We propose a Multi-Brain (multi bio-signal) Fusion (MBF) technology, which consists in the aggregation and analysis of brain and other biometric signals collected from a number of individuals. Often performed in the context of some common stimulus, MBF aims to facilitate rapid/enhanced collective analysis and decision making, or to assess aggregate characteristics, such as a group emotional index (GEI). The wide range of potential applications may justify an ongoing, distributed program of research into the biometric correlates of conscious and unconscious human cognitive functions (practical intelligence). An example is MBF-enabled joint analysis, which would combine cues from several intelligence analysts who are examining the same visual scene in order to rapidly highlight important features that might not be salient to any individual analyst, and which might be difficult to elicit from the group by conventional means. An experiment in presented in which a GEI is obtained by aggregating the information from two people wearing EMOTIV Epoc™ 'neuroheadsets', which collect electroencephalogram (EEG) / electromyogram (EMG) signals from 14 sensors on the scalp. As subjects watch a sequence of slides with emotion-triggering content, their decoded emotions are fused to provide a group emotional response, a collective assessment of the presented information. MBF has the potential to surpass single-brain limitations by accessing and integrating more information than can be usefully shared within even small human groups by means of speech, prosody, facial expression and other nonverbal means One may speculate that the automated aggregation of signals from multiple human brains may open a path to super-human intelligence.
{"title":"MultiMind: Multi-Brain Signal Fusion to Exceed the Power of a Single Brain","authors":"A. Stoica","doi":"10.1109/EST.2012.47","DOIUrl":"https://doi.org/10.1109/EST.2012.47","url":null,"abstract":"We propose a Multi-Brain (multi bio-signal) Fusion (MBF) technology, which consists in the aggregation and analysis of brain and other biometric signals collected from a number of individuals. Often performed in the context of some common stimulus, MBF aims to facilitate rapid/enhanced collective analysis and decision making, or to assess aggregate characteristics, such as a group emotional index (GEI). The wide range of potential applications may justify an ongoing, distributed program of research into the biometric correlates of conscious and unconscious human cognitive functions (practical intelligence). An example is MBF-enabled joint analysis, which would combine cues from several intelligence analysts who are examining the same visual scene in order to rapidly highlight important features that might not be salient to any individual analyst, and which might be difficult to elicit from the group by conventional means. An experiment in presented in which a GEI is obtained by aggregating the information from two people wearing EMOTIV Epoc™ 'neuroheadsets', which collect electroencephalogram (EEG) / electromyogram (EMG) signals from 14 sensors on the scalp. As subjects watch a sequence of slides with emotion-triggering content, their decoded emotions are fused to provide a group emotional response, a collective assessment of the presented information. MBF has the potential to surpass single-brain limitations by accessing and integrating more information than can be usefully shared within even small human groups by means of speech, prosody, facial expression and other nonverbal means One may speculate that the automated aggregation of signals from multiple human brains may open a path to super-human intelligence.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114088716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information and telecommunication infrastructures and services are key constitutive element of our society. They require not only cyber security but also an appropriate level of confidence in it. This paper explores at a societal level the main challenges, obstacles and constitutive elements that contribute to building confidence in cyber security by revisiting some fundamental concepts. The aims of this paper are to: (1) Identify some key global elements that should drive the development of information security from a long-term risk management perspective at a societal level; (2) Point out the complexities inherent in implementing security in vulnerable ICT environments; (3) Clarify the need for mastery of indicators and methodologies that contribute to identifying and operating good risk and security management practices and building confidence in these.
{"title":"Going Digital -- Rethinking Cybersecurity and Confidence in a Connected World: A Challenge for Society","authors":"S. Ghernaouti-Helie","doi":"10.1109/EST.2012.16","DOIUrl":"https://doi.org/10.1109/EST.2012.16","url":null,"abstract":"Information and telecommunication infrastructures and services are key constitutive element of our society. They require not only cyber security but also an appropriate level of confidence in it. This paper explores at a societal level the main challenges, obstacles and constitutive elements that contribute to building confidence in cyber security by revisiting some fundamental concepts. The aims of this paper are to: (1) Identify some key global elements that should drive the development of information security from a long-term risk management perspective at a societal level; (2) Point out the complexities inherent in implementing security in vulnerable ICT environments; (3) Clarify the need for mastery of indicators and methodologies that contribute to identifying and operating good risk and security management practices and building confidence in these.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121978129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Gillham, Ben McElroy, G. Howells, Stephen Kelly, S. Spurgeon, M. Pepper
Human assistive devices need to be effective with real-time assistance in real world situations: powered wheelchair users require reassuring robust support, especially in the area of collision avoidance. However, it is important that the intelligent system does not take away control from the user. The patient must be allowed to provide the intelligence in the system and the assistive technology must be engineered to be sufficiently smart to recognize and accommodate this. Robotic assistance employed in the healthcare arena must therefore emphasize positive support rather than adopting an intrusive role. Weightless Neural Networks are an excellent pattern recognition tool for real-time applications. This paper introduces a technique for look-ahead identification of open doorways and junctions. Simple sensor data in real-time is used to detect open doors with inherent data uncertainties using a technique applied to a Weightless Neural Network Architecture.
{"title":"Weightless Neural System Employing Simple Sensor Data for Efficient Real-Time Round-Corner, Junction and Doorway Detection for Autonomous System Path Planning in Smart Robotic Assisted Healthcare Wheelchairs","authors":"M. Gillham, Ben McElroy, G. Howells, Stephen Kelly, S. Spurgeon, M. Pepper","doi":"10.1109/EST.2012.21","DOIUrl":"https://doi.org/10.1109/EST.2012.21","url":null,"abstract":"Human assistive devices need to be effective with real-time assistance in real world situations: powered wheelchair users require reassuring robust support, especially in the area of collision avoidance. However, it is important that the intelligent system does not take away control from the user. The patient must be allowed to provide the intelligence in the system and the assistive technology must be engineered to be sufficiently smart to recognize and accommodate this. Robotic assistance employed in the healthcare arena must therefore emphasize positive support rather than adopting an intrusive role. Weightless Neural Networks are an excellent pattern recognition tool for real-time applications. This paper introduces a technique for look-ahead identification of open doorways and junctions. Simple sensor data in real-time is used to detect open doors with inherent data uncertainties using a technique applied to a Weightless Neural Network Architecture.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114301139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Localization is critical for various applications of Wireless Sensor Networks. This paper presents a 3D localization algorithm for high accuracy localization of a wireless sensor network, which consists of three parts: pre-localization, refinement and sequence search. It is clear that the localization accuracy partly depends on the localization sequence of the unknown nodes, which has not been investigated so far. The proposed novel algorithm aims to address this problem by searching a localization sequence corresponding to a high localization accuracy and a robust algorithm. The simulation results show that the proposed algorithm can get rid of the flip ambiguity and is more robust than several existing algorithms in terms of the localization accuracy.
{"title":"Optimization and Sequence Search Based Localization in Wireless Sensor Networks","authors":"Sen Wang, Huosheng Hu, K. Mcdonald-Maier","doi":"10.1109/EST.2012.25","DOIUrl":"https://doi.org/10.1109/EST.2012.25","url":null,"abstract":"Localization is critical for various applications of Wireless Sensor Networks. This paper presents a 3D localization algorithm for high accuracy localization of a wireless sensor network, which consists of three parts: pre-localization, refinement and sequence search. It is clear that the localization accuracy partly depends on the localization sequence of the unknown nodes, which has not been investigated so far. The proposed novel algorithm aims to address this problem by searching a localization sequence corresponding to a high localization accuracy and a robust algorithm. The simulation results show that the proposed algorithm can get rid of the flip ambiguity and is more robust than several existing algorithms in terms of the localization accuracy.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"635 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115113525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Frowd, Melanie Pitchford, F. Skelton, Anna Petkovic, C. Prosser, B. Coates
Facial composites are an investigative tool used by police to identify suspects of crime. Unfortunately, traditional methods to construct the face have rather low success rates. We have been developing a new recognition-based method called EvoFIT that requires eyewitnesses to select whole faces from arrays of alternatives. Both published laboratory research and existing police field-trials have found that EvoFIT produces images that are more identifiable than images from traditional systems. In the current paper, we present an evaluation of a more recent version of EvoFIT: in 2010, EvoFIT was deployed in 35 criminal investigations by Humberside police and these images directly led to identification of 21 suspects, equating to 60% success - quadruple the performance of the previous system used within the force. The evaluation also showed that identification of a suspect led to conviction in 29% of investigations (6 out of 21). Overall, a conviction occurred in 17% of cases involving use of an EvoFIT (6 out of 35). We also outline more recent developments which indicate that an arrest is now likely in three out of every four cases in which EvoFIT is used, and a conviction rate of one in five.
{"title":"Catching Even More Offenders with EvoFIT Facial Composites","authors":"C. Frowd, Melanie Pitchford, F. Skelton, Anna Petkovic, C. Prosser, B. Coates","doi":"10.1109/EST.2012.26","DOIUrl":"https://doi.org/10.1109/EST.2012.26","url":null,"abstract":"Facial composites are an investigative tool used by police to identify suspects of crime. Unfortunately, traditional methods to construct the face have rather low success rates. We have been developing a new recognition-based method called EvoFIT that requires eyewitnesses to select whole faces from arrays of alternatives. Both published laboratory research and existing police field-trials have found that EvoFIT produces images that are more identifiable than images from traditional systems. In the current paper, we present an evaluation of a more recent version of EvoFIT: in 2010, EvoFIT was deployed in 35 criminal investigations by Humberside police and these images directly led to identification of 21 suspects, equating to 60% success - quadruple the performance of the previous system used within the force. The evaluation also showed that identification of a suspect led to conviction in 29% of investigations (6 out of 21). Overall, a conviction occurred in 17% of cases involving use of an EvoFIT (6 out of 35). We also outline more recent developments which indicate that an arrest is now likely in three out of every four cases in which EvoFIT is used, and a conviction rate of one in five.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126036581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Wielgosz, Mauritz Panggabean, Ameen Chilwan, L. A. Rønningen
Field-programmable gate arrays (FPGAs) are widely used in telecommunication due their substantial computational power and flexibly designed architecture. These features become especially important for applications of low transmission latency such as those supported by Distributed Multimedia Plays (DMP) architecture. Thus FPGAs are chosen in this work as the core building block of the system. Complex multi-node telecommunication systems require special design methodology contrary to small ICT applications usually implemented in HDL. The methodology should be based on the appropriate tools from FPGA vendors for support and maintenance. This paper presents an architecture of a module to be embedded in all the FPGA-based nodes constituting a platform for the Real Time Internet based on DMP. It is designed using an embedded development kit natively supported by Xilinx and flexible in available cores. We present the implementation results of the network-node module and the description of PCIe-based protocol for inter-FPGA communication.
{"title":"FPGA-Based Platform for Real-Time Internet","authors":"M. Wielgosz, Mauritz Panggabean, Ameen Chilwan, L. A. Rønningen","doi":"10.1109/EST.2012.18","DOIUrl":"https://doi.org/10.1109/EST.2012.18","url":null,"abstract":"Field-programmable gate arrays (FPGAs) are widely used in telecommunication due their substantial computational power and flexibly designed architecture. These features become especially important for applications of low transmission latency such as those supported by Distributed Multimedia Plays (DMP) architecture. Thus FPGAs are chosen in this work as the core building block of the system. Complex multi-node telecommunication systems require special design methodology contrary to small ICT applications usually implemented in HDL. The methodology should be based on the appropriate tools from FPGA vendors for support and maintenance. This paper presents an architecture of a module to be embedded in all the FPGA-based nodes constituting a platform for the Real Time Internet based on DMP. It is designed using an embedded development kit natively supported by Xilinx and flexible in available cores. We present the implementation results of the network-node module and the description of PCIe-based protocol for inter-FPGA communication.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115012235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
After an earthquake or the collapse of a built structure, and facing a scenario of large destruction, the response time to search and locate trapped survivors is crucial. The human intervention of urban search and rescue (USAR) teams, including USAR dogs, has to be done cautiously so as to protect the rescue workers from further collapses. Debris may be so cluttered that prevent the close human access to the victims. Also, potential risk of further landslide requires the propping of the structures before human intervention. Rescue preparation operations may be time consuming, and a fast action to locate survivors and to take them human voices, light and/or water is a crucial factor for life. Therefore, there is the clear need for search and rescue robots that can be released immediately after a disaster in which the conditions are too dangerous and too cluttered for people and dogs to begin searching for victims. Teams of such robots should desirably be heterogeneous (e.g., aerial robots to perform scenario reconnaissance, powerful land robots to remove debris, small agile land robots to reach survivors buried under the debris), be able to perform with a given level of adjustable autonomy (as the presence of humans in the team to take crucial decisions will always be required) and be easy-to-learn and simple to launch and friendly to operate. In this paper we refer to some of the achievements in the area of USAR robots worldwide, and then focus on R&D work towards increasing the autonomy of USAR robots that has been done over the past 10 years at the Institute for Systems and Robotics of the Instituto Superior Te 'cnico, TU Lisbon, in collaboration with Portuguese companies and Civil Protection institutions, including a land tracked wheel robot and aerial robots of different types (blimp, quad copters).
{"title":"Search and Rescue Robots: The Civil Protection Teams of the Future","authors":"P. Lima","doi":"10.1109/EST.2012.40","DOIUrl":"https://doi.org/10.1109/EST.2012.40","url":null,"abstract":"After an earthquake or the collapse of a built structure, and facing a scenario of large destruction, the response time to search and locate trapped survivors is crucial. The human intervention of urban search and rescue (USAR) teams, including USAR dogs, has to be done cautiously so as to protect the rescue workers from further collapses. Debris may be so cluttered that prevent the close human access to the victims. Also, potential risk of further landslide requires the propping of the structures before human intervention. Rescue preparation operations may be time consuming, and a fast action to locate survivors and to take them human voices, light and/or water is a crucial factor for life. Therefore, there is the clear need for search and rescue robots that can be released immediately after a disaster in which the conditions are too dangerous and too cluttered for people and dogs to begin searching for victims. Teams of such robots should desirably be heterogeneous (e.g., aerial robots to perform scenario reconnaissance, powerful land robots to remove debris, small agile land robots to reach survivors buried under the debris), be able to perform with a given level of adjustable autonomy (as the presence of humans in the team to take crucial decisions will always be required) and be easy-to-learn and simple to launch and friendly to operate. In this paper we refer to some of the achievements in the area of USAR robots worldwide, and then focus on R&D work towards increasing the autonomy of USAR robots that has been done over the past 10 years at the Institute for Systems and Robotics of the Instituto Superior Te 'cnico, TU Lisbon, in collaboration with Portuguese companies and Civil Protection institutions, including a land tracked wheel robot and aerial robots of different types (blimp, quad copters).","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"15 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128186689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Kovalchuk, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells
The ICmetrics technology is based on extracting features from digital devices' operation that may be integrated together to generate unique identifiers for each of the devices or create unique profiles that describe the devices' actual behaviour. Any changes in these identifiers (profiles) during consequent devices' operation would signal about a possible safety or security breach within the electronic system. This paper explores the program counter (PC) of a processor core as a potential source for ICmetrics features and discusses several methods of feature values acquisition with the aim to achieve a maximum level of information gain with a minimal impact on a system's performance. The main finding of this study is that while isolated PC values may not always allow to generate a stable identifier (profile) for a device that would distinguish the device from the rest in the considered set, the PC sequences and frequencies in the execution flow may serve as suitable ICmetrics features, which has yet to be tested in complex scenarios.
{"title":"ICmetrics for Low Resource Embedded Systems","authors":"Y. Kovalchuk, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells","doi":"10.1109/EST.2012.23","DOIUrl":"https://doi.org/10.1109/EST.2012.23","url":null,"abstract":"The ICmetrics technology is based on extracting features from digital devices' operation that may be integrated together to generate unique identifiers for each of the devices or create unique profiles that describe the devices' actual behaviour. Any changes in these identifiers (profiles) during consequent devices' operation would signal about a possible safety or security breach within the electronic system. This paper explores the program counter (PC) of a processor core as a potential source for ICmetrics features and discusses several methods of feature values acquisition with the aim to achieve a maximum level of information gain with a minimal impact on a system's performance. The main finding of this study is that while isolated PC values may not always allow to generate a stable identifier (profile) for a device that would distinguish the device from the rest in the considered set, the PC sequences and frequencies in the execution flow may serve as suitable ICmetrics features, which has yet to be tested in complex scenarios.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128447914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this work we present a new way to analyze human facial expressions in social situations. We are able to record the smiling expressions of multiple subjects simultaneously using a wireless wearable device that records physiological signals and allows the subjects complete freedom of movement, both of head position and in their environment. We analize the correlation of facial expressions in two situations, in a conversation between two adults and between two children playing. This work shows an effective and automatic way to analize facial expressions quantitatively and continuously, without constraining the subjects. Possible applications lie in psychological analysis of humans, improvement of customer service, expression training and analysis of social interaction as well as to create a baseline of interaction that can be used in the future to fine-tune human interaction with artificial agents such as social avatars and robots.
{"title":"Analysis of Social Smile Sharing Using a Wearable Device that Captures Distal Electromyographic Signals","authors":"A. Gruebler, Kenji Suzuki","doi":"10.1109/EST.2012.38","DOIUrl":"https://doi.org/10.1109/EST.2012.38","url":null,"abstract":"In this work we present a new way to analyze human facial expressions in social situations. We are able to record the smiling expressions of multiple subjects simultaneously using a wireless wearable device that records physiological signals and allows the subjects complete freedom of movement, both of head position and in their environment. We analize the correlation of facial expressions in two situations, in a conversation between two adults and between two children playing. This work shows an effective and automatic way to analize facial expressions quantitatively and continuously, without constraining the subjects. Possible applications lie in psychological analysis of humans, improvement of customer service, expression training and analysis of social interaction as well as to create a baseline of interaction that can be used in the future to fine-tune human interaction with artificial agents such as social avatars and robots.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129181167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kotaro Yamaguchi, Masanori Kawakita, Norikazu Takahashi, J. Takeuchi
We elucidate the potential limit of single-frame super-resolution by information theory. Though various algorithms for super-resolution have been proposed, there exist only few works that evaluate the performance of super-resolution to our knowledge. Our key idea is that "single-frame super-resolution task can be regarded as channel coding in information theory." Based on this recognition, we can apply some techniques of information theory to the analysis of single-frame super-resolution. As its first step, we clarify the potential limit of single-frame super-resolution. For this purpose, we use a model of Yang et al. (2008) as a statistical model of natural images. As a result, we elucidate the condition that" arbitrary high-resolution natural image can be potentially recovered with arbitrarily small error by single-frame super-resolution." This condition depends on S/N ratio and blurring parameter. We investigate numerically whether this condition is satisfied or not for several situations.
{"title":"Information Theoretic Limit of Single-Frame Super-Resolution","authors":"Kotaro Yamaguchi, Masanori Kawakita, Norikazu Takahashi, J. Takeuchi","doi":"10.1109/EST.2012.32","DOIUrl":"https://doi.org/10.1109/EST.2012.32","url":null,"abstract":"We elucidate the potential limit of single-frame super-resolution by information theory. Though various algorithms for super-resolution have been proposed, there exist only few works that evaluate the performance of super-resolution to our knowledge. Our key idea is that \"single-frame super-resolution task can be regarded as channel coding in information theory.\" Based on this recognition, we can apply some techniques of information theory to the analysis of single-frame super-resolution. As its first step, we clarify the potential limit of single-frame super-resolution. For this purpose, we use a model of Yang et al. (2008) as a statistical model of natural images. As a result, we elucidate the condition that\" arbitrary high-resolution natural image can be potentially recovered with arbitrarily small error by single-frame super-resolution.\" This condition depends on S/N ratio and blurring parameter. We investigate numerically whether this condition is satisfied or not for several situations.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"46 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121108109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}