首页 > 最新文献

ECTI Transactions on Computer and Information Technology最新文献

英文 中文
Model-Based Design Optimization using CDFG for Image Processing on FPGA 基于模型的CDFG FPGA图像处理优化设计
Q4 Decision Sciences Pub Date : 2023-10-21 DOI: 10.37936/ecti-cit.2023174.252417
Surachate Chumpol, Panadda Solod, Krerkchai Thongnoo, Nattha Jindapetch
As the automotive industry moves toward autonomous driving and ADAS (Advanced Driver Assistance Systems), Model-Based Design (MBD) is a practical design methodology. It can be used to develop rapid prototyping by using MATLAB and Simulink. The MBD method still has limitations for handling complex models. This paper uses the Control Data Flow Graph (CDFG), an intermediate representation for analyzing complex algorithms, so that suitable optimizations for image processing applications can be implemented on an FPGA. The experimental results show that the proposed CDFG method improved both the area and speed of the edge detection case study compared with the MathWorks Vision HDL toolbox.
随着汽车行业向自动驾驶和高级驾驶辅助系统(ADAS)发展,基于模型的设计(MBD)成为一种实用的设计方法。它可以用于MATLAB和Simulink的快速原型开发。MBD方法在处理复杂模型时仍有局限性。本文使用控制数据流图(CDFG),一种用于分析复杂算法的中间表示,以便在FPGA上实现适合图像处理应用的优化。实验结果表明,与MathWorks Vision HDL工具箱相比,所提出的CDFG方法提高了边缘检测案例研究的面积和速度。
{"title":"Model-Based Design Optimization using CDFG for Image Processing on FPGA","authors":"Surachate Chumpol, Panadda Solod, Krerkchai Thongnoo, Nattha Jindapetch","doi":"10.37936/ecti-cit.2023174.252417","DOIUrl":"https://doi.org/10.37936/ecti-cit.2023174.252417","url":null,"abstract":"As the automotive industry moves toward autonomous driving and ADAS (Advanced Driver Assistance Systems), Model-Based Design (MBD) is a practical design methodology. It can be used to develop rapid prototyping by using MATLAB and Simulink. The MBD method still has limitations for handling complex models. This paper uses the Control Data Flow Graph (CDFG), an intermediate representation for analyzing complex algorithms, so that suitable optimizations for image processing applications can be implemented on an FPGA. The experimental results show that the proposed CDFG method improved both the area and speed of the edge detection case study compared with the MathWorks Vision HDL toolbox.","PeriodicalId":37046,"journal":{"name":"ECTI Transactions on Computer and Information Technology","volume":"12 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135513734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Incident Detection Thresholds Using the A* Algorithm: An Enhanced Approach for the California Algorithm 使用A*算法优化事件检测阈值:加利福尼亚算法的增强方法
Q4 Decision Sciences Pub Date : 2023-10-14 DOI: 10.37936/ecti-cit.2023174.251643
Korn Puangnak, Manthana Tiawongsuwan
This paper presents an improved version of the California Algorithm (CA), focusing on threshold selection criteria. The CA is a widely recognized incidence detection algorithm used as a benchmark for comparison with newly developed incident detection algorithms. This study proposes criteria for threshold selection in CA based on the A* algorithm, which aims to find optimal thresholds using a Performance Index (PI) as a cost function. Our proposed method reduces processing time by optimizing resource utilization and establishes a standard for threshold selection in CA for comparison and evaluation purposes. Experimental results from our proposed method demonstrate its effectiveness in reducing the complexity required to determine optimal thresholds. Optimization of the CA method using the A* algorithm results in a 98.68% reduction in the number of nodes searched compared to a Complete Search Tree (CST).
本文提出了加利福尼亚算法(CA)的改进版本,重点关注阈值选择标准。CA是一种被广泛认可的事件检测算法,被用作与新开发的事件检测算法进行比较的基准。本研究提出了基于A*算法的CA阈值选择标准,该算法旨在使用性能指数(PI)作为代价函数找到最佳阈值。我们提出的方法通过优化资源利用率减少了处理时间,并为CA的阈值选择建立了一个标准,用于比较和评估。实验结果表明,该方法有效地降低了确定最优阈值所需的复杂性。使用A*算法对CA方法进行优化,与完全搜索树(CST)相比,搜索的节点数量减少了98.68%。
{"title":"Optimizing Incident Detection Thresholds Using the A* Algorithm: An Enhanced Approach for the California Algorithm","authors":"Korn Puangnak, Manthana Tiawongsuwan","doi":"10.37936/ecti-cit.2023174.251643","DOIUrl":"https://doi.org/10.37936/ecti-cit.2023174.251643","url":null,"abstract":"This paper presents an improved version of the California Algorithm (CA), focusing on threshold selection criteria. The CA is a widely recognized incidence detection algorithm used as a benchmark for comparison with newly developed incident detection algorithms. This study proposes criteria for threshold selection in CA based on the A* algorithm, which aims to find optimal thresholds using a Performance Index (PI) as a cost function. Our proposed method reduces processing time by optimizing resource utilization and establishes a standard for threshold selection in CA for comparison and evaluation purposes. Experimental results from our proposed method demonstrate its effectiveness in reducing the complexity required to determine optimal thresholds. Optimization of the CA method using the A* algorithm results in a 98.68% reduction in the number of nodes searched compared to a Complete Search Tree (CST).","PeriodicalId":37046,"journal":{"name":"ECTI Transactions on Computer and Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135765977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Watermarking Framework using Histogram Equalization and Visual Saliency 基于直方图均衡化和视觉显著性的图像水印框架
Q4 Decision Sciences Pub Date : 2023-10-07 DOI: 10.37936/ecti-cit.2023174.252375
Bishwabara Panda, Manas Ranjan Nayak, Pradeep Kumar Mallick, Abhishek Basu
This paper proposes a digital image watermarking strategy using histogram equalization and visual Saliency followed by LSB (Least Significant Bit) replacement for better imperceptibility with hiding capacity. With this technique, a saliency map determines lesser-observable parts of the original image and gradually implants with increasing amounts of information based on histogram equalization information. The output from saliency is the perceptible areas within an image, which is the most notable position from the perspective of vision; as a result, any changes made other than those areas will be less noticeable to viewers. Implementing the histogram method helps identify the areas where we can hide our secret information within that image. Using the LSB replacement technique, we adaptively insert our confidential data into the original image. Here, we use the saliency map to find out the non-salient region or less perceptible region to improve the imperceptibility, and the histogram equalization technique is used to maximize the hiding capacity within those less perceptible regions. So that we can improve the imperceptibility as well as the hiding capacity.
本文提出了一种利用直方图均衡化和视觉显著性的数字图像水印策略,通过LSB (Least Significant Bit)替换来获得更好的隐蔽性和隐藏能力。利用该技术,显著性图确定原始图像中较不可见的部分,并根据直方图均衡化信息逐渐植入越来越多的信息。显著性的输出是图像内的可感知区域,从视觉角度来看,这是最显著的位置;因此,除了这些区域之外的任何更改对观众来说都不太明显。实现直方图方法有助于识别我们可以在图像中隐藏秘密信息的区域。利用LSB替换技术,我们自适应地将机密数据插入到原始图像中。在这里,我们使用显著性图来找出非显著区域或不太可感知的区域来提高不可感知性,并使用直方图均衡化技术来最大化这些不太可感知区域的隐藏能力。从而提高了系统的隐蔽性和隐藏能力。
{"title":"Image Watermarking Framework using Histogram Equalization and Visual Saliency","authors":"Bishwabara Panda, Manas Ranjan Nayak, Pradeep Kumar Mallick, Abhishek Basu","doi":"10.37936/ecti-cit.2023174.252375","DOIUrl":"https://doi.org/10.37936/ecti-cit.2023174.252375","url":null,"abstract":"This paper proposes a digital image watermarking strategy using histogram equalization and visual Saliency followed by LSB (Least Significant Bit) replacement for better imperceptibility with hiding capacity. With this technique, a saliency map determines lesser-observable parts of the original image and gradually implants with increasing amounts of information based on histogram equalization information. The output from saliency is the perceptible areas within an image, which is the most notable position from the perspective of vision; as a result, any changes made other than those areas will be less noticeable to viewers. Implementing the histogram method helps identify the areas where we can hide our secret information within that image. Using the LSB replacement technique, we adaptively insert our confidential data into the original image. Here, we use the saliency map to find out the non-salient region or less perceptible region to improve the imperceptibility, and the histogram equalization technique is used to maximize the hiding capacity within those less perceptible regions. So that we can improve the imperceptibility as well as the hiding capacity.","PeriodicalId":37046,"journal":{"name":"ECTI Transactions on Computer and Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Selection of Motorcycle Battery Swapping Stations Under Flexible Demand by Using Distance Function And Gis Technique 基于距离函数和Gis技术的灵活需求下摩托车换电池站优化选择
Q4 Decision Sciences Pub Date : 2023-09-30 DOI: 10.37936/ecti-cit.2023173.253697
Athita On-Ouen, Jirayus Arbking, Nuttaporn Phakdee
Our research proposes an approach to finding a suitable location for a motorcycle Battery Swapping Station (BSS) that considers multiple objectives. We developed a model based on Euclidean distance with K-NN, the AHP function, a desired number of stations, and GIS-based road infrastructure data. This model also considers the maximum coverage area and satisfies the number of stations and geographical features. Additionally, we consider the average driving distance of the battery swapping station location. To facilitate analysis, square grids form cells representing road type, environmental characteristics, places, and population density. Our proposed framework provides decision-makers with a multi-objective and visually optimized motorcycle BSS location, allowing for a more flexible selection of exact BSS locations shown on a map. Our demonstration can be used to resolve the uncertain problem related to finding a place for a motorcycle battery swapping station location. to finding a place for a motorcycle battery swapping station location.
我们的研究提出了一种考虑多个目标的寻找摩托车电池交换站(BSS)合适位置的方法。我们利用K-NN、AHP函数、期望的站点数量和基于gis的道路基础设施数据开发了一个基于欧几里得距离的模型。该模型还考虑了最大覆盖面积,满足台站数量和地理特征。另外,我们考虑换电池站位置的平均行驶距离。为了便于分析,方形网格形成了代表道路类型、环境特征、地点和人口密度的单元格。我们提出的框架为决策者提供了一个多目标和视觉优化的摩托车BSS位置,允许更灵活地选择精确的BSS位置显示在地图上。该方法可用于解决摩托车换电池站选址不确定的问题。找到一个地方的摩托车电池更换站的位置。
{"title":"Optimized Selection of Motorcycle Battery Swapping Stations Under Flexible Demand by Using Distance Function And Gis Technique","authors":"Athita On-Ouen, Jirayus Arbking, Nuttaporn Phakdee","doi":"10.37936/ecti-cit.2023173.253697","DOIUrl":"https://doi.org/10.37936/ecti-cit.2023173.253697","url":null,"abstract":"Our research proposes an approach to finding a suitable location for a motorcycle Battery Swapping Station (BSS) that considers multiple objectives. We developed a model based on Euclidean distance with K-NN, the AHP function, a desired number of stations, and GIS-based road infrastructure data. This model also considers the maximum coverage area and satisfies the number of stations and geographical features. Additionally, we consider the average driving distance of the battery swapping station location. To facilitate analysis, square grids form cells representing road type, environmental characteristics, places, and population density. Our proposed framework provides decision-makers with a multi-objective and visually optimized motorcycle BSS location, allowing for a more flexible selection of exact BSS locations shown on a map. Our demonstration can be used to resolve the uncertain problem related to finding a place for a motorcycle battery swapping station location. to finding a place for a motorcycle battery swapping station location.","PeriodicalId":37046,"journal":{"name":"ECTI Transactions on Computer and Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135038015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Enhancing Data Aggregation for Big Data Analytics 增强隐私的大数据分析数据聚合
Q4 Decision Sciences Pub Date : 2023-09-30 DOI: 10.37936/ecti-cit.2023173.252952
Surapon Riyana, Kittikorn Sasujit, Nigran Homdoung
Data utility and data privacy are serious issues that must be considered when datasets are utilized in big data analytics such that they are traded off. That is, the datasets have high data utility and often have high risks in terms of privacy violation issues. To balance the data utility and the data privacy in datasets when they are provided to utilize in big data analytics, several privacy preservation models have been proposed, e.g., k-Anonymity, l-Diversity, t-Closeness, Anatomy, k-Likeness, and (lp1, . . . , lpn)-Privacy. Unfortunately, these privacy preservation models are highly complex data models and still have data utility issues that must be addressed. To rid these vulnerabilities of these models, a new privacy preservation model is proposed in this work. It is based on aggregate query answers that can guarantee the confidence of the range and the number of values that can be re-identified. Furthermore, we show that the proposed model is more effcient and effective in big data analytics by using extensive experiments.
当数据集被用于大数据分析时,数据效用和数据隐私是必须考虑的严重问题。也就是说,数据集具有很高的数据效用,并且在隐私侵犯问题方面通常具有很高的风险。为了平衡数据集在大数据分析中使用时的数据效用和数据隐私,提出了几个隐私保护模型,如k-匿名、l-多样性、t-接近、解剖、k-相似和(lp1,…)。lpn)隐私。不幸的是,这些隐私保护模型是高度复杂的数据模型,仍然存在必须解决的数据实用问题。为了消除这些模型的漏洞,本文提出了一种新的隐私保护模型。它基于聚合查询答案,可以保证范围的置信度和可重新标识的值的数量。此外,我们通过大量的实验表明,所提出的模型在大数据分析中更加高效和有效。
{"title":"Privacy-Enhancing Data Aggregation for Big Data Analytics","authors":"Surapon Riyana, Kittikorn Sasujit, Nigran Homdoung","doi":"10.37936/ecti-cit.2023173.252952","DOIUrl":"https://doi.org/10.37936/ecti-cit.2023173.252952","url":null,"abstract":"Data utility and data privacy are serious issues that must be considered when datasets are utilized in big data analytics such that they are traded off. That is, the datasets have high data utility and often have high risks in terms of privacy violation issues. To balance the data utility and the data privacy in datasets when they are provided to utilize in big data analytics, several privacy preservation models have been proposed, e.g., k-Anonymity, l-Diversity, t-Closeness, Anatomy, k-Likeness, and (lp1, . . . , lpn)-Privacy. Unfortunately, these privacy preservation models are highly complex data models and still have data utility issues that must be addressed. To rid these vulnerabilities of these models, a new privacy preservation model is proposed in this work. It is based on aggregate query answers that can guarantee the confidence of the range and the number of values that can be re-identified. Furthermore, we show that the proposed model is more effcient and effective in big data analytics by using extensive experiments.","PeriodicalId":37046,"journal":{"name":"ECTI Transactions on Computer and Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136342945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plaque Territory Detection in IVUS Images based on Concentration of Entropy and Gradient Magnitude via Spiral Random Walk-based Approach 基于熵浓度和梯度大小的螺旋随机游动IVUS图像斑块区域检测
Q4 Decision Sciences Pub Date : 2023-09-02 DOI: 10.37936/ecti-cit.2023173.253328
Benchaporn Jantarakongkul, Pusit Kulkasem
This paper presents a simple and optimal approach for automatically identifying the location and size of plaque territories in IVUS images, thus improving plaque territory classification. Unlike existing circular-based algorithms, we leverage the anatomical structure of IVUS images to enhance accuracy. The adventitia, which constitutes the largest part of the image, serves as a landmark; however, its low contrast makes edge detection challenging. To address this issue, we enhance the brightness of the adventitia, identify and remove intima blobs, and accurately determine the media boundary. This aids in simplifying the calculation of plaque territory. To locate the plaque territory, we employ a spiral random walk-based approach that utilizes the concentration of entropy and gradient magnitude in the target area. Our approach outperforms existing methods, contributing to automated plaque analysis for cardiovascular disease diagnosis and treatment. The results show that the proposed approach achieves an accuracy of 0.89, precision of 0.81, recall of 0.77, and F1-Score of 0.83, respectively.
本文提出了一种简单而优化的方法,用于自动识别IVUS图像中斑块区域的位置和大小,从而改进斑块区域分类。与现有的基于圆形的算法不同,我们利用IVUS图像的解剖结构来提高准确性。构成图像最大部分的外膜作为地标;然而,它的低对比度使得边缘检测具有挑战性。为了解决这个问题,我们增强了外膜的亮度,识别和去除内膜斑点,准确地确定了介质边界。这有助于简化斑块面积的计算。为了定位斑块区域,我们采用了一种基于螺旋随机行走的方法,该方法利用了目标区域的熵浓度和梯度大小。我们的方法优于现有的方法,有助于心血管疾病诊断和治疗的自动斑块分析。结果表明,该方法的准确率为0.89,精密度为0.81,召回率为0.77,F1-Score为0.83。
{"title":"Plaque Territory Detection in IVUS Images based on Concentration of Entropy and Gradient Magnitude via Spiral Random Walk-based Approach","authors":"Benchaporn Jantarakongkul, Pusit Kulkasem","doi":"10.37936/ecti-cit.2023173.253328","DOIUrl":"https://doi.org/10.37936/ecti-cit.2023173.253328","url":null,"abstract":"This paper presents a simple and optimal approach for automatically identifying the location and size of plaque territories in IVUS images, thus improving plaque territory classification. Unlike existing circular-based algorithms, we leverage the anatomical structure of IVUS images to enhance accuracy. The adventitia, which constitutes the largest part of the image, serves as a landmark; however, its low contrast makes edge detection challenging. To address this issue, we enhance the brightness of the adventitia, identify and remove intima blobs, and accurately determine the media boundary. This aids in simplifying the calculation of plaque territory. To locate the plaque territory, we employ a spiral random walk-based approach that utilizes the concentration of entropy and gradient magnitude in the target area. Our approach outperforms existing methods, contributing to automated plaque analysis for cardiovascular disease diagnosis and treatment. The results show that the proposed approach achieves an accuracy of 0.89, precision of 0.81, recall of 0.77, and F1-Score of 0.83, respectively.","PeriodicalId":37046,"journal":{"name":"ECTI Transactions on Computer and Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134968521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Electrocardiography Data Compression 一种有效的心电图数据压缩方法
Q4 Decision Sciences Pub Date : 2023-09-02 DOI: 10.37936/ecti-cit.2023173.253629
Passakorn Luanloet, Watcharapan Suwansantisuk, Pinit Kumhom
In healthcare, electrocardiography (ECG) sensors generate a large amount of heart electrical signal that must be efficiently compressed to enable fast data transfer and reduce storage costs. Existing methods for ECG data compression do not fully exploit the characteristics of ECG signals, leading to suboptimal compression. This study proposes a data compression technique for ECG data by exploiting the known characteristics of ECG signals. Our approach combines Savitzky-Golay filtering, detrending, discrete cosine transform, scalar quantization, run-length encoding, and Huffman coding for the effective compression. To optimize the compression performance, we generated quantization intervals tailored to the ECG data characteristics. The proposed method experimentally produces a high compression ratio of 127.61 for a design parameter K = 8, a minimum percentage root mean square difference of 1.03% for K = 128, and a maximum quality score (QS) of 39.78, where K is the number of quantization intervals. Moreover, we compared the proposed method to state-of-the-art methods on a widely used ECG benchmark dataset. We found that the proposed method outperforms the others in terms of the QS, which measures the overall compression-decompression ability. By enabling more storage and faster data transfer, the proposed method can facilitate the widespread use and analysis of large volumes of ECG data, thereby contributing to advances in healthcare.
在医疗保健领域,心电图(ECG)传感器产生大量的心脏电信号,必须对这些信号进行有效压缩,以实现快速数据传输并降低存储成本。现有的心电数据压缩方法没有充分利用心电信号的特性,导致压缩效果不理想。本研究提出一种利用已知心电信号特征的心电数据压缩技术。我们的方法结合了Savitzky-Golay滤波、去趋势、离散余弦变换、标量量化、游程编码和霍夫曼编码来实现有效的压缩。为了优化压缩性能,我们根据心电数据的特征生成量化区间。实验结果表明,当设计参数K = 8时,该方法的压缩比为127.61;当设计参数K = 128时,该方法的最小均方根差百分比为1.03%;当设计参数K = 128时,该方法的最大质量分数(QS)为39.78,其中K为量化区间数。此外,我们将所提出的方法与广泛使用的ECG基准数据集上的最新方法进行了比较。我们发现该方法在QS方面优于其他方法,QS是衡量整体压缩解压能力的指标。通过实现更多的存储和更快的数据传输,所提出的方法可以促进大量心电数据的广泛使用和分析,从而促进医疗保健的进步。
{"title":"An Efficient Electrocardiography Data Compression","authors":"Passakorn Luanloet, Watcharapan Suwansantisuk, Pinit Kumhom","doi":"10.37936/ecti-cit.2023173.253629","DOIUrl":"https://doi.org/10.37936/ecti-cit.2023173.253629","url":null,"abstract":"In healthcare, electrocardiography (ECG) sensors generate a large amount of heart electrical signal that must be efficiently compressed to enable fast data transfer and reduce storage costs. Existing methods for ECG data compression do not fully exploit the characteristics of ECG signals, leading to suboptimal compression. This study proposes a data compression technique for ECG data by exploiting the known characteristics of ECG signals. Our approach combines Savitzky-Golay filtering, detrending, discrete cosine transform, scalar quantization, run-length encoding, and Huffman coding for the effective compression. To optimize the compression performance, we generated quantization intervals tailored to the ECG data characteristics. The proposed method experimentally produces a high compression ratio of 127.61 for a design parameter K = 8, a minimum percentage root mean square difference of 1.03% for K = 128, and a maximum quality score (QS) of 39.78, where K is the number of quantization intervals. Moreover, we compared the proposed method to state-of-the-art methods on a widely used ECG benchmark dataset. We found that the proposed method outperforms the others in terms of the QS, which measures the overall compression-decompression ability. By enabling more storage and faster data transfer, the proposed method can facilitate the widespread use and analysis of large volumes of ECG data, thereby contributing to advances in healthcare.","PeriodicalId":37046,"journal":{"name":"ECTI Transactions on Computer and Information Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134968523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Steganography-based Copyright and Privacy-Protected Image Trading Systems 基于隐写术的版权和隐私保护图像交易系统
Q4 Decision Sciences Pub Date : 2023-08-12 DOI: 10.37936/ecti-cit.2023173.252500
Wannida Sae-Tang, Adisorn Sirikham
This paper proposes steganography-based copyright- and privacy-protected image trading systems using image transformation, i.e., either discrete cosine transform (DCT) or Hadamard transform (HT). In the systems, there are a content provider (CP), a consumer, the first trusted third party (TTP), and the second TTP. To protect the copyright of the image, the consumer ID is embedded into the amplitude components of the commercial image by the first TTP using the digital fingerprinting technique, and to protect the consumer's privacy against the first TTP and a malicious third party (s), the image steganography is applied to the commercial image by using image transformation. A color dummy image is used instead of a gray dummy image for security purposes. After applying the image transformation to both images, the coefficient signs of the commercial image are replaced by the coefficient signs of the dummy image pixel-by-pixel so that the inversely transformed commercial image looks like the dummy image instead of the commercial image. Once the consumer receives the fingerprinted image from the first TTP and the coefficient signs of the commercial image from the second TTP, the consumer reconstructs the fingerprinted commercial image without losing the hidden fingerprint at all because of the compatibility of the proposed image steganography method and the amplitude-based fingerprinting method. The experimental results confirm that the stego-images generated by the proposed systems do not look suspicious with higher qualities compared with those generated by existing systems. Moreover, the fingerprinted image quality and the correct fingerprint extracting rate have been improved by the proposed systems.
本文提出了基于隐写术的版权和隐私保护图像交易系统,该系统使用图像变换,即离散余弦变换(DCT)或哈达玛变换(HT)。在系统中,有一个内容提供者(CP)、一个使用者、第一个可信第三方(TTP)和第二个TTP。为了保护图像的版权,第一TTP使用数字指纹技术将消费者ID嵌入到商业图像的振幅分量中,为了保护消费者的隐私免受第一TTP和恶意第三方的侵害,通过图像变换将图像隐写技术应用于商业图像。为了安全起见,使用彩色假图像代替灰色假图像。在对两幅图像进行图像变换后,将商业图像的系数符号逐像素地替换为虚拟图像的系数符号,使反变换后的商业图像看起来像虚拟图像而不是商业图像。一旦消费者从第一TTP接收到指纹图像,从第二TTP接收到商业图像的系数符号,由于所提出的图像隐写方法和基于幅度的指纹识别方法的兼容性,消费者重建指纹商业图像,而不会丢失隐藏的指纹。实验结果证实,与现有系统生成的隐写图像相比,所提出的系统生成的隐写图像看起来不可疑,质量更高。此外,该系统还提高了指纹图像的质量和正确的指纹提取率。
{"title":"Image Steganography-based Copyright and Privacy-Protected Image Trading Systems","authors":"Wannida Sae-Tang, Adisorn Sirikham","doi":"10.37936/ecti-cit.2023173.252500","DOIUrl":"https://doi.org/10.37936/ecti-cit.2023173.252500","url":null,"abstract":"This paper proposes steganography-based copyright- and privacy-protected image trading systems using image transformation, i.e., either discrete cosine transform (DCT) or Hadamard transform (HT). In the systems, there are a content provider (CP), a consumer, the first trusted third party (TTP), and the second TTP. To protect the copyright of the image, the consumer ID is embedded into the amplitude components of the commercial image by the first TTP using the digital fingerprinting technique, and to protect the consumer's privacy against the first TTP and a malicious third party (s), the image steganography is applied to the commercial image by using image transformation. A color dummy image is used instead of a gray dummy image for security purposes. After applying the image transformation to both images, the coefficient signs of the commercial image are replaced by the coefficient signs of the dummy image pixel-by-pixel so that the inversely transformed commercial image looks like the dummy image instead of the commercial image. Once the consumer receives the fingerprinted image from the first TTP and the coefficient signs of the commercial image from the second TTP, the consumer reconstructs the fingerprinted commercial image without losing the hidden fingerprint at all because of the compatibility of the proposed image steganography method and the amplitude-based fingerprinting method. The experimental results confirm that the stego-images generated by the proposed systems do not look suspicious with higher qualities compared with those generated by existing systems. Moreover, the fingerprinted image quality and the correct fingerprint extracting rate have been improved by the proposed systems.","PeriodicalId":37046,"journal":{"name":"ECTI Transactions on Computer and Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135354361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ECTI Transactions on Computer and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1