首页 > 最新文献

2013 Ninth International Conference on Computational Intelligence and Security最新文献

英文 中文
A Multiple Chaotic Video Encryption System Based on DM642 基于DM642的多重混沌视频加密系统
Xiangzhu Long, Jishen Li, Youjun Hu
In order to transmit the encrypted video signal on the TI Company's digital signal processor DM642, we put forward a video encrypted algorithm based on the multiple logistic mapping. It combines H. 264 coding standard and use the chaotic sequences produced by three logistic mapping to scramble and transform the quantitative data. Moreover, it ensures that different frames have different encrypted sequences. The results of the practical operation on DM642 show that the algorithm has better initial value sensitivity and larger key space and can resist exhaustive attack, differential attack, and chosen-plaintext attack effectively. It can also meet the need of real-time very well with safety guarantee.
为了在TI公司的数字信号处理器DM642上传输加密的视频信号,我们提出了一种基于多重逻辑映射的视频加密算法。它结合H. 264编码标准,利用三次逻辑映射产生的混沌序列对定量数据进行置乱和变换。并且保证了不同的帧具有不同的加密序列。在DM642上的实际运行结果表明,该算法具有更好的初值灵敏度和更大的密钥空间,能够有效抵御穷举攻击、差分攻击和选择明文攻击。它能很好地满足实时性的要求,并有安全保障。
{"title":"A Multiple Chaotic Video Encryption System Based on DM642","authors":"Xiangzhu Long, Jishen Li, Youjun Hu","doi":"10.1109/CIS.2013.66","DOIUrl":"https://doi.org/10.1109/CIS.2013.66","url":null,"abstract":"In order to transmit the encrypted video signal on the TI Company's digital signal processor DM642, we put forward a video encrypted algorithm based on the multiple logistic mapping. It combines H. 264 coding standard and use the chaotic sequences produced by three logistic mapping to scramble and transform the quantitative data. Moreover, it ensures that different frames have different encrypted sequences. The results of the practical operation on DM642 show that the algorithm has better initial value sensitivity and larger key space and can resist exhaustive attack, differential attack, and chosen-plaintext attack effectively. It can also meet the need of real-time very well with safety guarantee.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116712818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Energy-Aware Optimization Model Based on Data Placement and Task Scheduling 基于数据放置和任务调度的能量感知优化模型
Xiaoli Wang, Yuping Wang, Kun Meng
Recently, technologies on reducing energy consumption of data centers have drawn considerable attentions. One constructive way is to improve energy efficiency of servers. Aiming at this goal, we propose a new energy-aware optimization model based on the combination of data placement and task scheduling in this paper. The main contributions are: (1)The impact of servers' performance on energy consumption is explored. (2) The model guarantees 100% data locality to save network bandwidth. (3) As tasks involved in cloud computing are usually tens of thousands, in order to solve this large scale optimization model efficiently, specific-design encoding and decoding methods are introduced. Based on these, an effective evolutionary algorithm is proposed. Finally, numerical experiments are made and the results indicate the effectiveness of the proposed algorithm.
近年来,降低数据中心能耗的技术备受关注。一个建设性的方法是提高服务器的能源效率。针对这一目标,本文提出了一种新的基于数据放置和任务调度相结合的能量感知优化模型。主要贡献有:(1)探讨了服务器性能对能耗的影响。(2)该模型保证100%的数据局部性,节省网络带宽。(3)由于云计算涉及的任务通常是数万个,为了高效地求解这一大规模优化模型,引入了具体设计的编码和解码方法。在此基础上,提出了一种有效的进化算法。最后进行了数值实验,结果表明了该算法的有效性。
{"title":"An Energy-Aware Optimization Model Based on Data Placement and Task Scheduling","authors":"Xiaoli Wang, Yuping Wang, Kun Meng","doi":"10.1109/CIS.2013.17","DOIUrl":"https://doi.org/10.1109/CIS.2013.17","url":null,"abstract":"Recently, technologies on reducing energy consumption of data centers have drawn considerable attentions. One constructive way is to improve energy efficiency of servers. Aiming at this goal, we propose a new energy-aware optimization model based on the combination of data placement and task scheduling in this paper. The main contributions are: (1)The impact of servers' performance on energy consumption is explored. (2) The model guarantees 100% data locality to save network bandwidth. (3) As tasks involved in cloud computing are usually tens of thousands, in order to solve this large scale optimization model efficiently, specific-design encoding and decoding methods are introduced. Based on these, an effective evolutionary algorithm is proposed. Finally, numerical experiments are made and the results indicate the effectiveness of the proposed algorithm.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117238514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Architecture and Protocols for Robust Perceptual Hashing 鲁棒感知哈希的安全体系结构和协议
Donghui Hu, Bin Su, Shuli Zheng, Zhuang Zhang
This paper proposes a new architecture for the secure application of robust perceptual hashing. Protocols based on architecture of four parties are designed to ensure that no party can get the knowledge that may break the security of the hashing. A commutative hashing and encryption method that can generate multi-media hash on encryption domain is proposed to further resolve the privacy and security issues in the application of robust perceptual hashing.
本文提出了一种鲁棒感知哈希安全应用的新架构。基于四方架构的协议旨在确保任何一方都无法获得可能破坏散列安全性的知识。为了进一步解决鲁棒感知哈希应用中的隐私和安全问题,提出了一种可在加密域上生成多媒体哈希的交换哈希加密方法。
{"title":"Secure Architecture and Protocols for Robust Perceptual Hashing","authors":"Donghui Hu, Bin Su, Shuli Zheng, Zhuang Zhang","doi":"10.1109/CIS.2013.122","DOIUrl":"https://doi.org/10.1109/CIS.2013.122","url":null,"abstract":"This paper proposes a new architecture for the secure application of robust perceptual hashing. Protocols based on architecture of four parties are designed to ensure that no party can get the knowledge that may break the security of the hashing. A commutative hashing and encryption method that can generate multi-media hash on encryption domain is proposed to further resolve the privacy and security issues in the application of robust perceptual hashing.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126509134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Vehicle Flow Detection Algorithm Based on Motion Saliency for Traffic Surveillance System 一种基于运动显著性的交通监控流检测新算法
Renlong Pan, Xin Lin, Chenquan Huang, Lin Wang
Traffic Flow Detection plays an important role in the field of Intelligent Transportation Systems (ITS). Traffic flow detection focuses on the detection and segmentation of video object. The most existing methods need to implement complex background modeling, and accordingly increase the computing complexity and computing cost. In order to reduce the computing cost of the vehicle detection, we propose a new vehicle detection method based on saliency energy image (SEI) and saliency motion energy image (SMEI) for automatic traffic flow detection. First, we set the detecting region of objects, and computing image saliency map of the detecting region for each frame. Then saliency energy image (SEI) and saliency motion energy image (SMEI) are calculated. Finally, the vehicle flow is detected by combining the vertical projection histogram of the SEIs and the binary SMEIs within pre-set virtual detecting box. Experimental results show that our method can work in real-time with a high accuracy and robustness to noise.
交通流检测在智能交通系统中起着重要的作用。交通流检测的重点是视频对象的检测和分割。现有的方法大多需要实现复杂的背景建模,相应地增加了计算复杂度和计算成本。为了降低车辆检测的计算成本,提出了一种基于显著性能量图像(SEI)和显著性运动能量图像(SMEI)的车辆自动检测方法。首先,我们设置目标的检测区域,并计算每帧检测区域的图像显著性图。然后计算显著性能量图像(SEI)和显著性运动能量图像(SMEI)。最后,在预先设置的虚拟检测框内,结合sei的垂直投影直方图和二值smei进行车辆流量检测。实验结果表明,该方法实时性好,具有较高的精度和对噪声的鲁棒性。
{"title":"A Novel Vehicle Flow Detection Algorithm Based on Motion Saliency for Traffic Surveillance System","authors":"Renlong Pan, Xin Lin, Chenquan Huang, Lin Wang","doi":"10.1109/CIS.2013.58","DOIUrl":"https://doi.org/10.1109/CIS.2013.58","url":null,"abstract":"Traffic Flow Detection plays an important role in the field of Intelligent Transportation Systems (ITS). Traffic flow detection focuses on the detection and segmentation of video object. The most existing methods need to implement complex background modeling, and accordingly increase the computing complexity and computing cost. In order to reduce the computing cost of the vehicle detection, we propose a new vehicle detection method based on saliency energy image (SEI) and saliency motion energy image (SMEI) for automatic traffic flow detection. First, we set the detecting region of objects, and computing image saliency map of the detecting region for each frame. Then saliency energy image (SEI) and saliency motion energy image (SMEI) are calculated. Finally, the vehicle flow is detected by combining the vertical projection histogram of the SEIs and the binary SMEIs within pre-set virtual detecting box. Experimental results show that our method can work in real-time with a high accuracy and robustness to noise.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128264809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Distance Interaction Method Based on Pen 一种基于笔的远程交互方法
Wang Lei, Gao Kuo, Qiaoyong Jiang, Zou Fen
This paper presents a new interactive way to solve the problem of human-computer interaction, with a pen as the media to achieve some operations. Firstly, this paper proposes a particle filter algorithm based on immune mechanism, and extracts the user pen operations by camera video. Then extract the line of pen's motor trend pen movement trend with the least square method and judge the legality of the pen operation and calculate the operation direction of the pen. Finally, we will gain mapping relation in the change in of machine interface.
本文提出了一种新的人机交互方式,以笔为媒介实现一些操作。首先,本文提出了一种基于免疫机制的粒子滤波算法,通过摄像头视频提取用户的笔操作。然后用最小二乘法提取笔的运动趋势线,判断笔操作的合法性,计算笔的操作方向。最后,我们将得到在机器接口变化中的映射关系。
{"title":"A Distance Interaction Method Based on Pen","authors":"Wang Lei, Gao Kuo, Qiaoyong Jiang, Zou Fen","doi":"10.1109/CIS.2013.147","DOIUrl":"https://doi.org/10.1109/CIS.2013.147","url":null,"abstract":"This paper presents a new interactive way to solve the problem of human-computer interaction, with a pen as the media to achieve some operations. Firstly, this paper proposes a particle filter algorithm based on immune mechanism, and extracts the user pen operations by camera video. Then extract the line of pen's motor trend pen movement trend with the least square method and judge the legality of the pen operation and calculate the operation direction of the pen. Finally, we will gain mapping relation in the change in of machine interface.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121337954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Credit Scoring Model Based on Collaborative Filtering 基于协同过滤的信用评分模型
Xin Zheng
To ensure property safety, risk assessment plays an essential role in modern society. Credit scoring, which is a significant branch of exposure rating, becomes a hot topic. As a result, various kinds of credit scoring models are established to evaluate the customers' credit rank. In this paper, a simple credit scoring model, Collaborative Filtering based on Matrix Factorization with data whose continuous attributes are discretized considering Information Entropy (CF-MF-D-IE), is constructed to solve credit scoring issues. The proposed model is tested on two important credit data sets in UCI Repository of Machine Learning databases. Compared with Collaborative Filtering using non-discretized data and Support Vector Machines with discretized data, CF-MF-D-IE has better classification accuracy rate.
为了确保财产安全,风险评估在现代社会中起着至关重要的作用。信用评分作为风险敞口评级的一个重要分支,成为人们关注的热点。因此,建立了各种信用评分模型来评价客户的信用等级。本文构造了一种简单的信用评分模型——基于矩阵分解的协同过滤模型,该模型考虑信息熵对连续属性进行离散化(CF-MF-D-IE)。在机器学习数据库UCI Repository中的两个重要信用数据集上对该模型进行了测试。CF-MF-D-IE分类准确率优于非离散数据协同过滤和离散数据支持向量机协同过滤。
{"title":"A Credit Scoring Model Based on Collaborative Filtering","authors":"Xin Zheng","doi":"10.1109/CIS.2013.37","DOIUrl":"https://doi.org/10.1109/CIS.2013.37","url":null,"abstract":"To ensure property safety, risk assessment plays an essential role in modern society. Credit scoring, which is a significant branch of exposure rating, becomes a hot topic. As a result, various kinds of credit scoring models are established to evaluate the customers' credit rank. In this paper, a simple credit scoring model, Collaborative Filtering based on Matrix Factorization with data whose continuous attributes are discretized considering Information Entropy (CF-MF-D-IE), is constructed to solve credit scoring issues. The proposed model is tested on two important credit data sets in UCI Repository of Machine Learning databases. Compared with Collaborative Filtering using non-discretized data and Support Vector Machines with discretized data, CF-MF-D-IE has better classification accuracy rate.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132197791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Extracting System Logged-In Password Forensically from Windows Memory Image File 从Windows内存映像文件中取证提取系统登录密码的研究
Lijuan Xu, Lianhai Wang
Forensics analysis of physical memory is a key point in computer living forensics. Most of the research carried out focusing on enumerating processes and threads by accessing memory resident objects. However, collecting case sensitive information from the extracted memory content is import and difficult in computer forensics. Password plaintext is one of the most concerning sensitive information to an investigator. The traditional methods to extract system logged in password plaintext mainly rely on cracker tools, whose success rate depend on the password complexity. The important contribution of the paper is a new technique for extracting system logged-in password plaintext from physical memory. It allows extracting arbitrary length system logged-in password plaintext. The proposed method can extract system logged-in password plaintext of Windows XP and Windows 7.
物理内存取证分析是计算机活体取证的一个关键环节。大多数研究都集中在通过访问内存驻留对象来枚举进程和线程。然而,在计算机取证中,从提取的内存内容中收集区分大小写的信息是一个重要且困难的问题。密码明文是调查人员最关心的敏感信息之一。传统的系统登录密码明文提取方法主要依靠破解工具,破解工具的成功率与密码复杂度有关。本文的重要贡献在于提出了一种从物理内存中提取系统登录密码明文的新技术。它允许提取任意长度的系统登录密码明文。该方法可以提取Windows XP和Windows 7的系统登录密码明文。
{"title":"Research on Extracting System Logged-In Password Forensically from Windows Memory Image File","authors":"Lijuan Xu, Lianhai Wang","doi":"10.1109/CIS.2013.156","DOIUrl":"https://doi.org/10.1109/CIS.2013.156","url":null,"abstract":"Forensics analysis of physical memory is a key point in computer living forensics. Most of the research carried out focusing on enumerating processes and threads by accessing memory resident objects. However, collecting case sensitive information from the extracted memory content is import and difficult in computer forensics. Password plaintext is one of the most concerning sensitive information to an investigator. The traditional methods to extract system logged in password plaintext mainly rely on cracker tools, whose success rate depend on the password complexity. The important contribution of the paper is a new technique for extracting system logged-in password plaintext from physical memory. It allows extracting arbitrary length system logged-in password plaintext. The proposed method can extract system logged-in password plaintext of Windows XP and Windows 7.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132715235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Glowworm Swarm Optimization Algorithm for Solving Multi-objective Optimization Problem 求解多目标优化问题的萤火虫群算法
He Deng-xu, Liu Gui-qing, Zhu Hua-zheng
The glowworm swarm optimization algorithm is used to solve multi-objective optimization problem (MOP-GSO). It is shown by simulation that, MOP-GSO algorithm is effective to solve multi-objective optimization. Compared with NSGA2, it is better in term of the spread of the solutions.
采用萤火虫群优化算法求解多目标优化问题。仿真结果表明,MOP-GSO算法是解决多目标优化问题的有效方法。与NSGA2相比,溶液的扩散效果更好。
{"title":"Glowworm Swarm Optimization Algorithm for Solving Multi-objective Optimization Problem","authors":"He Deng-xu, Liu Gui-qing, Zhu Hua-zheng","doi":"10.1109/CIS.2013.10","DOIUrl":"https://doi.org/10.1109/CIS.2013.10","url":null,"abstract":"The glowworm swarm optimization algorithm is used to solve multi-objective optimization problem (MOP-GSO). It is shown by simulation that, MOP-GSO algorithm is effective to solve multi-objective optimization. Compared with NSGA2, it is better in term of the spread of the solutions.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116347251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Multiple Metrics Gateway Selection Algorithm for Vehicular Ad Hoc Networks in Fading Channels 衰落信道下车载自组网的多指标网关选择算法
Kelei Chen, Lijia Chen, Junyong Mao, Dong Zhao
Vehicular ad hoc network (VANET) is a type of promising application deployed along a road for communication, safety and emergency information delivery, data collection, and entertainment. The network efficiency and stability are of great concern. We devote to achieve the communication quality by appropriate gateways. The channel randomness is taken into account in the wireless network, because it can affect the stability of the communication link. We model the wireless channels to analyze the VANET efficiency, then propose an efficient gateway selection mechanism based on multiple metrics: correctly decoded probability, network delay and relative velocity. These metrics are calculated by the Simple Additive Weighting (SAW) technique to choose the optimum gateway nodes. Simulation results show that our scheme can improve the quality of the VANET-3G network by analysis and compare.
车辆自组织网络(VANET)是一种部署在道路上的有前途的应用,用于通信、安全和应急信息传递、数据收集和娱乐。网络的效率和稳定性是人们非常关注的问题。我们致力于通过合适的网关实现通信质量。无线网络中要考虑信道随机性,因为它会影响通信链路的稳定性。通过对无线信道进行建模来分析VANET的效率,提出了一种基于正确解码概率、网络延迟和相对速度等多个指标的高效网关选择机制。这些指标通过简单相加加权(SAW)技术计算,以选择最佳网关节点。仿真结果表明,通过分析和比较,我们的方案可以提高VANET-3G网络的质量。
{"title":"A Multiple Metrics Gateway Selection Algorithm for Vehicular Ad Hoc Networks in Fading Channels","authors":"Kelei Chen, Lijia Chen, Junyong Mao, Dong Zhao","doi":"10.1109/CIS.2013.142","DOIUrl":"https://doi.org/10.1109/CIS.2013.142","url":null,"abstract":"Vehicular ad hoc network (VANET) is a type of promising application deployed along a road for communication, safety and emergency information delivery, data collection, and entertainment. The network efficiency and stability are of great concern. We devote to achieve the communication quality by appropriate gateways. The channel randomness is taken into account in the wireless network, because it can affect the stability of the communication link. We model the wireless channels to analyze the VANET efficiency, then propose an efficient gateway selection mechanism based on multiple metrics: correctly decoded probability, network delay and relative velocity. These metrics are calculated by the Simple Additive Weighting (SAW) technique to choose the optimum gateway nodes. Simulation results show that our scheme can improve the quality of the VANET-3G network by analysis and compare.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114818232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved Criminisi Algorithm Based on a New Priority Function with the Gray Entropy 基于新的灰色熵优先级函数的改进犯罪识别算法
Xiang-yan Xi, F. Wang, Yefei Liu
In the image inpainting process, the data term of the Criminisi algorithm depends on the shape of the manually selected target region and the confidence drops to zero rapidly, resulting in in painting sequence deviation which finally influence the in paint effect. Then we introduce the entropy to improve the data term, in this way another priority function will be defined. Experiments confirm that the improved algorithm can eliminate the dependence on the shape of the target region and the confidence will not drop to zero rapidly again. Experiments show that the algorithm will repair the image with pure texture, strong edges and purely synthetic images better.
在图像补绘过程中,Criminisi算法的数据项依赖于人工选择的目标区域的形状,置信度迅速降至零,导致补绘序列偏差,最终影响补绘效果。然后我们引入熵来改进数据项,这样就定义了另一个优先级函数。实验证明,改进后的算法能够消除对目标区域形状的依赖,置信度不会再次快速降为零。实验表明,该算法对纯纹理、强边缘和纯合成图像的修复效果较好。
{"title":"Improved Criminisi Algorithm Based on a New Priority Function with the Gray Entropy","authors":"Xiang-yan Xi, F. Wang, Yefei Liu","doi":"10.1109/CIS.2013.52","DOIUrl":"https://doi.org/10.1109/CIS.2013.52","url":null,"abstract":"In the image inpainting process, the data term of the Criminisi algorithm depends on the shape of the manually selected target region and the confidence drops to zero rapidly, resulting in in painting sequence deviation which finally influence the in paint effect. Then we introduce the entropy to improve the data term, in this way another priority function will be defined. Experiments confirm that the improved algorithm can eliminate the dependence on the shape of the target region and the confidence will not drop to zero rapidly again. Experiments show that the algorithm will repair the image with pure texture, strong edges and purely synthetic images better.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134428181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2013 Ninth International Conference on Computational Intelligence and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1