首页 > 最新文献

2006 International Conference on Intelligent Information Hiding and Multimedia最新文献

英文 中文
Domain-Based Dynamic Resource Management Mechanism Supporting Large-Scale Grid Application 支持大规模网格应用的基于域的动态资源管理机制
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.89
Guomin Zhang, Yong Zhang, Ming Chen, Huan Xiong
A grid computing environment enables sharing of loosely coupled resources and services required by various applications in a large-scale. In such an environment, one of the key challenges is to develop a flexible, scalable, and self-adaptive resource management system which would allow users to carry out their jobs by transparently accessing autonomous, distributed, and heterogeneous resources. A Domain-based dynamic resource self maintain mechanism (DDRM) supporting large-scale distributed application is proposed. Grid distributed applications can be ensured to run regularly and stably by maintaining dynamic resource information, detecting abnormality and adjusting system timely. Conceptions of Monitoring Domain and domain agent are defined. Global resource view is acquired through resource pool and the corresponding triggering update algori-thm. Dynamic resource maintenance mechanism are adopted to handle resource abnormality. DDRM can scale to any large distributed application system with strong real-time and reliability. Finally, complexity and convergence time of DDRM are analyzed.
网格计算环境可以大规模地共享各种应用程序所需的松散耦合资源和服务。在这样的环境中,关键的挑战之一是开发一个灵活的、可伸缩的和自适应的资源管理系统,该系统将允许用户通过透明地访问自治的、分布式的和异构的资源来执行他们的工作。提出了一种支持大规模分布式应用的基于域的动态资源自维护机制(DDRM)。通过维护动态资源信息,及时发现异常,及时调整系统,保证网格分布式应用的正常稳定运行。定义了监控域和域代理的概念。通过资源池和相应的触发更新算法获取全局资源视图。采用动态资源维护机制,对资源异常进行处理。DDRM可以扩展到任何大型分布式应用系统,具有较强的实时性和可靠性。最后,分析了DDRM算法的复杂度和收敛时间。
{"title":"Domain-Based Dynamic Resource Management Mechanism Supporting Large-Scale Grid Application","authors":"Guomin Zhang, Yong Zhang, Ming Chen, Huan Xiong","doi":"10.1109/IIH-MSP.2006.89","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.89","url":null,"abstract":"A grid computing environment enables sharing of loosely coupled resources and services required by various applications in a large-scale. In such an environment, one of the key challenges is to develop a flexible, scalable, and self-adaptive resource management system which would allow users to carry out their jobs by transparently accessing autonomous, distributed, and heterogeneous resources. A Domain-based dynamic resource self maintain mechanism (DDRM) supporting large-scale distributed application is proposed. Grid distributed applications can be ensured to run regularly and stably by maintaining dynamic resource information, detecting abnormality and adjusting system timely. Conceptions of Monitoring Domain and domain agent are defined. Global resource view is acquired through resource pool and the corresponding triggering update algori-thm. Dynamic resource maintenance mechanism are adopted to handle resource abnormality. DDRM can scale to any large distributed application system with strong real-time and reliability. Finally, complexity and convergence time of DDRM are analyzed.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132797098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Two-Dimensional Recursive Filters by Using Quantum-Behaved Particle Swarm Optimization 基于量子粒子群优化的二维递归滤波器设计
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.84
Wei Fang, Jun Sun, Wenbo Xu
A novel algorithm, named Quantum-behaved particle swarm optimization (QPSO) proposed by us previously is introduced in the design of twodimensional (2-D) recursive digital filters. The design of the 2-D filters is reduced to a constrained minimization problem that is solved by QPSO, which is a global stochastic searching technique and be able to find out the global optima of the problem more efficiently than original particle swarm optimization (PSO). Experiment results show the superiority of the proposed method by comparing it with those of some previous designs.
在二维递归数字滤波器的设计中引入了我们之前提出的量子粒子群优化算法(QPSO)。将二维滤波器的设计简化为一个约束最小化问题,利用量子粒子群算法求解该问题。量子粒子群算法是一种全局随机搜索技术,能够比粒子群算法更有效地找到问题的全局最优解。实验结果表明,该方法与以往的设计方法相比具有一定的优越性。
{"title":"Design of Two-Dimensional Recursive Filters by Using Quantum-Behaved Particle Swarm Optimization","authors":"Wei Fang, Jun Sun, Wenbo Xu","doi":"10.1109/IIH-MSP.2006.84","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.84","url":null,"abstract":"A novel algorithm, named Quantum-behaved particle swarm optimization (QPSO) proposed by us previously is introduced in the design of twodimensional (2-D) recursive digital filters. The design of the 2-D filters is reduced to a constrained minimization problem that is solved by QPSO, which is a global stochastic searching technique and be able to find out the global optima of the problem more efficiently than original particle swarm optimization (PSO). Experiment results show the superiority of the proposed method by comparing it with those of some previous designs.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133514086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
VLSI Bio-Inspired Microsystem for Robust Microarrray Image Analysis and Recognition 鲁棒微阵列图像分析与识别的VLSI仿生微系统
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.171
W. Fang, Jaw-Chyng L. Lue
A VLSI bio-inspired microsystem for real-time, on-site, robust image analysis and recognition has been developed. A corresponding novel artificial neural network (ANN) learning algorithm using new sigmoid-logarithmic transfer function is invented. Our results show the trained new ANN can recognize low fluorescence patterns better than the conventional sigmoidal ANN does. A differential logarithmic imaging chip is designed for calculating logarithm of relative intensities of fluorescence signals. The single-rail logarithmic circuit and a prototype ANN chip are designed, fabricated and characterized.
开发了一种用于实时、现场、鲁棒图像分析和识别的VLSI仿生微系统。提出了一种新的基于s型对数传递函数的人工神经网络学习算法。结果表明,与传统的s型神经网络相比,训练后的新神经网络能更好地识别低荧光模式。为计算荧光信号相对强度的对数,设计了一种差分对数成像芯片。设计、制作了单轨对数电路和原型人工神经网络芯片,并对其进行了表征。
{"title":"VLSI Bio-Inspired Microsystem for Robust Microarrray Image Analysis and Recognition","authors":"W. Fang, Jaw-Chyng L. Lue","doi":"10.1109/IIH-MSP.2006.171","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.171","url":null,"abstract":"A VLSI bio-inspired microsystem for real-time, on-site, robust image analysis and recognition has been developed. A corresponding novel artificial neural network (ANN) learning algorithm using new sigmoid-logarithmic transfer function is invented. Our results show the trained new ANN can recognize low fluorescence patterns better than the conventional sigmoidal ANN does. A differential logarithmic imaging chip is designed for calculating logarithm of relative intensities of fluorescence signals. The single-rail logarithmic circuit and a prototype ANN chip are designed, fabricated and characterized.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121687184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks 嵌入多水印的音频完整性保护与伪造估计
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.60
Michael Gulbis, E. Müller, M. Steinebach
The recognition of digital audio data manipulation is a challenge addressed by various fragile and contentfragile watermarking algorithms. But so far none of the approaches provides satisfying results with respect to manipulation detection. Especially distinguishing malicious attacks from allowed post production operations is still an open issue. We introduce a novel watermarkingbased approach for audio data falsification recognition. We embed multiple watermarks with various characteristics into the audio data to be protected. By analyzing the quality of the retrieved watermarks we obtain information about the nature of the manipulation of the audio data. In comparison to known feature-embedding algorithms, this is rather a forensic approach using watermarking as a hint. Our method is verified using several audio data sets.
对数字音频数据操作的识别是各种脆弱和内容脆弱水印算法所面临的挑战。但迄今为止,没有一种方法能提供令人满意的操作检测结果。特别是区分恶意攻击和允许的后期制作操作仍然是一个悬而未决的问题。提出了一种新的基于水印的音频数据伪造识别方法。我们将多个具有不同特征的水印嵌入到待保护的音频数据中。通过分析检索到的水印的质量,我们可以得到关于音频数据被操纵性质的信息。与已知的特征嵌入算法相比,这是一种使用水印作为提示的取证方法。使用多个音频数据集验证了我们的方法。
{"title":"Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks","authors":"Michael Gulbis, E. Müller, M. Steinebach","doi":"10.1109/IIH-MSP.2006.60","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.60","url":null,"abstract":"The recognition of digital audio data manipulation is a challenge addressed by various fragile and contentfragile watermarking algorithms. But so far none of the approaches provides satisfying results with respect to manipulation detection. Especially distinguishing malicious attacks from allowed post production operations is still an open issue. We introduce a novel watermarkingbased approach for audio data falsification recognition. We embed multiple watermarks with various characteristics into the audio data to be protected. By analyzing the quality of the retrieved watermarks we obtain information about the nature of the manipulation of the audio data. In comparison to known feature-embedding algorithms, this is rather a forensic approach using watermarking as a hint. Our method is verified using several audio data sets.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130098912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Analysis of Current Steganography Tools: Classifications & Features 当前隐写工具分析:分类与特征
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.58
Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang
The technology of information hiding has developed rapidly in recent years. The number of steganography software has reached more than 200 at present. This paper focuses on the steganography tools¿ algorithms. Based on the analyses of these algorithms, we partition these tools into five categories: (1). Spatial domain based steganography tools; (2). Transform domain based steganography tools; (3). Document based steganography tools; (4) File structure based steganography tools; (5). Other categories, e.g. video compress encoding and spread spectrum technique based. Moreover, we give an in-depth analysis of the feature of each category.
近年来,信息隐藏技术得到了迅速发展。目前,隐写软件的数量已达到200多个。本文重点介绍了隐写工具和算法。基于对这些算法的分析,我们将这些工具分为五类:(1)基于空间域的隐写工具;(2)基于变换域的隐写工具;(3)基于文档的隐写工具;(4)基于文件结构的隐写工具;(5).其他类别,如视频压缩编码和扩频技术为主。此外,我们对每个类别的特征进行了深入的分析。
{"title":"Analysis of Current Steganography Tools: Classifications & Features","authors":"Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang","doi":"10.1109/IIH-MSP.2006.58","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.58","url":null,"abstract":"The technology of information hiding has developed rapidly in recent years. The number of steganography software has reached more than 200 at present. This paper focuses on the steganography tools¿ algorithms. Based on the analyses of these algorithms, we partition these tools into five categories: (1). Spatial domain based steganography tools; (2). Transform domain based steganography tools; (3). Document based steganography tools; (4) File structure based steganography tools; (5). Other categories, e.g. video compress encoding and spread spectrum technique based. Moreover, we give an in-depth analysis of the feature of each category.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127731307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
The Attacking Method for DC Components Watermarking 直流分量水印攻击方法研究
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.161
Pei-wei Tsai, S. Chu, Ching-Sung Lu, Jui-Fang Chang, Hsing-Yuan Liao
In this paper we present two methods to remove the watermark from the carrier image, which is embedded in dc components of the discrete cosine transform based image using the method presented by Huang et al. [1] The first method, which we present, removes the watermark via varying the energies in frequency domain and redeeming the luminance in spatial domain; the second method we present removes the watermark through diversifying the intensity of dc components in transform domain. Both the two methods can remove the watermark and avoid to be detected that the image was hidden a watermark by the detection criterion. In addition, though we cleaned the watermark from the watermarked image, the PSNR of the cleaned image (compared with the original carrier image) is still high.
在本文中,我们提出了两种从载体图像中去除水印的方法,该方法使用Huang等人提出的方法,该方法嵌入到基于离散余弦变换的图像的直流分量中。[1]我们提出的第一种方法是通过在频域改变能量并在空间域补偿亮度来去除水印;第二种方法是通过变换域直流分量强度的变化来去除水印。这两种方法都可以去除水印,并且根据检测准则避免被检测到图像中隐藏了水印。此外,尽管我们将水印从水印图像中去除,但与原始载体图像相比,去除后的图像的PSNR仍然很高。
{"title":"The Attacking Method for DC Components Watermarking","authors":"Pei-wei Tsai, S. Chu, Ching-Sung Lu, Jui-Fang Chang, Hsing-Yuan Liao","doi":"10.1109/IIH-MSP.2006.161","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.161","url":null,"abstract":"In this paper we present two methods to remove the watermark from the carrier image, which is embedded in dc components of the discrete cosine transform based image using the method presented by Huang et al. [1] The first method, which we present, removes the watermark via varying the energies in frequency domain and redeeming the luminance in spatial domain; the second method we present removes the watermark through diversifying the intensity of dc components in transform domain. Both the two methods can remove the watermark and avoid to be detected that the image was hidden a watermark by the detection criterion. In addition, though we cleaned the watermark from the watermarked image, the PSNR of the cleaned image (compared with the original carrier image) is still high.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VS-ISA: A Video Specific Instruction Set Architecture for ASIP Design 面向ASIP设计的视频专用指令集体系结构
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.173
Zheng Shen, Hu He, Yanjun Zhang, Yihe Sun
This paper describes a novel video specific instruction set architecture for ASIP design. With SIMD (Single Instruction Multiple Data) instructions, and video specific instructions, an instruction set architecture is introduced to enhance the performance for video applications. Furthermore, we quantify the improvement on H.263 encoding. In this paper, we evaluate and compare the performance of VS ISA (Video Specific Instruction Set Architecture), other DSPs (digital signal processors) and conventional SIMD media extensions in the context of video coding. Our evaluation results show that VS ISA improves the processor¿s performance by approximate 5x on H.263 encoding, and VS ISA outperforms other architectures by 1.6x to 8.57x in computing IDCT.
本文介绍了一种用于ASIP设计的新型视频专用指令集体系结构。通过单指令多数据(SIMD)指令和视频专用指令,引入了一种指令集架构,以提高视频应用的性能。此外,我们量化了H.263编码的改进。在本文中,我们在视频编码的背景下评估和比较了VS ISA(视频特定指令集架构),其他dsp(数字信号处理器)和传统SIMD媒体扩展的性能。我们的评估结果表明,VS ISA在H.263编码上的处理器性能提高了约5倍,在计算IDCT方面,VS ISA比其他架构的性能提高了1.6倍至8.57倍。
{"title":"VS-ISA: A Video Specific Instruction Set Architecture for ASIP Design","authors":"Zheng Shen, Hu He, Yanjun Zhang, Yihe Sun","doi":"10.1109/IIH-MSP.2006.173","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.173","url":null,"abstract":"This paper describes a novel video specific instruction set architecture for ASIP design. With SIMD (Single Instruction Multiple Data) instructions, and video specific instructions, an instruction set architecture is introduced to enhance the performance for video applications. Furthermore, we quantify the improvement on H.263 encoding. In this paper, we evaluate and compare the performance of VS ISA (Video Specific Instruction Set Architecture), other DSPs (digital signal processors) and conventional SIMD media extensions in the context of video coding. Our evaluation results show that VS ISA improves the processor¿s performance by approximate 5x on H.263 encoding, and VS ISA outperforms other architectures by 1.6x to 8.57x in computing IDCT.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122462116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Audio Watermarking Based on Reverberation 基于混响的音频水印
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.62
Gui-jun Nian, Zhiyuan Xie, Shuxun Wang
To get the best effect of art, the music should be added different artificial reverberation. A new watermarking method based on reverberation theory is proposed in this paper. The embed process same as the process that adds reverberation to recordings in music studio to make it sound quite natural like in a real concert hall. The watermark are embedded by convoluting the original audio signal and a room impulse response that obtained by image method[4]. The parameters for calculating the room impulse response are used as secret key that must be used in the decoding process to ensure security. When decoding, homomorphic deconvolution method is used to separate the kernel function from the cepstrum of the watermarked audio signal, and then take cross-correlation with the delay sequence of room impulse response to get watermark by searching the peak.
为了获得最佳的艺术效果,音乐中应加入不同的人工混响。提出了一种基于混响理论的水印方法。嵌入过程与在音乐工作室中为录音添加混响的过程相同,使其听起来很自然,就像在真正的音乐厅一样。水印是通过对原始音频信号和图像法得到的房间脉冲响应进行卷积来嵌入的[4]。计算房间脉冲响应的参数被用作解码过程中必须使用的密钥,以确保安全性。在解码时,采用同态反卷积方法将水印音频信号的核函数从倒谱中分离出来,然后与房间脉冲响应的延迟序列进行互相关,通过搜索峰值得到水印。
{"title":"Audio Watermarking Based on Reverberation","authors":"Gui-jun Nian, Zhiyuan Xie, Shuxun Wang","doi":"10.1109/IIH-MSP.2006.62","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.62","url":null,"abstract":"To get the best effect of art, the music should be added different artificial reverberation. A new watermarking method based on reverberation theory is proposed in this paper. The embed process same as the process that adds reverberation to recordings in music studio to make it sound quite natural like in a real concert hall. The watermark are embedded by convoluting the original audio signal and a room impulse response that obtained by image method[4]. The parameters for calculating the room impulse response are used as secret key that must be used in the decoding process to ensure security. When decoding, homomorphic deconvolution method is used to separate the kernel function from the cepstrum of the watermarked audio signal, and then take cross-correlation with the delay sequence of room impulse response to get watermark by searching the peak.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123004233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
KaiKai: A NAT Traversal Approach by Using Protocol Behavior Analysis 基于协议行为分析的NAT遍历方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.128
Yung-Li Chang, Hsiang-Kai Liao, C. Shieh, Yu-Ben Miao
Typical NAT traversable applications solve the peer-to-peer communication problems by means of STUN-like NAT traversal approach. For example, Skype is a well-known NAT traversable application. The Skype developer claims that peer-to-peer voice over IP (VoIP) service can work across NATs/firewalls. Two Skype clients which reside in different NATs can connect directly with each other. Nonetheless, Skype clients can not traverse through the NAT daemon on FreeBSD system without "Deny Incoming" option being set. The default of this option is disabled and Skype clients must depend on third parties to relay voice instead of contacting with correspondent directly. The situation result in voice quality degradation and scalability problems. This paper proposes a novel approach "KaiKai" for applications to solve this problem. KaiKai can make two clients contact directly even these two clients reside in different NATs. By using protocol behavior analysis, KaiKai can cooperate with NATs with or without "Deny Incoming" option being set. We implemented KaiKai on Windows system and chose Skype as our demonstration application. Our experiments show that KaiKai can make two Skype clients connect directly behind different NATs. Consequently, the better quality of service and scalability can be achieved.
典型的NAT可穿越应用采用类似stunn的NAT穿越方式解决点对点通信问题。例如,Skype是一个众所周知的可穿越NAT的应用程序。Skype开发者声称,点对点IP语音(VoIP)服务可以跨nat /防火墙工作。位于不同nat的两个Skype客户端可以彼此直接连接。尽管如此,如果没有设置“拒绝传入”选项,Skype客户端无法穿越FreeBSD系统上的NAT守护进程。默认禁用此选项,Skype客户端必须依赖第三方中继语音,而不是直接与通讯员联系。这种情况导致语音质量下降和可扩展性问题。本文提出了一种新颖的应用程序“开开”方法来解决这一问题。KaiKai可以让两个客户端直接联系,即使这两个客户端位于不同的nat。通过协议行为分析,KaiKai可以在是否设置“拒绝传入”选项的情况下与nat进行合作。我们在Windows系统上实现了KaiKai,并选择Skype作为我们的演示应用。我们的实验表明,KaiKai可以让两个Skype客户端在不同的nat后面直接连接。因此,可以实现更好的服务质量和可伸缩性。
{"title":"KaiKai: A NAT Traversal Approach by Using Protocol Behavior Analysis","authors":"Yung-Li Chang, Hsiang-Kai Liao, C. Shieh, Yu-Ben Miao","doi":"10.1109/IIH-MSP.2006.128","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.128","url":null,"abstract":"Typical NAT traversable applications solve the peer-to-peer communication problems by means of STUN-like NAT traversal approach. For example, Skype is a well-known NAT traversable application. The Skype developer claims that peer-to-peer voice over IP (VoIP) service can work across NATs/firewalls. Two Skype clients which reside in different NATs can connect directly with each other. Nonetheless, Skype clients can not traverse through the NAT daemon on FreeBSD system without \"Deny Incoming\" option being set. The default of this option is disabled and Skype clients must depend on third parties to relay voice instead of contacting with correspondent directly. The situation result in voice quality degradation and scalability problems. This paper proposes a novel approach \"KaiKai\" for applications to solve this problem. KaiKai can make two clients contact directly even these two clients reside in different NATs. By using protocol behavior analysis, KaiKai can cooperate with NATs with or without \"Deny Incoming\" option being set. We implemented KaiKai on Windows system and chose Skype as our demonstration application. Our experiments show that KaiKai can make two Skype clients connect directly behind different NATs. Consequently, the better quality of service and scalability can be achieved.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126928535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multiscale and Multidirectional Image Denoising Algorithm Based on Contourlet Transform 基于Contourlet变换的多尺度多向图像去噪算法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.19
Bei Li, Xin Li, Shuxun Wang, Haifeng Li
In this paper, we propose a novel image denoising algorithm in Contourlet domain. The Contourlet transform is adopted by virtual of its advantages over the Wavelet transform in order to obtain a flexible multiresolution, local, and directional image expansion using contour segments, it is good at isolating the smoothness along the contours. We present a weighing factor which submits to the negative exponential distribution, it can combine the hard thresholding function with the soft thresholding, the new thresholding function is continuous[4]. We adapt different thresholdings on different scales and different directions to get better denoising results. Experimental results demonstrate that the proposed algorithm improves the SNR on a certain extent.
本文提出了一种新的Contourlet域图像去噪算法。基于Contourlet变换相对于小波变换的优点,虚拟机采用Contourlet变换对轮廓段进行灵活的多分辨率、局部和定向的图像展开,它善于隔离沿轮廓的平滑性。我们提出了一个服从负指数分布的权重因子,它可以将硬阈值函数和软阈值函数结合起来,新的阈值函数是连续的[4]。为了得到更好的去噪效果,我们在不同的尺度和方向上采用了不同的阈值。实验结果表明,该算法在一定程度上提高了信噪比。
{"title":"A Multiscale and Multidirectional Image Denoising Algorithm Based on Contourlet Transform","authors":"Bei Li, Xin Li, Shuxun Wang, Haifeng Li","doi":"10.1109/IIH-MSP.2006.19","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.19","url":null,"abstract":"In this paper, we propose a novel image denoising algorithm in Contourlet domain. The Contourlet transform is adopted by virtual of its advantages over the Wavelet transform in order to obtain a flexible multiresolution, local, and directional image expansion using contour segments, it is good at isolating the smoothness along the contours. We present a weighing factor which submits to the negative exponential distribution, it can combine the hard thresholding function with the soft thresholding, the new thresholding function is continuous[4]. We adapt different thresholdings on different scales and different directions to get better denoising results. Experimental results demonstrate that the proposed algorithm improves the SNR on a certain extent.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126786802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2006 International Conference on Intelligent Information Hiding and Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1