed in the paper. In the paper, we adopt remote sensing image as watermarking image (such as satellite image). In order to enhance the remote sensing image into the audio, watermarking information is dealt with error diffusion method which is one kind of half-toning technique. Using chaos sequence for synchronization code and embedded it into audio with the water-marking, the watermarking thus has the ability of selfsynchronization. The algorithm quantizes the lowestfrequency coefficients of DWT of the audio signals, so that the watermarking can be detected in a blinding way. The experimental results indicate the algorithm is robust to Gauss-yawp, loss compression and more than 12 attacking means by stirmarkaudio attacking software.
提出了一种基于离散小波变换(DWT)的数字音频水印算法。本文采用遥感图像作为水印图像(如卫星图像)。为了将遥感图像增强为音频,采用误差扩散方法对水印信息进行处理,这是一种半调色技术。利用混沌序列作为同步码,并将其与水印嵌入音频中,使水印具有自同步能力。该算法对音频信号的DWT的最低频率系数进行量化,从而实现对水印的盲检测。实验结果表明,该算法对高斯噪声、损失压缩以及stirmarkaudio攻击软件的12种以上攻击手段具有较强的鲁棒性。
{"title":"Digital Audio Watermarking Algorithm Based on Quantizing Coefficients","authors":"Zhao Xu, Ke Wang, Xiao-hua Qiao","doi":"10.1109/IIH-MSP.2006.86","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.86","url":null,"abstract":"A kind of digital audio watermarking algorithm based on discrete wavelet transform (DWT) is proposed in the paper. In the paper, we adopt remote sensing image as watermarking image (such as satellite image). In order to enhance the remote sensing image into the audio, watermarking information is dealt with error diffusion method which is one kind of half-toning technique. Using chaos sequence for synchronization code and embedded it into audio with the water-marking, the watermarking thus has the ability of selfsynchronization. The algorithm quantizes the lowestfrequency coefficients of DWT of the audio signals, so that the watermarking can be detected in a blinding way. The experimental results indicate the algorithm is robust to Gauss-yawp, loss compression and more than 12 attacking means by stirmarkaudio attacking software.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A PCA Based Visual DCT Feature Extraction Method for Lip-Reading 基于PCA的唇读视觉DCT特征提取方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.35
Xiaopeng Hong, H. Yao, Yuqi Wan, Rong Chen
This paper proposes a PCA based method to reduce the dimensionality of DCT coefficients for visual only lip-reading systems. A three-stage pixel based visual front end is adopted. First, DCT or block-based DCT features are extracted. Second, Principal Component Analysis is applied for dimension reduction. Finally, all the feature vectors are normalized into a uniform scale. This work investigates this three-stage method, comparing with PCA and two DCT based approaches whose features are selected manually. In the latter manner, PCA coefficients are selected according to energy while the reduction of DCT coefficients leans to the left components in the left-top corner. Experiments prove that the dimension reduction task based on PCA does improve the recognition accuracy when the final dimension is below a certain value. They also show that DCT and block-based DCT work similarly for lip reading task, outperforming PCA slightly.
本文提出了一种基于PCA的方法来降低视觉唇读系统的DCT系数维数。采用基于像素的三级视觉前端。首先,提取DCT或基于块的DCT特征。其次,采用主成分分析法进行降维。最后,将所有特征向量归一化为统一尺度。这项工作研究了这种三阶段的方法,比较了PCA和两种基于DCT的方法,这些方法的特征是手动选择的。后一种方法是根据能量选择PCA系数,而DCT系数的约简倾向于左上角的左侧分量。实验证明,当最终维数低于一定值时,基于PCA的降维任务确实提高了识别精度。他们还表明,DCT和基于块的DCT在唇读任务中的效果相似,略优于PCA。
{"title":"A PCA Based Visual DCT Feature Extraction Method for Lip-Reading","authors":"Xiaopeng Hong, H. Yao, Yuqi Wan, Rong Chen","doi":"10.1109/IIH-MSP.2006.35","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.35","url":null,"abstract":"This paper proposes a PCA based method to reduce the dimensionality of DCT coefficients for visual only lip-reading systems. A three-stage pixel based visual front end is adopted. First, DCT or block-based DCT features are extracted. Second, Principal Component Analysis is applied for dimension reduction. Finally, all the feature vectors are normalized into a uniform scale. This work investigates this three-stage method, comparing with PCA and two DCT based approaches whose features are selected manually. In the latter manner, PCA coefficients are selected according to energy while the reduction of DCT coefficients leans to the left components in the left-top corner. Experiments prove that the dimension reduction task based on PCA does improve the recognition accuracy when the final dimension is below a certain value. They also show that DCT and block-based DCT work similarly for lip reading task, outperforming PCA slightly.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126051767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Image Watermarking Resisting to Geometrical Attacks Based on Histogram 基于直方图的抗几何攻击图像水印
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.116
Zheng Fang, Yao Zhao
At present, most image watermarking scheme can not resist geometrical attacks, which restricts the application of digital watermarking techniques. In this paper, an image watermarking scheme based on histogram is proposed, since the histogram is not sensitive to geometrical transformation. Different groups of the image histogram bars are chosen, and the message is embedded to sum of every group by using Quantization Index Modulation (QIM). In watermark embedding scheme, an exact modification from histogram to image is proposed, and it can guarantee the distortion of image as little as possible. In watermark detection process, the same groups of image histogram bars are selected, and the message is extracted from the sum of each group by using nearest distance rule. Experimental results show the scheme is robust to geometrical attacks as well as compression and filtering.
目前,大多数图像水印方案不能抵抗几何攻击,这限制了数字水印技术的应用。针对直方图对几何变换不敏感的特点,提出了一种基于直方图的图像水印方案。选择不同组的图像直方图条,利用量化指数调制(quantialization Index Modulation, QIM)将信息嵌入到每组的和中。在水印嵌入方案中,提出了从直方图到图像的精确修改,可以保证图像的失真尽可能小。在水印检测过程中,选取相同组的图像直方图条,利用最近距离规则从每组的和中提取信息。实验结果表明,该方案对几何攻击具有较强的鲁棒性,对压缩和滤波具有较强的鲁棒性。
{"title":"Image Watermarking Resisting to Geometrical Attacks Based on Histogram","authors":"Zheng Fang, Yao Zhao","doi":"10.1109/IIH-MSP.2006.116","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.116","url":null,"abstract":"At present, most image watermarking scheme can not resist geometrical attacks, which restricts the application of digital watermarking techniques. In this paper, an image watermarking scheme based on histogram is proposed, since the histogram is not sensitive to geometrical transformation. Different groups of the image histogram bars are chosen, and the message is embedded to sum of every group by using Quantization Index Modulation (QIM). In watermark embedding scheme, an exact modification from histogram to image is proposed, and it can guarantee the distortion of image as little as possible. In watermark detection process, the same groups of image histogram bars are selected, and the message is extracted from the sum of each group by using nearest distance rule. Experimental results show the scheme is robust to geometrical attacks as well as compression and filtering.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Design of AC-PDP Signal Processor for SoC Application SoC用AC-PDP信号处理器的设计
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.81
Song Qiu, Wai-yun Li, Jin-gao Liu, Wenjing Hu
This paper describes the design and implementation of a synthesizable, flexible, alternative current-plasma display panel (AC-PDP) signal processor (APSP) as an intellectual property (IP) core for system-on-a-chip (SoC) application. The APSP adopts the Improved Address and Display Separation (ADS) method we proposed to overcome the dynamic false contour (DFC) problem. The Finite State Machine (FSM) Design of the APSP are discussed in this paper. The Post-Place & Route simulation waveform based on VHDL is also proposed in this paper.
本文介绍了一种可合成的、灵活的交流等离子体显示面板(AC-PDP)信号处理器(APSP)的设计和实现,作为片上系统(SoC)应用的知识产权(IP)核心。该算法采用了改进的地址与显示分离(ADS)方法来克服动态假轮廓(DFC)问题。本文讨论了APSP的有限状态机(FSM)设计。本文还提出了基于VHDL的后置路径仿真波形。
{"title":"Design of AC-PDP Signal Processor for SoC Application","authors":"Song Qiu, Wai-yun Li, Jin-gao Liu, Wenjing Hu","doi":"10.1109/IIH-MSP.2006.81","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.81","url":null,"abstract":"This paper describes the design and implementation of a synthesizable, flexible, alternative current-plasma display panel (AC-PDP) signal processor (APSP) as an intellectual property (IP) core for system-on-a-chip (SoC) application. The APSP adopts the Improved Address and Display Separation (ADS) method we proposed to overcome the dynamic false contour (DFC) problem. The Finite State Machine (FSM) Design of the APSP are discussed in this paper. The Post-Place & Route simulation waveform based on VHDL is also proposed in this paper.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114979267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Hiding Method in Digital Audio Signal Based on Perfect Codes 基于完美码的数字音频信号信息隐藏方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.123
Linna Zhou, Cui-Qing Liu, X. Ping, Tao Zhang, Yun-He Wang
A novel information hiding method in digital audio signal by using the encoding redundancy of perfect codes is presented in this paper. Researches on perfect codes and its syndrome of the codeword show that the syndrome of a codeword depends only on the error, not on the codeword transmitting. A mapping encoding between secret message and codeword error map is built. According to the error map, we can embed secret messages by modifying the codeword of perfect codes. In this paper we propose a particular example of perfect codes that carrying secret messages with its encoding redundancy. Theoretical analysis and experimental results show that this method has good security.
提出了一种利用完美码编码冗余的数字音频信号信息隐藏方法。对完美码及其码字症候群的研究表明,码字症候群只取决于码字的错误,而不取决于码字的传输。建立了秘密消息与码字错误映射之间的映射编码。根据错误映射,我们可以通过修改完美码的码字来嵌入秘密信息。本文提出了一种具有编码冗余性的携带秘密信息的完美码。理论分析和实验结果表明,该方法具有良好的安全性。
{"title":"Information Hiding Method in Digital Audio Signal Based on Perfect Codes","authors":"Linna Zhou, Cui-Qing Liu, X. Ping, Tao Zhang, Yun-He Wang","doi":"10.1109/IIH-MSP.2006.123","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.123","url":null,"abstract":"A novel information hiding method in digital audio signal by using the encoding redundancy of perfect codes is presented in this paper. Researches on perfect codes and its syndrome of the codeword show that the syndrome of a codeword depends only on the error, not on the codeword transmitting. A mapping encoding between secret message and codeword error map is built. According to the error map, we can embed secret messages by modifying the codeword of perfect codes. In this paper we propose a particular example of perfect codes that carrying secret messages with its encoding redundancy. Theoretical analysis and experimental results show that this method has good security.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution 基于遗传算法的LSB置换最优块映射方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.105
R. Ji, H. Yao, Shaohui Liu, Liang Wang
The least-significant-bit (LSB) substitution which is commonly used in steganography would degrade the quality of host image significantly when embedding high-capacity information. To overcome this drawback, we present an optimal block mapping LSB method based on genetic algorithm, which is out of researchers¿ concern but fundamentally important. Additionally we discuss the rule to select the best block size. The main idea is to minimize the degradation of the stego image by finding a best mapping function between host and secret image blocks at global scope. The experimental result is promising. The advantage of our method over most commonly used LSB strategy is obvious in enhancing PSNR value while having a secluded statistic peculiarity.
隐写中常用的最小有效位替换在嵌入大容量信息时,会严重降低宿主图像的质量。为了克服这一缺点,我们提出了一种基于遗传算法的最优块映射LSB方法,这是目前研究人员所不关心的,但却是至关重要的。此外,我们还讨论了选择最佳块大小的规则。其主要思想是通过在全局范围内寻找宿主和秘密图像块之间的最佳映射函数来最小化隐写图像的退化。实验结果是有希望的。与大多数常用的LSB策略相比,我们的方法在提高PSNR值方面具有明显的优势,同时具有隐蔽的统计特性。
{"title":"Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution","authors":"R. Ji, H. Yao, Shaohui Liu, Liang Wang","doi":"10.1109/IIH-MSP.2006.105","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.105","url":null,"abstract":"The least-significant-bit (LSB) substitution which is commonly used in steganography would degrade the quality of host image significantly when embedding high-capacity information. To overcome this drawback, we present an optimal block mapping LSB method based on genetic algorithm, which is out of researchers¿ concern but fundamentally important. Additionally we discuss the rule to select the best block size. The main idea is to minimize the degradation of the stego image by finding a best mapping function between host and secret image blocks at global scope. The experimental result is promising. The advantage of our method over most commonly used LSB strategy is obvious in enhancing PSNR value while having a secluded statistic peculiarity.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130991635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Chain Code Distribution-Based Image Retrieval 基于链码分布的图像检索
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.69
Junding Sun, Xiaosheng Wu
The direction chain code has been widely used in image retrieval for its simplicity and low storage requirement. One problem with the chain code is that it lacks of the spatial information of the image content, which limits its use in image retrieval. In this paper, two novel methods, called Chain Code Coherence Vector (CCCV) and Chain Code Distribution Vector (CCDV) are presented, which not only have the advantages of being invariant to the position, rotation and scaling but also contain the spatial information of the image content. In the end, two different distance measures are presented to measure the similarity of shape information embedded in the CCCV and CCDV. Experiment demonstrates the efficiency of our proposed algorithms.
方向链码以其简单、存储空间小等优点在图像检索中得到了广泛的应用。链码的一个问题是它缺乏图像内容的空间信息,这限制了它在图像检索中的应用。本文提出了链码相干矢量(CCCV)和链码分布矢量(CCDV)两种新方法,它们不仅具有不受位置、旋转和缩放影响的优点,而且包含了图像内容的空间信息。最后,提出了两种不同的距离度量方法来度量嵌入在CCCV和CCDV中的形状信息的相似性。实验证明了算法的有效性。
{"title":"Chain Code Distribution-Based Image Retrieval","authors":"Junding Sun, Xiaosheng Wu","doi":"10.1109/IIH-MSP.2006.69","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.69","url":null,"abstract":"The direction chain code has been widely used in image retrieval for its simplicity and low storage requirement. One problem with the chain code is that it lacks of the spatial information of the image content, which limits its use in image retrieval. In this paper, two novel methods, called Chain Code Coherence Vector (CCCV) and Chain Code Distribution Vector (CCDV) are presented, which not only have the advantages of being invariant to the position, rotation and scaling but also contain the spatial information of the image content. In the end, two different distance measures are presented to measure the similarity of shape information embedded in the CCCV and CCDV. Experiment demonstrates the efficiency of our proposed algorithms.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133660818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An Improved Design and Implementation of Chinese Name Card Recognition System on Mobile Devices 移动设备上中文名片识别系统的改进设计与实现
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.51
Chi Cui
Since name card recognition based on built-in cameras has become popular people now pay more attention to the robustness and effectiveness of the system. In spite of the maturity of OCR some bottlenecks in lower processing level such as spatial correction and segmentation weak its power. Traditional models treating the card image as an orthogonal projection with only affine distortion are too simple and thus perspective correction is needed to enhance the recognition rate.Due to the complexity of the layout of Chinese name cards text segmentation also attaches strong significance to the performance. In this paper a improved name card recognition system would be devised and implemented. Two new algorithms for perspective correction and text segmentation would be proposed respectively.
随着基于内置摄像头的名片识别技术的普及,人们越来越关注系统的鲁棒性和有效性。尽管OCR技术已经成熟,但在较低的处理层次上存在空间校正和分割等瓶颈,削弱了OCR的能力。传统模型将卡片图像处理为只有仿射畸变的正交投影,过于简单,需要进行透视校正来提高识别率。由于中文名片排版的复杂性,文本分割的性能也具有很强的意义。本文将设计并实现一个改进的名片识别系统。提出了两种新的视角校正算法和文本分割算法。
{"title":"An Improved Design and Implementation of Chinese Name Card Recognition System on Mobile Devices","authors":"Chi Cui","doi":"10.1109/IIH-MSP.2006.51","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.51","url":null,"abstract":"Since name card recognition based on built-in cameras has become popular people now pay more attention to the robustness and effectiveness of the system. In spite of the maturity of OCR some bottlenecks in lower processing level such as spatial correction and segmentation weak its power. Traditional models treating the card image as an orthogonal projection with only affine distortion are too simple and thus perspective correction is needed to enhance the recognition rate.Due to the complexity of the layout of Chinese name cards text segmentation also attaches strong significance to the performance. In this paper a improved name card recognition system would be devised and implemented. Two new algorithms for perspective correction and text segmentation would be proposed respectively.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"42 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113974458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2006 International Conference on Intelligent Information Hiding and Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1