首页 > 最新文献

IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004最新文献

英文 中文
Increasing the customer's choice: query expansion based on the layer-seeds method and its application in e-commerce 增加客户选择:基于分层种子方法的查询扩展及其在电子商务中的应用
Libo Chen, M. L'Abbate, U. Thiel, E. Neuhold
In e-commerce it is often crucial to provide customers a large choice of relevant offers. As short and incomplete queries prevail, appropriate expansion methods are desirable. This work describes a method for the automatic construction of a thesaurus based on existing categories of documents. A clustering algorithm, the "Layer-Seeds method", is introduced, which facilitates the automatic generation of thesaurus reflecting the specific vocabulary occurring in a given collection of documents. The clustering works on terms extracted from the documents in a certain category and organizes them in a tree-like hierarchical structure - a thesaurus. The thesaurus is then employed for automatic query expansion in an e-commerce application in order to obtain better results for product searching. Experiments yield evidence that a significant increase of user satisfaction is achieved.
在电子商务中,为客户提供大量相关优惠选择通常是至关重要的。由于短查询和不完整查询普遍存在,因此需要适当的展开方法。这项工作描述了一种基于现有文档类别自动构建同义词典的方法。介绍了一种聚类算法“层-种子法”,该算法有助于自动生成反映给定文档集合中出现的特定词汇表的同义词库。聚类处理从某个类别的文档中提取的术语,并将它们组织成树状的层次结构——同义词库。然后在电子商务应用程序中使用同义词库进行自动查询扩展,以便获得更好的产品搜索结果。实验证明,显著提高了用户满意度。
{"title":"Increasing the customer's choice: query expansion based on the layer-seeds method and its application in e-commerce","authors":"Libo Chen, M. L'Abbate, U. Thiel, E. Neuhold","doi":"10.1109/EEE.2004.1287329","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287329","url":null,"abstract":"In e-commerce it is often crucial to provide customers a large choice of relevant offers. As short and incomplete queries prevail, appropriate expansion methods are desirable. This work describes a method for the automatic construction of a thesaurus based on existing categories of documents. A clustering algorithm, the \"Layer-Seeds method\", is introduced, which facilitates the automatic generation of thesaurus reflecting the specific vocabulary occurring in a given collection of documents. The clustering works on terms extracted from the documents in a certain category and organizes them in a tree-like hierarchical structure - a thesaurus. The thesaurus is then employed for automatic query expansion in an e-commerce application in order to obtain better results for product searching. Experiments yield evidence that a significant increase of user satisfaction is achieved.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A scheme for MAC isolation to realize effective management in public wireless LAN 为实现公共无线局域网的有效管理,提出了一种MAC隔离方案
Liquan Chen
Recently, IEEE 802.11 wireless LAN (WLAN) technology was rapidly developed and the high-speed wireless access was stepping into our lives. In public areas, the architecture of public wireless LAN (public WLAN) is proposed to solve the emerging management problems such as authentication, accounting and authorization, etc. [J.A. Laurila et al., (2001)]. But there is no previous good solution mentions the management for use of network operators' equipments. We specify how to use MAC isolation to enhance the public WLAN effective management. For IEEE 802.11 compliance, we propose a scheme to implement the MAC isolation by re-design the state machine of distribution/spl I.bar/service component in WLAN access point. Finally, a WLAN access point solution based on MPC860 embedded processor hardware and embedded Linux software is specified, and the simulation of MAC isolation in public WLAN is also presented. The result shows that the scheme by re-design the state machine of distribution/spl I.bar/service component in IEEE 802.11 access point to realize MAC isolation is effective and realizable.
近年来,IEEE 802.11无线局域网(WLAN)技术得到了迅速发展,高速无线接入正在走进我们的生活。在公共领域,为了解决新出现的认证、计费、授权等管理问题,提出了公共无线局域网(public WLAN)架构Laurila et al.,(2001)。但对于网络运营商设备的使用管理,目前尚无较好的解决方案。详细介绍了如何利用MAC隔离来增强公共WLAN的有效管理。为了符合IEEE 802.11标准,我们提出了一种通过重新设计WLAN接入点的分布/spl .bar/业务组件状态机来实现MAC隔离的方案。最后,提出了一种基于MPC860嵌入式处理器硬件和嵌入式Linux软件的无线局域网接入点方案,并对公共无线局域网的MAC隔离进行了仿真。结果表明,通过在IEEE 802.11接入点中重新设计分布/spl .bar/业务组件的状态机来实现MAC隔离的方案是有效的、可实现的。
{"title":"A scheme for MAC isolation to realize effective management in public wireless LAN","authors":"Liquan Chen","doi":"10.1109/EEE.2004.1287347","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287347","url":null,"abstract":"Recently, IEEE 802.11 wireless LAN (WLAN) technology was rapidly developed and the high-speed wireless access was stepping into our lives. In public areas, the architecture of public wireless LAN (public WLAN) is proposed to solve the emerging management problems such as authentication, accounting and authorization, etc. [J.A. Laurila et al., (2001)]. But there is no previous good solution mentions the management for use of network operators' equipments. We specify how to use MAC isolation to enhance the public WLAN effective management. For IEEE 802.11 compliance, we propose a scheme to implement the MAC isolation by re-design the state machine of distribution/spl I.bar/service component in WLAN access point. Finally, a WLAN access point solution based on MPC860 embedded processor hardware and embedded Linux software is specified, and the simulation of MAC isolation in public WLAN is also presented. The result shows that the scheme by re-design the state machine of distribution/spl I.bar/service component in IEEE 802.11 access point to realize MAC isolation is effective and realizable.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115162331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
e-Transformation technologies: case studies and the road ahead - a value chain perspective 电子转型技术:案例研究和未来之路-价值链视角
W. K. Cheung
E-transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that interoperable systems can enable many value-added functions and provide new business opportunities, whether the current development trend can really lead to some real impacts on people's daily lives is still a commonly asked question. In this paper, we first describe a value chain of e-transformation that starts from the availability of data from heterogeneous sources and stops at the ultimate goal of autonomous and context-aware computational services provision. Two prototypes, namely e-Bus Planner and e-Food Marketplace are described for demonstrating the promises that can be provided by information integration. We then argue that the value adding process should further be advanced along the chain by analyzing Web-based social networks. The ultimate objective is to benefit the end-users more directly and immediately.
在过去的几年里,电子转换技术一直朝着信息集成和系统互操作性的目标发展。毫无疑问,可互操作的系统可以实现许多增值功能并提供新的商业机会,但目前的发展趋势是否真的会对人们的日常生活产生一些真正的影响,仍然是一个经常被问到的问题。在本文中,我们首先描述了一个电子转换的价值链,该价值链从异构数据源的数据可用性开始,止于自主和上下文感知计算服务提供的最终目标。描述了两个原型,即电子巴士计划和电子食品市场,以展示信息集成可以提供的承诺。然后,我们认为增值过程应该通过分析基于网络的社交网络进一步沿着链条推进。最终目标是更直接、更迅速地使最终用户受益。
{"title":"e-Transformation technologies: case studies and the road ahead - a value chain perspective","authors":"W. K. Cheung","doi":"10.1109/EEE.2004.1287355","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287355","url":null,"abstract":"E-transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that interoperable systems can enable many value-added functions and provide new business opportunities, whether the current development trend can really lead to some real impacts on people's daily lives is still a commonly asked question. In this paper, we first describe a value chain of e-transformation that starts from the availability of data from heterogeneous sources and stops at the ultimate goal of autonomous and context-aware computational services provision. Two prototypes, namely e-Bus Planner and e-Food Marketplace are described for demonstrating the promises that can be provided by information integration. We then argue that the value adding process should further be advanced along the chain by analyzing Web-based social networks. The ultimate objective is to benefit the end-users more directly and immediately.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125460915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Personalizing information services on wired and wireless networks 有线和无线网络的个性化信息服务
Wei-Po Lee, Ming-Hsiang Su
The increasing Internet contents cause the problem of information overload. We present a generic framework and discuss the main issues in personalizing Internet information services to solve this problem.
互联网内容的增加导致了信息超载的问题。为了解决这一问题,我们提出了一个通用的框架,并讨论了个性化互联网信息服务的主要问题。
{"title":"Personalizing information services on wired and wireless networks","authors":"Wei-Po Lee, Ming-Hsiang Su","doi":"10.1109/EEE.2004.1287320","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287320","url":null,"abstract":"The increasing Internet contents cause the problem of information overload. We present a generic framework and discuss the main issues in personalizing Internet information services to solve this problem.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Personalized product recommendation in e-commerce 电子商务中的个性化产品推荐
S. Weng, Meiran Liu
The purpose is to analyze customers' purchasing behaviors based on product features from transaction records and product feature databases. Customers' preferences toward particular features of products are analyzed and then rules of customer interest profiles are thus derived in order to recommend customer products that have potential attraction with customers. The approach of this paper has its strength to be able to recommend to customers brand new products or rarely purchased products as long as they fit customer interest profiles. This research also derives customers' interest profiles that can explain recommendation results. The interests on particular features of products can be referenced for product development.
目的是从交易记录和产品特征数据库中分析基于产品特征的顾客购买行为。分析顾客对产品的特定特征的偏好,然后得出顾客兴趣概况的规则,以便向顾客推荐对顾客有潜在吸引力的产品。本文的方法有其优势,可以向客户推荐品牌新产品或很少购买的产品,只要它们符合客户的兴趣概况。这项研究还得出了客户的兴趣概况,可以解释推荐结果。对产品特定特性的兴趣可以作为产品开发的参考。
{"title":"Personalized product recommendation in e-commerce","authors":"S. Weng, Meiran Liu","doi":"10.1109/EEE.2004.1287340","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287340","url":null,"abstract":"The purpose is to analyze customers' purchasing behaviors based on product features from transaction records and product feature databases. Customers' preferences toward particular features of products are analyzed and then rules of customer interest profiles are thus derived in order to recommend customer products that have potential attraction with customers. The approach of this paper has its strength to be able to recommend to customers brand new products or rarely purchased products as long as they fit customer interest profiles. This research also derives customers' interest profiles that can explain recommendation results. The interests on particular features of products can be referenced for product development.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128373367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Distributed plug-and-play network management model based on mobile agents 基于移动代理的分布式即插即用网络管理模型
Nan Guo, Tianhan Gao, Hong Zhao
As network is developing to distribution and heterogeneity, legacy network management systems do not work efficiently on operator-intensive distribution of management tasks. A distributed plug-and-play network management model is presented to implement an automatic and self-adapting network management system. In this model, network components can automatically locate the proper management stations, which are configured in specified function, as added to network and get initial management tasks without human intervention. We adopt mobile agent infrastructure to communicate and fulfill management tasks, thus improve the flexibility and autonomy. Moreover, it makes extension and update of management tasks at run-time, thus increases self-adapting capability of the model.
随着网络向分布式和异构方向发展,传统的网络管理系统已不能有效地处理运营商密集型的分布式管理任务。为了实现自动自适应的网络管理系统,提出了一种分布式即插即用网络管理模型。在该模型中,网络组件可以自动定位添加到网络中的按指定功能配置的适当管理站,并获得初始管理任务,无需人工干预。我们采用移动代理架构进行通信和完成管理任务,从而提高了灵活性和自主性。此外,它还可以在运行时对管理任务进行扩展和更新,从而提高模型的自适应能力。
{"title":"Distributed plug-and-play network management model based on mobile agents","authors":"Nan Guo, Tianhan Gao, Hong Zhao","doi":"10.1109/EEE.2004.1287351","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287351","url":null,"abstract":"As network is developing to distribution and heterogeneity, legacy network management systems do not work efficiently on operator-intensive distribution of management tasks. A distributed plug-and-play network management model is presented to implement an automatic and self-adapting network management system. In this model, network components can automatically locate the proper management stations, which are configured in specified function, as added to network and get initial management tasks without human intervention. We adopt mobile agent infrastructure to communicate and fulfill management tasks, thus improve the flexibility and autonomy. Moreover, it makes extension and update of management tasks at run-time, thus increases self-adapting capability of the model.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133327675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algorithms for community subject-identification: experiments and test results 社区主体识别算法:实验与测试结果
Deepak Subramoniam, J. John
We deal with the problem of finding the subject that a given set of pages deals with. The algorithms presented have been designed with a view to provide good results when pages that belong to community (or handle some common topic) are presented to them. When a set of pages are presented, the algorithms return a set of words ordered in the decreasing order of relevance. The words among the first few can be used to identify the topic that the set deals with. The algorithms have been tested by providing them with pages returned from a search engine for a given search query and their performance is assessed based on how high the words used in the search query are placed in the list returned by the algorithm.
我们处理的问题是找到一组给定页面所涉及的主题。所提出的算法的设计目的是在向属于社区(或处理某些共同主题)的页面展示时提供良好的结果。当呈现一组页面时,算法返回一组按相关性降序排列的单词。前几个单词可以用来识别该集合所涉及的主题。通过向这些算法提供搜索引擎为给定搜索查询返回的页面,对它们进行了测试,并根据搜索查询中使用的单词在算法返回的列表中的位置来评估它们的性能。
{"title":"Algorithms for community subject-identification: experiments and test results","authors":"Deepak Subramoniam, J. John","doi":"10.1109/EEE.2004.1287309","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287309","url":null,"abstract":"We deal with the problem of finding the subject that a given set of pages deals with. The algorithms presented have been designed with a view to provide good results when pages that belong to community (or handle some common topic) are presented to them. When a set of pages are presented, the algorithms return a set of words ordered in the decreasing order of relevance. The words among the first few can be used to identify the topic that the set deals with. The algorithms have been tested by providing them with pages returned from a search engine for a given search query and their performance is assessed based on how high the words used in the search query are placed in the list returned by the algorithm.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131143318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A division-of-labor-signature (t, n) threshold-authenticated encryption scheme with message linkage based on the elliptic curve cryptosystem 一种基于椭圆曲线密码体制的具有消息链接的分工签名(t, n)阈值认证加密方案
Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung
We present a new (t, n) threshold-authenticated encryption scheme with message linkage to reduce the load on the signer using a division-of-labor signature. Only t signers can examine and sign an over-large message on behalf of the whole group, by dividing the whole message into a few readable submessage blocks; then, each signer needs only to examine and sign the designated submessage block rather than the whole message. Consequently, the load on the signer should be substantially reduced to improve the performance. Moreover, the proposed scheme is based on the elliptic curve cryptosystem, because of its highly efficient performance and comprehensiveness of security, supporting the practical use of the scheme.
我们提出了一种新的(t, n)阈值认证加密方案,通过消息链接来减少签名者使用分工签名的负担。只有签名者可以代表整个组检查和签署一个过大的消息,将整个消息分成几个可读的子消息块;然后,每个签名者只需要检查和签署指定的子消息块,而不是整个消息。因此,应该大大减少签名者的负载以提高性能。此外,该方案基于椭圆曲线密码体制,由于其高效的性能和全面的安全性,支持该方案的实际应用。
{"title":"A division-of-labor-signature (t, n) threshold-authenticated encryption scheme with message linkage based on the elliptic curve cryptosystem","authors":"Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung","doi":"10.1109/EEE.2004.1287295","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287295","url":null,"abstract":"We present a new (t, n) threshold-authenticated encryption scheme with message linkage to reduce the load on the signer using a division-of-labor signature. Only t signers can examine and sign an over-large message on behalf of the whole group, by dividing the whole message into a few readable submessage blocks; then, each signer needs only to examine and sign the designated submessage block rather than the whole message. Consequently, the load on the signer should be substantially reduced to improve the performance. Moreover, the proposed scheme is based on the elliptic curve cryptosystem, because of its highly efficient performance and comprehensiveness of security, supporting the practical use of the scheme.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132303871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using element and document profile for information clustering 使用元素和文档配置文件进行信息聚类
J. Lai, B. Soh
The tremendous growth in the amount of information available and the number of visitors to Web sites in the recent years poses some key challenges for information filtering and retrieval. Web visitors not only expect high quality and relevant information, but also wish that the information be presented in an as efficient way as possible. The traditional filtering methods, however, only consider the relevant values of document. These conventional methods fail to consider the efficiency of documents retrieval. In this paper, we propose a new algorithm to calculate an index called document similarity score based on elements of the document. Using the index, document profile will be derived. Any documents with the similarity score above a given threshold are clustered. Using these pre-clustered documents, information filtering and retrieval can be made more efficient.
近年来,可获得的信息量和访问Web站点的人数的巨大增长对信息过滤和检索提出了一些关键的挑战。网络访问者不仅希望获得高质量和相关的信息,而且希望信息以尽可能高效的方式呈现。传统的过滤方法只考虑文档的相关值。这些传统的方法没有考虑到文档检索的效率。在本文中,我们提出了一种基于文档元素计算文档相似度分数的新算法。使用索引,将派生文档概要文件。任何相似度得分高于给定阈值的文档都被聚类。使用这些预聚类文档,可以提高信息过滤和检索的效率。
{"title":"Using element and document profile for information clustering","authors":"J. Lai, B. Soh","doi":"10.1109/EEE.2004.1287354","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287354","url":null,"abstract":"The tremendous growth in the amount of information available and the number of visitors to Web sites in the recent years poses some key challenges for information filtering and retrieval. Web visitors not only expect high quality and relevant information, but also wish that the information be presented in an as efficient way as possible. The traditional filtering methods, however, only consider the relevant values of document. These conventional methods fail to consider the efficiency of documents retrieval. In this paper, we propose a new algorithm to calculate an index called document similarity score based on elements of the document. Using the index, document profile will be derived. Any documents with the similarity score above a given threshold are clustered. Using these pre-clustered documents, information filtering and retrieval can be made more efficient.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Image authentication using relation measures of wavelet coefficients 基于小波系数关联测度的图像认证
Yuan-Liang Tang, Ching-Ting Chen
In this paper, a novel watermarking technique for image authentication is proposed. This technique operates in the wavelet domain and makes use of semifragile watermarks for achieving better robustness. The image is first transformed into the wavelet domain and the relations between neighboring coefficients are utilized to authenticate the integrity of the image content. By carefully designing the processes of feature extraction and watermark embedding, the proposed method is able to identify malicious changes made on the image, while very insensitive to common image processing. In addition, the system is secure because not only the watermark is protected by a private key but also building relations between coefficients significantly discourages an adversary from performing the collage attack.
本文提出了一种新的图像认证水印技术。该技术在小波域操作,并利用半脆弱水印来获得更好的鲁棒性。首先将图像变换到小波域,利用相邻系数之间的关系来验证图像内容的完整性。通过对特征提取和水印嵌入过程的精心设计,该方法能够识别出对图像所做的恶意改变,同时对普通图像处理非常不敏感。此外,该系统是安全的,因为不仅水印由私钥保护,而且系数之间的关系也大大阻止了对手进行拼贴攻击。
{"title":"Image authentication using relation measures of wavelet coefficients","authors":"Yuan-Liang Tang, Ching-Ting Chen","doi":"10.1109/EEE.2004.1287362","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287362","url":null,"abstract":"In this paper, a novel watermarking technique for image authentication is proposed. This technique operates in the wavelet domain and makes use of semifragile watermarks for achieving better robustness. The image is first transformed into the wavelet domain and the relations between neighboring coefficients are utilized to authenticate the integrity of the image content. By carefully designing the processes of feature extraction and watermark embedding, the proposed method is able to identify malicious changes made on the image, while very insensitive to common image processing. In addition, the system is secure because not only the watermark is protected by a private key but also building relations between coefficients significantly discourages an adversary from performing the collage attack.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125228125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1