首页 > 最新文献

2020 International Conference on Communication and Signal Processing (ICCSP)最新文献

英文 中文
Systematic Linear Word String Recognition and Evaluation Technique
Pub Date : 2020-07-01 DOI: 10.1109/ICCSP48568.2020.9182044
Konjengbam Dollar Singh, Syed Thouheed Ahmed
As a proverb goes, “A Picture speaks more than a word”. The influence of a picture on any given information is predominant and has extra mileage in representing the information. In this paper, a linear model of word recognition is proposed using the image datasets. The proposed model is evaluated on primary datasets of UCL repository, the results are processed using MATLAB and the recognition ratio is effective compared to the previous approaches. Typically, the proposed technique is an optimized solution for word string extraction from a given image data-samples.
正如一句谚语所说,“一幅画胜过一个词”。图片对任何给定信息的影响是主要的,并且在表示信息方面具有额外的里程。本文提出了一种基于图像数据集的词识别线性模型。在UCL知识库的原始数据集上对该模型进行了评估,并利用MATLAB对结果进行了处理,结果表明,该模型的识别率与之前的方法相比是有效的。通常,所提出的技术是从给定图像数据样本中提取字串的优化解决方案。
{"title":"Systematic Linear Word String Recognition and Evaluation Technique","authors":"Konjengbam Dollar Singh, Syed Thouheed Ahmed","doi":"10.1109/ICCSP48568.2020.9182044","DOIUrl":"https://doi.org/10.1109/ICCSP48568.2020.9182044","url":null,"abstract":"As a proverb goes, “A Picture speaks more than a word”. The influence of a picture on any given information is predominant and has extra mileage in representing the information. In this paper, a linear model of word recognition is proposed using the image datasets. The proposed model is evaluated on primary datasets of UCL repository, the results are processed using MATLAB and the recognition ratio is effective compared to the previous approaches. Typically, the proposed technique is an optimized solution for word string extraction from a given image data-samples.","PeriodicalId":321133,"journal":{"name":"2020 International Conference on Communication and Signal Processing (ICCSP)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128563577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Synthetic Video Dataset Generation Toolbox for Surveillance Video Synopsis Applications 用于监控视频摘要应用的合成视频数据集生成工具箱
Pub Date : 2020-07-01 DOI: 10.1109/ICCSP48568.2020.9182084
K. Namitha, A. Narayanan, M. Geetha
Video synopsis technique aims to condense long duration videos into its compact representation for efficient browsing and retrieval of surveillance videos. The synopsis videos depend on the results of object detection and tracking in input video. However, there is a lack of publicly available commonly used datasets that are properly annotated for training trackers and analyzing the performance of various approaches in video synopsis. This paper introduces an interactive toolbox that allows users to generate synthetic videos with user-defined parameters and related tube information, eliminating the steps of detection and tracking. The proposed toolbox enables users to simulate general and specific scenarios of interest, which are expected to be observed in surveillance videos. We present experiments that show the usability and effectiveness of using this toolbox in evaluating different video synopsis methods.
视频摘要技术的目的是将长时间的视频压缩成紧凑的表示形式,以实现监控视频的高效浏览和检索。摘要视频依赖于输入视频中目标检测和跟踪的结果。然而,缺乏公开可用的常用数据集,这些数据集被适当地注释用于训练跟踪器和分析视频摘要中各种方法的性能。本文介绍了一个交互式工具箱,允许用户生成具有用户自定义参数和相关管信息的合成视频,消除了检测和跟踪的步骤。提出的工具箱使用户能够模拟一般和特定的感兴趣的场景,这些场景预计将在监控视频中观察到。我们提出的实验表明,使用该工具箱在评估不同的视频摘要方法的可用性和有效性。
{"title":"A Synthetic Video Dataset Generation Toolbox for Surveillance Video Synopsis Applications","authors":"K. Namitha, A. Narayanan, M. Geetha","doi":"10.1109/ICCSP48568.2020.9182084","DOIUrl":"https://doi.org/10.1109/ICCSP48568.2020.9182084","url":null,"abstract":"Video synopsis technique aims to condense long duration videos into its compact representation for efficient browsing and retrieval of surveillance videos. The synopsis videos depend on the results of object detection and tracking in input video. However, there is a lack of publicly available commonly used datasets that are properly annotated for training trackers and analyzing the performance of various approaches in video synopsis. This paper introduces an interactive toolbox that allows users to generate synthetic videos with user-defined parameters and related tube information, eliminating the steps of detection and tracking. The proposed toolbox enables users to simulate general and specific scenarios of interest, which are expected to be observed in surveillance videos. We present experiments that show the usability and effectiveness of using this toolbox in evaluating different video synopsis methods.","PeriodicalId":321133,"journal":{"name":"2020 International Conference on Communication and Signal Processing (ICCSP)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128617603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Restoration of Paintings 绘画修复研究综述
Pub Date : 2020-07-01 DOI: 10.1109/ICCSP48568.2020.9182422
V. R. Mol, P. Maheswari
Images in the true world are subjected to numerous forms of modification during its capture, acquisition, storage, transmission and reproduction. Images are everywhere in our daily life, not only because they are extensively used as a channel for communication but also they are one of the best way to represent the physical world. Digital image is a numeric description, usually binary representation of a two dimensional image. Digital Image Processing is the process which uses computer algorithms to process digital image. One of the most interesting areas in image processing is to enhance the pictorial information for human interpretation. The main aim of image restoration is to reconstruct the original image from a deteriorated image. A lot of researches are being carried out on image restoration. This paper mainly focuses on different techniques used for digital restoration of paintings and various parameters used for evaluation.
真实世界中的图像在其捕捉、获取、存储、传播和复制过程中,经历了多种形式的修改。图像在我们的日常生活中无处不在,不仅因为它们被广泛用作交流的渠道,而且它们是表征物理世界的最佳方式之一。数字图像是一种数字描述,通常是二维图像的二进制表示。数字图像处理是利用计算机算法对数字图像进行处理的过程。图像处理中最有趣的领域之一是增强图像信息以供人类解释。图像恢复的主要目的是从退化的图像中重建原始图像。人们对图像恢复进行了大量的研究。本文主要介绍了用于绘画数字修复的各种技术以及用于评估的各种参数。
{"title":"A Survey on Restoration of Paintings","authors":"V. R. Mol, P. Maheswari","doi":"10.1109/ICCSP48568.2020.9182422","DOIUrl":"https://doi.org/10.1109/ICCSP48568.2020.9182422","url":null,"abstract":"Images in the true world are subjected to numerous forms of modification during its capture, acquisition, storage, transmission and reproduction. Images are everywhere in our daily life, not only because they are extensively used as a channel for communication but also they are one of the best way to represent the physical world. Digital image is a numeric description, usually binary representation of a two dimensional image. Digital Image Processing is the process which uses computer algorithms to process digital image. One of the most interesting areas in image processing is to enhance the pictorial information for human interpretation. The main aim of image restoration is to reconstruct the original image from a deteriorated image. A lot of researches are being carried out on image restoration. This paper mainly focuses on different techniques used for digital restoration of paintings and various parameters used for evaluation.","PeriodicalId":321133,"journal":{"name":"2020 International Conference on Communication and Signal Processing (ICCSP)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124782882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Short Survey: Applications of Artificial Intelligence in Massive MIMO 简短调查:人工智能在大规模多输入多输出中的应用
Pub Date : 2020-07-01 DOI: 10.1109/ICCSP48568.2020.9182203
B. Rajarajeswarie, R. Sandanalakshmi
The current mobile infrastructure faces an exponential growth in mobile traffic volumes which causes a demand on high data rate and low latency. Hence massive MIMO is one of the most promising technology of fifth Generation (5G) wireless communication systems due to its high data rate and system throughput. In this technology the major challenges are high computational complexity and great difficulties in the exploitation of the multiple antenna systems. Hence, this survey paper focuses on the issues on the Massive MIMO system in 5G wireless systems and the use of intelligence to resolve the challenges to improve the user experience and to utilize the radio resources in an effective way. Therefore, this paper provides a short survey that provides an overview of the implementation Artificial Intelligence in 5G wireless systems for solving various challenges in the Massive MIMO system.
当前的移动基础设施面临着移动通信量的指数级增长,这导致了对高数据速率和低延迟的需求。因此,大规模多输入多输出(MIMO)因其高数据速率和系统吞吐量而成为第五代(5G)无线通信系统中最有前途的技术之一。这项技术面临的主要挑战是计算复杂度高和利用多天线系统的巨大困难。因此,本调查报告重点关注 5G 无线系统中的 Massive MIMO 系统问题,以及如何利用智能来解决这些挑战,从而改善用户体验并有效利用无线电资源。因此,本文提供了一份简短的调查报告,概述了人工智能在 5G 无线系统中的应用,以解决 Massive MIMO 系统中的各种挑战。
{"title":"A Short Survey: Applications of Artificial Intelligence in Massive MIMO","authors":"B. Rajarajeswarie, R. Sandanalakshmi","doi":"10.1109/ICCSP48568.2020.9182203","DOIUrl":"https://doi.org/10.1109/ICCSP48568.2020.9182203","url":null,"abstract":"The current mobile infrastructure faces an exponential growth in mobile traffic volumes which causes a demand on high data rate and low latency. Hence massive MIMO is one of the most promising technology of fifth Generation (5G) wireless communication systems due to its high data rate and system throughput. In this technology the major challenges are high computational complexity and great difficulties in the exploitation of the multiple antenna systems. Hence, this survey paper focuses on the issues on the Massive MIMO system in 5G wireless systems and the use of intelligence to resolve the challenges to improve the user experience and to utilize the radio resources in an effective way. Therefore, this paper provides a short survey that provides an overview of the implementation Artificial Intelligence in 5G wireless systems for solving various challenges in the Massive MIMO system.","PeriodicalId":321133,"journal":{"name":"2020 International Conference on Communication and Signal Processing (ICCSP)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126915801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic Seizure Classification using CNN 使用CNN的自动癫痫分类
Pub Date : 2020-07-01 DOI: 10.1109/ICCSP48568.2020.9182338
P. Yaswanth, Pranav A, R. Minu
In our world around one-third of people are suffering from seizures and these people must have a continuous optimal medication process. Now a day’s systems are developed with an algorithm for the detection of a seizure by using EEG data, sensors, and video/audio captures. But it still unclear what combination of technologies will give the best output of detection.
在我们的世界里,大约有三分之一的人患有癫痫发作,这些人必须有一个持续的最佳药物治疗过程。现在,每天的系统都采用一种算法,通过使用脑电图数据、传感器和视频/音频捕获来检测癫痫发作。但目前尚不清楚哪种技术组合将提供最佳的检测输出。
{"title":"Automatic Seizure Classification using CNN","authors":"P. Yaswanth, Pranav A, R. Minu","doi":"10.1109/ICCSP48568.2020.9182338","DOIUrl":"https://doi.org/10.1109/ICCSP48568.2020.9182338","url":null,"abstract":"In our world around one-third of people are suffering from seizures and these people must have a continuous optimal medication process. Now a day’s systems are developed with an algorithm for the detection of a seizure by using EEG data, sensors, and video/audio captures. But it still unclear what combination of technologies will give the best output of detection.","PeriodicalId":321133,"journal":{"name":"2020 International Conference on Communication and Signal Processing (ICCSP)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127024924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Mechanisms for Network Anomaly Detection System: A Review 网络异常检测系统的机器学习机制综述
Pub Date : 2020-07-01 DOI: 10.1109/ICCSP48568.2020.9182197
Sweety Singh, Subhasish Banerjee
Network Anomaly Detection Systems (NADS) has a great importance in Network Defense System for detecting potential or critical threats. Numerous Organization have actualized, Intrusion Detection System (IDS) as a security segment, and introduced the various mechanism to recognize the effect of the system assaults. However, Machine Learning methods are widely used in IDS to detect the various attacks. In this context, network traffic dataset plays very important role. Hence, IDS uses those datasets to learn about normal and anomalous activities. Whereas the labelled datasets are used for training phase. As appropriate selection of Machine Learning methods gives the better result, therefore, a comparative study about few machine learning methods have been used in this article using NSL-KDD dataset for the analysis purpose. Finally, the simulated results have been compared by implementing of Naïve Bayes classifier (NB), Support Vector Machine (SVM) and Decision Tree classifier on NSL-KDD dataset. Recursive Feature Elimination (RFE) and Principal Component Analysis (PCA) have been used for selecting the appropriate features among all features present in the dataset to improve the accuracy and processing speed of the IDS.
网络异常检测系统(NADS)在网络防御系统中具有重要的作用,用于检测潜在的或严重的威胁。许多组织已经将入侵检测系统(IDS)作为一个安全系统,并引入了各种机制来识别系统攻击的影响。然而,机器学习方法在IDS中被广泛用于检测各种攻击。在这种情况下,网络流量数据集起着非常重要的作用。因此,IDS使用这些数据集来了解正常和异常活动。而标记的数据集用于训练阶段。由于适当选择机器学习方法可以获得更好的结果,因此,本文使用NSL-KDD数据集对几种机器学习方法进行了比较研究。最后,通过在NSL-KDD数据集上实现Naïve贝叶斯分类器(NB)、支持向量机(SVM)和决策树分类器,对仿真结果进行了比较。利用递归特征消除(RFE)和主成分分析(PCA)从数据集中存在的所有特征中选择合适的特征,以提高IDS的精度和处理速度。
{"title":"Machine Learning Mechanisms for Network Anomaly Detection System: A Review","authors":"Sweety Singh, Subhasish Banerjee","doi":"10.1109/ICCSP48568.2020.9182197","DOIUrl":"https://doi.org/10.1109/ICCSP48568.2020.9182197","url":null,"abstract":"Network Anomaly Detection Systems (NADS) has a great importance in Network Defense System for detecting potential or critical threats. Numerous Organization have actualized, Intrusion Detection System (IDS) as a security segment, and introduced the various mechanism to recognize the effect of the system assaults. However, Machine Learning methods are widely used in IDS to detect the various attacks. In this context, network traffic dataset plays very important role. Hence, IDS uses those datasets to learn about normal and anomalous activities. Whereas the labelled datasets are used for training phase. As appropriate selection of Machine Learning methods gives the better result, therefore, a comparative study about few machine learning methods have been used in this article using NSL-KDD dataset for the analysis purpose. Finally, the simulated results have been compared by implementing of Naïve Bayes classifier (NB), Support Vector Machine (SVM) and Decision Tree classifier on NSL-KDD dataset. Recursive Feature Elimination (RFE) and Principal Component Analysis (PCA) have been used for selecting the appropriate features among all features present in the dataset to improve the accuracy and processing speed of the IDS.","PeriodicalId":321133,"journal":{"name":"2020 International Conference on Communication and Signal Processing (ICCSP)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129028711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Power Amplifier Linearization using Hybrid Optimization Techniques 基于混合优化技术的功率放大器线性化
Pub Date : 2020-07-01 DOI: 10.1109/ICCSP48568.2020.9182331
Dinna Davis, R. Dipin Krishnan
The Power amplifier is an indispensable component for the transmitter. Unfortunately, it is nonlinear, when the PA operates around its region of high power efficiency. The functioning of PA is needed to be at its saturation level,for the purpose of getting good energy-efficiency, which generates nonlinear outputs as their outcomes. HPAs are habitually deformed and however shows a tendency to produce the nonlinear outputs, thereby saturation level is forlorn failed to achieved. A new approach is used here in order to rectify the issues due to the non-linear effects in power amplifier operation. Linearization of power amplifier using predistortion technique is our new method. Linearization enables the PA to generate more output power and to operate at a higher efficiency level for the given input. Linearization is a systematic procedure that can be used to reduce the amplifier distortion. A pre-distorter is aptly designed and inserted in front of the PA, to oppose the non-linearization in PA. To model the PA Wiener model is considered and the Hammerstein model is considered to built pre-distorter. To solve the existing problems in the predistorter of power amplifier optimization algorithms such as ABC and PSO are used. Using MATLAB the new approach is simulated and the outputs achieved are analyzed.
功率放大器是发射机不可缺少的部件。不幸的是,当PA在其高功率效率区域附近工作时,它是非线性的。为了获得良好的能量效率,需要PA的功能处于饱和状态,这将产生非线性输出作为其结果。hpa是习惯性变形的,然而显示出产生非线性输出的趋势,因此,饱和水平是不可避免的。本文采用了一种新的方法来纠正由于功率放大器工作中的非线性效应而引起的问题。利用预失真技术对功率放大器进行线性化是我们的新方法。线性化使PA能够产生更多的输出功率,并在给定的输入下以更高的效率水平工作。线性化是一个系统的过程,可以用来减少放大器失真。在放大器前适当地设计和插入预失真器,以防止放大器的非线性化。采用Wiener模型和Hammerstein模型建立预失真器。为了解决功率放大器预失真器中存在的问题,采用了优化算法ABC和粒子群算法。利用MATLAB对该方法进行了仿真,并对所实现的输出进行了分析。
{"title":"Power Amplifier Linearization using Hybrid Optimization Techniques","authors":"Dinna Davis, R. Dipin Krishnan","doi":"10.1109/ICCSP48568.2020.9182331","DOIUrl":"https://doi.org/10.1109/ICCSP48568.2020.9182331","url":null,"abstract":"The Power amplifier is an indispensable component for the transmitter. Unfortunately, it is nonlinear, when the PA operates around its region of high power efficiency. The functioning of PA is needed to be at its saturation level,for the purpose of getting good energy-efficiency, which generates nonlinear outputs as their outcomes. HPAs are habitually deformed and however shows a tendency to produce the nonlinear outputs, thereby saturation level is forlorn failed to achieved. A new approach is used here in order to rectify the issues due to the non-linear effects in power amplifier operation. Linearization of power amplifier using predistortion technique is our new method. Linearization enables the PA to generate more output power and to operate at a higher efficiency level for the given input. Linearization is a systematic procedure that can be used to reduce the amplifier distortion. A pre-distorter is aptly designed and inserted in front of the PA, to oppose the non-linearization in PA. To model the PA Wiener model is considered and the Hammerstein model is considered to built pre-distorter. To solve the existing problems in the predistorter of power amplifier optimization algorithms such as ABC and PSO are used. Using MATLAB the new approach is simulated and the outputs achieved are analyzed.","PeriodicalId":321133,"journal":{"name":"2020 International Conference on Communication and Signal Processing (ICCSP)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121340601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Security Enhancement using DCT & DWT Watermarking Technique 利用DCT和DWT水印技术增强图像安全性
Pub Date : 2020-07-01 DOI: 10.1109/ICCSP48568.2020.9182052
Hilkiya Joseph, Bindhu K. Rajan
The success of internet technology transform the world of technology and fashioned our life such a lot easier. The matter of duplication and unauthorized use of information become a great threat within the field of technology. To beat these problems, techniques like digital watermarking, steganography and cryptography were introduced. The approach of embedding a secret data associated with the digital signal inside the signal itself is digital watermarking. For embedding and detecting the watermark different techniques are used; spatial domain techniques like Least Significant Bit (LSB) and Patch Work Algorithm, then the frequency domain techniques such as Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Discrete Fourier Transform (DFT) are some of them. Combination of DCT & DWT technique for digital watermarking is proposed here. The proposed methodology is implemented in MATLAB 2017a simulator and result is analysed using evaluation parameters like Peak Signal to Noise Ratio (PSNR) & Mean Square Error (MSE). PSNR value obtained for the case of watermarking using DWT is 27.46 and MSE value is 17.45. The value of PSNR for watermarking using DCT is 41.4 and for MSE the value is 0.67. The PSNR and MSE values obtained for watermarking using LSB technique is 50.55 and 0.58. The proposed method improves the watermarked image quality and the MSE & PSNR value obtained is 0.52 and 51.017 respectively.
互联网技术的成功改变了技术世界,使我们的生活变得更加轻松。重复和未经授权使用信息的问题成为技术领域的一大威胁。为了解决这些问题,引入了数字水印、隐写术和密码学等技术。将与数字信号相关联的秘密数据嵌入信号本身的方法就是数字水印。水印的嵌入和检测采用了不同的技术;空域技术如最小有效位(LSB)和Patch Work算法,然后频域技术如离散余弦变换(DCT),离散小波变换(DWT)和离散傅立叶变换(DFT)是其中的一些。本文提出了DCT和DWT相结合的数字水印技术。提出的方法在MATLAB 2017a模拟器中实现,并使用峰值信噪比(PSNR)和均方误差(MSE)等评估参数对结果进行分析。采用DWT进行水印的情况下,得到的PSNR值为27.46,MSE值为17.45。DCT水印的PSNR为41.4,MSE为0.67。利用LSB技术进行水印得到的PSNR和MSE分别为50.55和0.58。该方法提高了水印图像的质量,得到的MSE和PSNR分别为0.52和51.017。
{"title":"Image Security Enhancement using DCT & DWT Watermarking Technique","authors":"Hilkiya Joseph, Bindhu K. Rajan","doi":"10.1109/ICCSP48568.2020.9182052","DOIUrl":"https://doi.org/10.1109/ICCSP48568.2020.9182052","url":null,"abstract":"The success of internet technology transform the world of technology and fashioned our life such a lot easier. The matter of duplication and unauthorized use of information become a great threat within the field of technology. To beat these problems, techniques like digital watermarking, steganography and cryptography were introduced. The approach of embedding a secret data associated with the digital signal inside the signal itself is digital watermarking. For embedding and detecting the watermark different techniques are used; spatial domain techniques like Least Significant Bit (LSB) and Patch Work Algorithm, then the frequency domain techniques such as Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Discrete Fourier Transform (DFT) are some of them. Combination of DCT & DWT technique for digital watermarking is proposed here. The proposed methodology is implemented in MATLAB 2017a simulator and result is analysed using evaluation parameters like Peak Signal to Noise Ratio (PSNR) & Mean Square Error (MSE). PSNR value obtained for the case of watermarking using DWT is 27.46 and MSE value is 17.45. The value of PSNR for watermarking using DCT is 41.4 and for MSE the value is 0.67. The PSNR and MSE values obtained for watermarking using LSB technique is 50.55 and 0.58. The proposed method improves the watermarked image quality and the MSE & PSNR value obtained is 0.52 and 51.017 respectively.","PeriodicalId":321133,"journal":{"name":"2020 International Conference on Communication and Signal Processing (ICCSP)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128080087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Diagonal Hamming Based Multi-Bit Error Detection and Correction Technique for Memories 基于对角汉明的存储器多比特错误检测与校正技术
Pub Date : 2020-07-01 DOI: 10.1109/ICCSP48568.2020.9182249
G. M. Sai, K. Avinash, L. S. G. Naidu, M. Rohith, M. Vinodhini
Temporary errors which are classified under soft errors are created because of fluctuations in the voltage or external radiations. These errors are very common and obvious in memories. In this paper, Diagonal Hamming based multi-bit error detection and correction technique is proposed to identify errors to an extent of 8-bit. Rectification of 1, 2, 3, 4, 5 bit errors are possible. Few combinations of 6 and 7 random bit errors and burst errors of 8 bit are correctable. By using this method, high code rate is achieved with less area and delay when in contrast to various techniques.
由于电压波动或外部辐射而产生的临时误差被归为软误差。这些错误在记忆中是非常常见和明显的。本文提出了一种基于对角汉明的多比特误码检测与纠错技术,可识别8位以内的错误。纠正1、2、3、4、5位错误是可能的。6位和7位随机错误和8位突发错误的组合很少是可纠正的。与其他技术相比,该方法可以在较小的面积和延迟下获得较高的码率。
{"title":"Diagonal Hamming Based Multi-Bit Error Detection and Correction Technique for Memories","authors":"G. M. Sai, K. Avinash, L. S. G. Naidu, M. Rohith, M. Vinodhini","doi":"10.1109/ICCSP48568.2020.9182249","DOIUrl":"https://doi.org/10.1109/ICCSP48568.2020.9182249","url":null,"abstract":"Temporary errors which are classified under soft errors are created because of fluctuations in the voltage or external radiations. These errors are very common and obvious in memories. In this paper, Diagonal Hamming based multi-bit error detection and correction technique is proposed to identify errors to an extent of 8-bit. Rectification of 1, 2, 3, 4, 5 bit errors are possible. Few combinations of 6 and 7 random bit errors and burst errors of 8 bit are correctable. By using this method, high code rate is achieved with less area and delay when in contrast to various techniques.","PeriodicalId":321133,"journal":{"name":"2020 International Conference on Communication and Signal Processing (ICCSP)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134018250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Interocular Distance based Facial Recognition 基于眼间距离的面部识别
Pub Date : 2020-07-01 DOI: 10.1109/ICCSP48568.2020.9182133
G. Sundar, Varsha Anand, J. P. Anita
Facial Recognition has become a key feature when it comes to biometrics. In order to capture a person’s face, there are certain vital attributes of the face that we need to understand such as length and width of nose, eyes, chin, eyebrows etc. There are many existing methods (algorithms) for performing facial detection but it is difficult to assess the performance of these methods because of its complexity. In this paper, facial recognition using the property of golden ratio of human face is discussed. The proposed technique is more efficient in terms of run time length and detection process is easy as it only stores the eye data. Hence measuring only the distance between the eyes would help us do facial recognition. A realistic comparison between Haar feature-based cascade classifier and contour mapping based algorithm is presented. Georgia tech university’s dataset has been used for the purpose of comparison of different algorithms.
面部识别已经成为生物识别技术的一个关键特征。为了捕捉一个人的脸,我们需要了解脸的某些重要属性,如鼻子、眼睛、下巴、眉毛等的长度和宽度。现有的人脸检测方法(算法)很多,但由于其复杂性,很难对这些方法的性能进行评估。本文讨论了利用人脸黄金分割率进行人脸识别的方法。该方法仅存储人眼数据,在运行时间长度上具有较高的效率,且检测过程简单。因此,仅测量两眼之间的距离就可以帮助我们进行面部识别。对基于Haar特征的级联分类器与基于等高线映射的算法进行了比较。佐治亚理工大学的数据集被用来比较不同的算法。
{"title":"Interocular Distance based Facial Recognition","authors":"G. Sundar, Varsha Anand, J. P. Anita","doi":"10.1109/ICCSP48568.2020.9182133","DOIUrl":"https://doi.org/10.1109/ICCSP48568.2020.9182133","url":null,"abstract":"Facial Recognition has become a key feature when it comes to biometrics. In order to capture a person’s face, there are certain vital attributes of the face that we need to understand such as length and width of nose, eyes, chin, eyebrows etc. There are many existing methods (algorithms) for performing facial detection but it is difficult to assess the performance of these methods because of its complexity. In this paper, facial recognition using the property of golden ratio of human face is discussed. The proposed technique is more efficient in terms of run time length and detection process is easy as it only stores the eye data. Hence measuring only the distance between the eyes would help us do facial recognition. A realistic comparison between Haar feature-based cascade classifier and contour mapping based algorithm is presented. Georgia tech university’s dataset has been used for the purpose of comparison of different algorithms.","PeriodicalId":321133,"journal":{"name":"2020 International Conference on Communication and Signal Processing (ICCSP)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134095815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 International Conference on Communication and Signal Processing (ICCSP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1