首页 > 最新文献

2006 International Conference on Intelligent Information Hiding and Multimedia最新文献

英文 中文
Design of Gabor Filter Banks for Iris Recognition 用于虹膜识别的Gabor滤波器组设计
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.83
Chia-Te Chou, S. Shih, Duan-Yu Chen
In this paper, we propose a systematic approach to design Gabor filter banks for iris feature extraction. The spectra of normalized iris images were analyzed and the most informative band (MIB) was located. When tuning the filter parameters, the pass bands of the filter banks are confined to be within the MIB. It turns out that with the MIB constraint the number of orientation parameters of the Gabor filters can be reduced to one. Furthermore, we show that the spatial locations of the Gabor filters can be arbitrarily and uniformly selected provided that the conditions of the Nyquist sampling theorem are satisfied. The main difficulty of designing filter banks for iris feature extraction is that there are too many free parameters to be determined, e.g., there will be 6N parameters to be designed for N filters. However, after analyzing the possible factors influencing the iris feature extraction process, we found that the free parameters of the Gabor filter banks can be reduced from 6N to three. By using the genetic algorithm to tune the filter parameters, the performance of our recognition system has been gradually improved. The experimental results show that the best equal error rate of our system is about 0.05% computed with the CASIA database.
本文提出了一种系统的方法来设计用于虹膜特征提取的Gabor滤波器组。对归一化后的虹膜图像进行光谱分析,定位出信息最丰富的波段。在调整滤波器参数时,滤波器组的通带限制在MIB内。结果表明,在MIB约束下,Gabor滤波器的方向参数数量可以减少到1个。进一步证明了在满足奈奎斯特抽样定理的条件下,Gabor滤波器的空间位置可以任意、一致地选择。设计虹膜特征提取滤波器组的主要困难在于需要确定的自由参数太多,例如N个滤波器需要设计6N个参数。然而,在分析了影响虹膜特征提取过程的可能因素后,我们发现Gabor滤波器组的自由参数可以从6N减少到3个。利用遗传算法对滤波器参数进行调整,逐步提高了识别系统的性能。实验结果表明,在CASIA数据库下,系统的最佳等错误率约为0.05%。
{"title":"Design of Gabor Filter Banks for Iris Recognition","authors":"Chia-Te Chou, S. Shih, Duan-Yu Chen","doi":"10.1109/IIH-MSP.2006.83","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.83","url":null,"abstract":"In this paper, we propose a systematic approach to design Gabor filter banks for iris feature extraction. The spectra of normalized iris images were analyzed and the most informative band (MIB) was located. When tuning the filter parameters, the pass bands of the filter banks are confined to be within the MIB. It turns out that with the MIB constraint the number of orientation parameters of the Gabor filters can be reduced to one. Furthermore, we show that the spatial locations of the Gabor filters can be arbitrarily and uniformly selected provided that the conditions of the Nyquist sampling theorem are satisfied. The main difficulty of designing filter banks for iris feature extraction is that there are too many free parameters to be determined, e.g., there will be 6N parameters to be designed for N filters. However, after analyzing the possible factors influencing the iris feature extraction process, we found that the free parameters of the Gabor filter banks can be reduced from 6N to three. By using the genetic algorithm to tune the filter parameters, the performance of our recognition system has been gradually improved. The experimental results show that the best equal error rate of our system is about 0.05% computed with the CASIA database.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"283 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120895947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Novel Through-Wall Imaging Method Using Ultra WideBand Pulse System 一种利用超宽带脉冲系统的新型穿壁成像方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.33
Lin Ma, Zhongzhao Zhang, Xuezhi Tan
Through-wall imaging is one of the applications of Ultra Wideband communication that attracts recent interests for its ability to penetrate the wall. However, the available references fail to provide a clear feasible imaging method. This paper proposes a novel virtual elliptic curve imaging method based on the UWB pulse system, which presents the detail imaging process and imaging results. The key factor of this method is to correctly obtain the propagation delay by the correlator, and it is achieved by the spread gain of the pseudo-noise sequences. The imaging results show the proposed method has very high imaging resolution. And the error analysis is investigated on account of misestimating wall parameters. Simulations illustrate the effects of the errors under different scenarios.
穿墙成像是超宽带通信的应用之一,由于其穿墙能力而引起了人们的兴趣。然而,现有的文献并没有提供一个清晰可行的成像方法。提出了一种基于超宽带脉冲系统的虚拟椭圆曲线成像方法,详细介绍了成像过程和成像结果。该方法的关键是通过相关器正确获取传播延迟,并通过伪噪声序列的扩展增益来实现。成像结果表明,该方法具有很高的成像分辨率。并对墙体参数估计错误造成的误差进行了分析。仿真说明了误差在不同情况下的影响。
{"title":"A Novel Through-Wall Imaging Method Using Ultra WideBand Pulse System","authors":"Lin Ma, Zhongzhao Zhang, Xuezhi Tan","doi":"10.1109/IIH-MSP.2006.33","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.33","url":null,"abstract":"Through-wall imaging is one of the applications of Ultra Wideband communication that attracts recent interests for its ability to penetrate the wall. However, the available references fail to provide a clear feasible imaging method. This paper proposes a novel virtual elliptic curve imaging method based on the UWB pulse system, which presents the detail imaging process and imaging results. The key factor of this method is to correctly obtain the propagation delay by the correlator, and it is achieved by the spread gain of the pseudo-noise sequences. The imaging results show the proposed method has very high imaging resolution. And the error analysis is investigated on account of misestimating wall parameters. Simulations illustrate the effects of the errors under different scenarios.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Java Applets Copy Protection by Steganography Java小程序的隐写复制保护
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.126
M. Shirali-Shahreza
Following the expansion of Internet, many software were produced that could launch through Internet without prior installation on computers. This included game software and software that deal with financial affairs. These softwares are mainly in Java language and can be found on web pages as Java Applets. Some software owners want that their products only able to execute through their own web pages so that no one could put them on other web pages. In this paper, a new method has been presented to protect Java Applets from copying by using "Steganography in HTML web pages" method. In this method, a special 8-character string is hidden in the HTML page by a secret key. The string and the secret key are put within the Java Applet. After execution, the Java Applet extracts data from the HTML page by using the secret key. If the extracted data is the same as the 8-letter string, we can be sure that the Java Applet lies in its original web page and no copying is taken place. This project is implemented by Java programming language.
随着互联网的发展,许多软件可以通过互联网运行,而无需事先在计算机上安装。这包括游戏软件和处理财务事务的软件。这些软件主要是用Java语言编写的,可以在网页上以Java applet的形式找到。一些软件所有者希望他们的产品只能在他们自己的网页上运行,这样就没有人可以把它们放在其他网页上。本文提出了一种利用“HTML网页隐写”保护Java小程序不被复制的新方法。在这种方法中,一个特殊的8字符字符串通过一个密钥隐藏在HTML页面中。字符串和密钥放在Java Applet中。执行后,Java Applet使用密钥从HTML页面提取数据。如果提取的数据与8个字母的字符串相同,我们可以确定Java Applet位于其原始网页中,没有发生复制。本项目采用Java编程语言实现。
{"title":"Java Applets Copy Protection by Steganography","authors":"M. Shirali-Shahreza","doi":"10.1109/IIH-MSP.2006.126","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.126","url":null,"abstract":"Following the expansion of Internet, many software were produced that could launch through Internet without prior installation on computers. This included game software and software that deal with financial affairs. These softwares are mainly in Java language and can be found on web pages as Java Applets. Some software owners want that their products only able to execute through their own web pages so that no one could put them on other web pages. In this paper, a new method has been presented to protect Java Applets from copying by using \"Steganography in HTML web pages\" method. In this method, a special 8-character string is hidden in the HTML page by a secret key. The string and the secret key are put within the Java Applet. After execution, the Java Applet extracts data from the HTML page by using the secret key. If the extracted data is the same as the 8-letter string, we can be sure that the Java Applet lies in its original web page and no copying is taken place. This project is implemented by Java programming language.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124164843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Method Combining LPC-Based Cepstrum and Harmonic Product Spectrum for Pitch Detection 基于lpc的倒谱与谐波积谱相结合的基音检测方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.14
Hui Ding, Bo Qian, Yanping Li, Zhenmin Tang
A novel method of pitch detection, combining LPCbased Cepstrum and Harmonic Product Spectrum (HPS), has been proposed. The interaction between the vocal tract and the glottal excitation disturb the detection from glottal excitation, so we use Linear Prediction Residual to eliminate the vocal tract information and the high frequency noise which can improve the accurate to some extent. In real world, when the speech signal has been transmitted through the telephone system, low frequency including pitch information have been cut off which can significantly attenuate the detection of fundamental pitch frequency. In this paper, we use the novel method combining LPC-based Cepstrum and HPS to deal with this problem and pitch errors. Experiment studied indicates that this novel method is effective and valuable for application in pitch detection, since it robustly handles different frequency domain noise and pitch errors.
提出了一种基于倒谱和谐波积谱相结合的基音检测新方法。声道和声门兴奋之间的相互作用干扰了声门兴奋的检测,因此我们采用线性预测残差法去除声道信息和高频噪声,在一定程度上提高了检测的准确性。在现实世界中,语音信号在通过电话系统传输时,包含基音信息的低频已经被切断,这将大大削弱对基音频率的检测。本文采用基于lpc的倒频谱和HPS相结合的新方法来处理这一问题和基音误差。实验结果表明,该方法对不同频域噪声和基音误差具有较强的鲁棒性,在基音检测中具有一定的应用价值。
{"title":"A Method Combining LPC-Based Cepstrum and Harmonic Product Spectrum for Pitch Detection","authors":"Hui Ding, Bo Qian, Yanping Li, Zhenmin Tang","doi":"10.1109/IIH-MSP.2006.14","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.14","url":null,"abstract":"A novel method of pitch detection, combining LPCbased Cepstrum and Harmonic Product Spectrum (HPS), has been proposed. The interaction between the vocal tract and the glottal excitation disturb the detection from glottal excitation, so we use Linear Prediction Residual to eliminate the vocal tract information and the high frequency noise which can improve the accurate to some extent. In real world, when the speech signal has been transmitted through the telephone system, low frequency including pitch information have been cut off which can significantly attenuate the detection of fundamental pitch frequency. In this paper, we use the novel method combining LPC-based Cepstrum and HPS to deal with this problem and pitch errors. Experiment studied indicates that this novel method is effective and valuable for application in pitch detection, since it robustly handles different frequency domain noise and pitch errors.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125908400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Data Hiding in Speech Sounds Using Subband Amplitude Modulation Robust against Reverberations and Background Noise 利用子带调幅法对混响和背景噪声进行数据隐藏
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.77
Akira Nishimura
Data hiding in audio signals can be used for transmitting auxiliary information related to the content of the audio signal. Such an application requires a greater data payload than music copyright management systems. Also, it is difficult to extract the embedded data from sounds played through a loudspeaker and detected by a microphone because of additive background noise, reflections and reverberations and the band-limited characteristics of loudspeakers and microphones. In this study, a watermarking technique using subband amplitude modulation was evaluated by computer simulation in terms of robustness against background noises and reverberations. The effects of amplitude modulation on the articulation scores of 125 vowel-consonant-vowel (VCV) syllables were also investigated. The results showed that reverberant speech signals with various background noises having a SNR of 10 dB can transmit more than 90% of embedded data at 48 bps, with only a small deterioration in the syllable identification scores.
隐藏在音频信号中的数据可用于传输与音频信号内容相关的辅助信息。这样的应用程序需要比音乐版权管理系统更大的数据负载。此外,由于附加的背景噪声、反射和混响以及扬声器和麦克风的频带限制特性,很难从通过扬声器播放并由麦克风检测的声音中提取嵌入数据。在本研究中,通过计算机仿真评估了一种使用子带调幅的水印技术对背景噪声和混响的鲁棒性。研究了调幅对125个元音-辅音-元音(VCV)音节发音得分的影响。结果表明,在信噪比为10 dB的不同背景噪声条件下,混响语音信号能够以48bps的速度传输90%以上的嵌入数据,而音节识别分数仅略有下降。
{"title":"Data Hiding in Speech Sounds Using Subband Amplitude Modulation Robust against Reverberations and Background Noise","authors":"Akira Nishimura","doi":"10.1109/IIH-MSP.2006.77","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.77","url":null,"abstract":"Data hiding in audio signals can be used for transmitting auxiliary information related to the content of the audio signal. Such an application requires a greater data payload than music copyright management systems. Also, it is difficult to extract the embedded data from sounds played through a loudspeaker and detected by a microphone because of additive background noise, reflections and reverberations and the band-limited characteristics of loudspeakers and microphones. In this study, a watermarking technique using subband amplitude modulation was evaluated by computer simulation in terms of robustness against background noises and reverberations. The effects of amplitude modulation on the articulation scores of 125 vowel-consonant-vowel (VCV) syllables were also investigated. The results showed that reverberant speech signals with various background noises having a SNR of 10 dB can transmit more than 90% of embedded data at 48 bps, with only a small deterioration in the syllable identification scores.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126575329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Motion-Compensated Error Concealment Scheme for H.264 Video Transmission H.264视频传输中的运动补偿错误隐藏方案
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.18
Chun-Ting Hung, Jin-Jang Leou
For an entropy-coded video sequence, a transmission error in a codeword will not only affect the underlying codeword but may also affect subsequent codewords, resulting in a great degradation of received video frames. In this study, a motion-compensated error concealment scheme is proposed for H.264 video transmission. For H.264 inter-coded P frames, the predicted motion vector (PMV) for each corrupted block is first determined by the spatially neighboring motion vectors (MVs) around the corrupted block and the temporally motion-projected overlapping MVs in the previous frame. With the PMV being the central search point, three rood search patterns are developed for motioncompensated error concealment of small-, medium-, and large-motion corrupted blocks. Then error concealment refinement using Lagrange interpolation is performed on all the initially concealed blocks. Finally, the improved ELA (edge based line average) algorithm [11] is employed to refine each concealed block in P frames.
对于熵编码的视频序列,码字中的传输错误不仅会影响底层码字,还可能影响后续码字,导致接收到的视频帧的严重降级。在本研究中,提出了一种H.264视频传输的运动补偿错误隐藏方案。对于H.264互编码的P帧,每个损坏块的预测运动向量(PMV)首先由损坏块周围的空间相邻运动向量(mv)和前一帧中时间运动投影的重叠mv确定。以PMV为中心搜索点,针对小、中、大运动损坏块的运动补偿误差隐藏,提出了三种路径搜索模式。然后利用拉格朗日插值对所有初始隐藏块进行错误隐藏细化。最后,采用改进的ELA (edge based line average)算法[11]对P帧中的每个隐藏块进行细化。
{"title":"A Motion-Compensated Error Concealment Scheme for H.264 Video Transmission","authors":"Chun-Ting Hung, Jin-Jang Leou","doi":"10.1109/IIH-MSP.2006.18","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.18","url":null,"abstract":"For an entropy-coded video sequence, a transmission error in a codeword will not only affect the underlying codeword but may also affect subsequent codewords, resulting in a great degradation of received video frames. In this study, a motion-compensated error concealment scheme is proposed for H.264 video transmission. For H.264 inter-coded P frames, the predicted motion vector (PMV) for each corrupted block is first determined by the spatially neighboring motion vectors (MVs) around the corrupted block and the temporally motion-projected overlapping MVs in the previous frame. With the PMV being the central search point, three rood search patterns are developed for motioncompensated error concealment of small-, medium-, and large-motion corrupted blocks. Then error concealment refinement using Lagrange interpolation is performed on all the initially concealed blocks. Finally, the improved ELA (edge based line average) algorithm [11] is employed to refine each concealed block in P frames.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127201196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Anonymity on the Signatures of Knowledge 知识签名的匿名性分析
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.57
Xin-guang Zou, Shenghe Sun
The anonymity is the most important property of group signature schemes. Traditional schemes suppose that a signer is reluctant to leak his identity to a verifier. In some real scenarios, this supposition does not hold. A signer may want to cooperate with a verifier secretly to achieve special interests. So the verifier needs to identify the signer¿s signature among all the signatures he received. Among all the building blocks of group signature schemes, the Camenisch¿s signatures of knowledge are most widely used and their security is critical to group signature schemes. Unfortunately, the Simmons¿s type I subliminal channel is found in all the signatures of knowledge introduced by Camenisch in [1]. To evaluate the real security of group signature, the concept of strong anonymity is proposed and all the Camenisch¿s signature of knowledge are found unsatisfied with the requirement of strong anonymity.
匿名性是群签名方案最重要的特性。传统的方案假设签名者不愿意将自己的身份泄露给验证者。在某些实际情况下,这种假设并不成立。签名者可能希望与验证者秘密合作以获得特殊利益。因此验证者需要在签名者收到的所有签名中识别签名者的签名。在群签名方案的所有构建块中,Camenisch知识签名是应用最广泛的,其安全性对群签名方案至关重要。不幸的是,在Camenisch[1]中引入的所有知识签名中都发现了Simmons’s I型阈下通道。为了评估群签名的真实安全性,提出了强匿名的概念,并发现所有的Camenisch知识签名都不满足强匿名的要求。
{"title":"Analysis of Anonymity on the Signatures of Knowledge","authors":"Xin-guang Zou, Shenghe Sun","doi":"10.1109/IIH-MSP.2006.57","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.57","url":null,"abstract":"The anonymity is the most important property of group signature schemes. Traditional schemes suppose that a signer is reluctant to leak his identity to a verifier. In some real scenarios, this supposition does not hold. A signer may want to cooperate with a verifier secretly to achieve special interests. So the verifier needs to identify the signer¿s signature among all the signatures he received. Among all the building blocks of group signature schemes, the Camenisch¿s signatures of knowledge are most widely used and their security is critical to group signature schemes. Unfortunately, the Simmons¿s type I subliminal channel is found in all the signatures of knowledge introduced by Camenisch in [1]. To evaluate the real security of group signature, the concept of strong anonymity is proposed and all the Camenisch¿s signature of knowledge are found unsatisfied with the requirement of strong anonymity.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133907031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Watermarking Based on Singular Value Decomposition 基于奇异值分解的图像水印
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.115
Jie Liu, X. Niu, Wenhai Kong
In this paper, a new blind image watermarking algorithm is proposed based on the Singular Value Decomposition. The watermarks can be detected without the original image or any other information of the original singular values. Experiments show that the algorithm has good robustness on JPEG compression, median filtering, rescaling, and Gaussian low-pass filtering, etc.
本文提出了一种基于奇异值分解的图像盲水印算法。水印可以在没有原始图像或原始奇异值的任何其他信息的情况下检测出来。实验表明,该算法对JPEG压缩、中值滤波、重缩放、高斯低通滤波等具有良好的鲁棒性。
{"title":"Image Watermarking Based on Singular Value Decomposition","authors":"Jie Liu, X. Niu, Wenhai Kong","doi":"10.1109/IIH-MSP.2006.115","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.115","url":null,"abstract":"In this paper, a new blind image watermarking algorithm is proposed based on the Singular Value Decomposition. The watermarks can be detected without the original image or any other information of the original singular values. Experiments show that the algorithm has good robustness on JPEG compression, median filtering, rescaling, and Gaussian low-pass filtering, etc.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133229473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing 整体:用于可信视觉计算的异构轻量级传感器
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.109
D. Kundur, U. N. Okorafor, William Luh
This paper introduces a novel "HoLiSTiC" framework for visual sensor networks (VisSNs) and studies security issues within this context. The HoLiSTiC paradigm, which encompasses many existing VisSN proposals, effectively exploits heterogeneous wireless sensing and communications for more flexible, practical and scalable visual surveillance. Security aspects of HoLiSTiC are considered by highlighting open research problems. Secure routing issues in unidirectional optical free-space sensor networks that form the foundation of the HoLiSTiC transport network are discussed. In addition, a novel distributed security paradigm based on independent media sharing is presented to demonstrate how the interaction of signal processing, networking, and cryptography can benefit VisSNs.
本文介绍了一种新的视觉传感器网络(VisSNs)整体框架,并在此背景下研究了安全问题。整体模式包含了许多现有的VisSN提案,有效地利用了异构无线传感和通信,以实现更灵活、实用和可扩展的视觉监控。整体性的安全方面被认为是突出开放的研究问题。讨论了构成整体传输网络基础的单向光学自由空间传感器网络中的安全路由问题。此外,提出了一种基于独立媒体共享的新型分布式安全范式,以演示信号处理、网络和加密的交互如何使VisSNs受益。
{"title":"HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing","authors":"D. Kundur, U. N. Okorafor, William Luh","doi":"10.1109/IIH-MSP.2006.109","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.109","url":null,"abstract":"This paper introduces a novel \"HoLiSTiC\" framework for visual sensor networks (VisSNs) and studies security issues within this context. The HoLiSTiC paradigm, which encompasses many existing VisSN proposals, effectively exploits heterogeneous wireless sensing and communications for more flexible, practical and scalable visual surveillance. Security aspects of HoLiSTiC are considered by highlighting open research problems. Secure routing issues in unidirectional optical free-space sensor networks that form the foundation of the HoLiSTiC transport network are discussed. In addition, a novel distributed security paradigm based on independent media sharing is presented to demonstrate how the interaction of signal processing, networking, and cryptography can benefit VisSNs.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130928265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Context-Aware AmI System Based on MAS Model 基于MAS模型的上下文感知AmI系统
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.5
Yong Zhang, Yibin Hou, Zhangqin Huang, Hui Li, R. Chen
Ambient Intelligence (AmI) is an internationally emerging research field of IT domain. The conception of AmI and its features are discussed in this paper firstly, and we discuss an intelligent context-aware application in order to study the framework of AmI application more deeply. The fundamental model of this context-aware AmI application system based on Multi-Agent architecture is expounded particularly. Furthermore, the skeleton structure of these system agents and their collaboration mechanism would be also expounded clearly.
环境智能(AmI)是国际上IT领域新兴的研究领域。本文首先讨论了人工智能的概念及其特征,并讨论了一种智能的上下文感知应用,以便更深入地研究人工智能应用的框架。详细阐述了基于Multi-Agent架构的上下文感知AmI应用系统的基本模型。在此基础上,明确了系统主体的主体结构及其协作机制。
{"title":"A Context-Aware AmI System Based on MAS Model","authors":"Yong Zhang, Yibin Hou, Zhangqin Huang, Hui Li, R. Chen","doi":"10.1109/IIH-MSP.2006.5","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.5","url":null,"abstract":"Ambient Intelligence (AmI) is an internationally emerging research field of IT domain. The conception of AmI and its features are discussed in this paper firstly, and we discuss an intelligent context-aware application in order to study the framework of AmI application more deeply. The fundamental model of this context-aware AmI application system based on Multi-Agent architecture is expounded particularly. Furthermore, the skeleton structure of these system agents and their collaboration mechanism would be also expounded clearly.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130995217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2006 International Conference on Intelligent Information Hiding and Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1