首页 > 最新文献

Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)最新文献

英文 中文
Hiding Multiple Watermarks in Transparencies of Visual Cryptography 隐藏多个水印在透明的视觉加密
Hao Luo, Jeng-Shyang Pan, Zhe-ming Lu
This paper proposes a scheme to hide multiple watermarks in transparencies of visual cryptography. On one hand, the main properties of the traditional visual cryptography are still maintained. On the other hand, not only the encrypted image can be visible when stacking the transparencies, but also two extra watermarks can be extracted with simple computations. The scheme can be applied to hide some affiliated information of the secret image. Experimental results demonstrate the scheme is effective and practical.
提出了一种在可视密码透明文件中隐藏多个水印的方案。一方面,保留了传统视觉密码的主要特性。另一方面,在叠加透明度时,不仅可以看到加密后的图像,而且可以通过简单的计算提取出两个额外的水印。该方案可用于隐藏秘密图像的一些附属信息。实验结果证明了该方案的有效性和实用性。
{"title":"Hiding Multiple Watermarks in Transparencies of Visual Cryptography","authors":"Hao Luo, Jeng-Shyang Pan, Zhe-ming Lu","doi":"10.1109/IIH-MSP.2007.427","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.427","url":null,"abstract":"This paper proposes a scheme to hide multiple watermarks in transparencies of visual cryptography. On one hand, the main properties of the traditional visual cryptography are still maintained. On the other hand, not only the encrypted image can be visible when stacking the transparencies, but also two extra watermarks can be extracted with simple computations. The scheme can be applied to hide some affiliated information of the secret image. Experimental results demonstrate the scheme is effective and practical.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124403493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Search RNN on Broadcast Environment 搜索广播环境下的RNN
Lien-Fa Lin
While the RNN is well studied in the traditional wired, disk-based client-server environment, it has not been tackled in a wireless broadcasting environment. The liner property of wireless broadcast media and power conserving requirement of mobile devices make the problem particularly interesting and challenging. In this paper, the issues involved with organizing location dependent data and answering RNN queries on air are investigated. An efficient data organization, called Jump Rdnn-tree, and the corresponding search algorithms are proposed. Performance of the proposed Jump Rdnn-tree and other traditional indexes (enhanced for wireless broadcast) is evaluated using both uniform and skew data. The results show that Jump Rdnn-tree substantially outperforms the traditional indexes.
虽然RNN在传统的有线、基于磁盘的客户机-服务器环境中得到了很好的研究,但它还没有在无线广播环境中得到解决。无线广播媒体的线性特性和移动设备的节能要求使得这一问题显得尤为有趣和具有挑战性。本文研究了定位相关数据的组织和无线RNN查询的应答问题。提出了一种高效的数据组织——跳跃rdnn树,并给出了相应的搜索算法。使用均匀和倾斜数据评估了所提出的Jump Rdnn-tree和其他传统索引(针对无线广播进行了增强)的性能。结果表明,Jump Rdnn-tree大大优于传统索引。
{"title":"Search RNN on Broadcast Environment","authors":"Lien-Fa Lin","doi":"10.1109/IIH-MSP.2007.273","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.273","url":null,"abstract":"While the RNN is well studied in the traditional wired, disk-based client-server environment, it has not been tackled in a wireless broadcasting environment. The liner property of wireless broadcast media and power conserving requirement of mobile devices make the problem particularly interesting and challenging. In this paper, the issues involved with organizing location dependent data and answering RNN queries on air are investigated. An efficient data organization, called Jump Rdnn-tree, and the corresponding search algorithms are proposed. Performance of the proposed Jump Rdnn-tree and other traditional indexes (enhanced for wireless broadcast) is evaluated using both uniform and skew data. The results show that Jump Rdnn-tree substantially outperforms the traditional indexes.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"16 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120821778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Continuous Tracking of User Emotion in Mandarin Emotional Speech 汉语情感言语中用户情感的连续跟踪
T. Pao, Charles S. Chien, Jun-Heng Yeh, Yu-Te Chen, Yun-Maw Cheng
Emotions play a significant role in decision-making, healthy, perception, human interaction and human intelligence. Automatic recognition of emotion in speech is very desirable because it adds to the human- computer interaction and becomes an important research area in the last years. However, to the best of our knowledge, no works have focused on automatic emotion tracking of continuous Mandarin emotional speech. In this paper, we present an emotion tracking system, by dividing the utterance into several independent segments, each of which contains a single emotional category. Experimental results reveal that the proposed system produces satisfactory results. On our testing database composed of 279 utterances which are obtained by concatenating short sentences, the average accuracy achieves 83% by using weighted D-KNN classifier and LPCC and MFCC features.
情绪在决策、健康、感知、人际交往和人类智力等方面发挥着重要作用。语音中情绪的自动识别增加了人机交互,成为近年来研究的一个重要方向。然而,据我们所知,目前还没有针对汉语连续情感语音的自动情感跟踪的研究。在本文中,我们提出了一个情感跟踪系统,通过将话语分成几个独立的片段,每个片段包含一个单一的情感类别。实验结果表明,该系统取得了满意的效果。在由279个短句拼接而成的话语组成的测试数据库上,采用加权D-KNN分类器和LPCC、MFCC特征,平均准确率达到83%。
{"title":"Continuous Tracking of User Emotion in Mandarin Emotional Speech","authors":"T. Pao, Charles S. Chien, Jun-Heng Yeh, Yu-Te Chen, Yun-Maw Cheng","doi":"10.1109/IIH-MSP.2007.373","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.373","url":null,"abstract":"Emotions play a significant role in decision-making, healthy, perception, human interaction and human intelligence. Automatic recognition of emotion in speech is very desirable because it adds to the human- computer interaction and becomes an important research area in the last years. However, to the best of our knowledge, no works have focused on automatic emotion tracking of continuous Mandarin emotional speech. In this paper, we present an emotion tracking system, by dividing the utterance into several independent segments, each of which contains a single emotional category. Experimental results reveal that the proposed system produces satisfactory results. On our testing database composed of 279 utterances which are obtained by concatenating short sentences, the average accuracy achieves 83% by using weighted D-KNN classifier and LPCC and MFCC features.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127144366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Iterative Method for Lossless Data Embedding in BMP Images 一种用于BMP图像无损数据嵌入的迭代方法
Jia-Hong Lee, Mei-Yi Wu
An iterative method for designing efficient, simple and high-capacity lossless embedding method for BMP images with a 256-color grayscale palette is presented. The proposed method is based on a palette modification scheme, which can iteratively embed message bits into pixels with the most occurrence gray value in a BMP image. In each iteration, both the overhead of removing an entry color in the palette and the benefit of copying another entry color to replace it are calculated. If the maximal benefit exceeds the minimal overhead, an entry color is replaced. Experimental results and performance comparison with other lossless data hiding schemes are presented to show the effectiveness of the proposed method.
提出了一种基于256色灰度调色板的BMP图像高效、简单、高容量无损嵌入的迭代方法。该方法基于调色板修改方案,可以迭代地将信息位嵌入到BMP图像中出现灰度值最多的像素中。在每次迭代中,都会计算从调色板中删除一个条目颜色的开销和复制另一个条目颜色来替换它的好处。如果最大收益超过最小开销,则替换条目颜色。实验结果和与其他无损数据隐藏方案的性能比较表明了该方法的有效性。
{"title":"An Iterative Method for Lossless Data Embedding in BMP Images","authors":"Jia-Hong Lee, Mei-Yi Wu","doi":"10.1109/IIH-MSP.2007.331","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.331","url":null,"abstract":"An iterative method for designing efficient, simple and high-capacity lossless embedding method for BMP images with a 256-color grayscale palette is presented. The proposed method is based on a palette modification scheme, which can iteratively embed message bits into pixels with the most occurrence gray value in a BMP image. In each iteration, both the overhead of removing an entry color in the palette and the benefit of copying another entry color to replace it are calculated. If the maximal benefit exceeds the minimal overhead, an entry color is replaced. Experimental results and performance comparison with other lossless data hiding schemes are presented to show the effectiveness of the proposed method.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127213125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-Time Path Planning of Large-scale Virtual Crowd 大规模虚拟人群实时路径规划
Yongqing Ye, Qingge Ji
We present a two-level structure algorithm for real-time path planning of massive crowd. We use the first level algorithm to calculate the global path, and set a provisional target point for each virtual character. Then we use the second level algorithm to calculate the path to the provisional target point for each virtual character. As shown the simulation results, the proposed algorithm can design a collision-free path for every virtual character with a distinct goal in realtime.
提出了一种两级结构的大规模人群实时路径规划算法。我们使用一级算法计算全局路径,并为每个虚拟角色设置一个临时目标点。然后使用二级算法计算每个虚拟角色到临时目标点的路径。仿真结果表明,该算法可以实时地为每个具有不同目标的虚拟角色设计一条无碰撞的路径。
{"title":"Real-Time Path Planning of Large-scale Virtual Crowd","authors":"Yongqing Ye, Qingge Ji","doi":"10.1109/IIH-MSP.2007.254","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.254","url":null,"abstract":"We present a two-level structure algorithm for real-time path planning of massive crowd. We use the first level algorithm to calculate the global path, and set a provisional target point for each virtual character. Then we use the second level algorithm to calculate the path to the provisional target point for each virtual character. As shown the simulation results, the proposed algorithm can design a collision-free path for every virtual character with a distinct goal in realtime.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"310 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127490253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Near-Reversible Data Embedding Using Histogram Projection 基于直方图投影的鲁棒近可逆数据嵌入
Yuan-Liang Tang, Hui-Tzu Huang
Most data embedding techniques distort the original image as a side effect. To overcome such a problem, reversible data embedding is used to restore the original content after the removal of the embedded data. However, it is assumed that the embedded image is not altered and such a constraint is sometimes considered unnecessary because as long as the image can be restored to an acceptable level, moderate alteration on the embedded image should be allowed. Such a reasoning leads to a new category of techniques called near-reversible data embedding, in which the embedded image is allowed to be manipulated and the image can be restored to some extent that is very close to the original image. In this paper, a novel near-reversible data embedding algorithm is proposed based on projection histogram manipulations. The experimental results demonstrated that proposed algorithm performs very well in terms of embedding capacity, image fidelity, and robustness against common image processing operations.
大多数数据嵌入技术的副作用是使原始图像失真。为了克服这一问题,采用可逆数据嵌入,在移除嵌入的数据后恢复原始内容。然而,假设嵌入的图像没有被改变,这种约束有时被认为是不必要的,因为只要图像可以恢复到可接受的水平,就应该允许对嵌入的图像进行适度的改变。这样的推理导致了一种新的技术,称为近可逆数据嵌入,在这种技术中,嵌入的图像可以被操纵,并且可以在一定程度上恢复到非常接近原始图像的程度。本文提出了一种基于投影直方图处理的近可逆数据嵌入算法。实验结果表明,该算法在嵌入容量、图像保真度和对常见图像处理操作的鲁棒性方面表现良好。
{"title":"Robust Near-Reversible Data Embedding Using Histogram Projection","authors":"Yuan-Liang Tang, Hui-Tzu Huang","doi":"10.1109/IIH-MSP.2007.271","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.271","url":null,"abstract":"Most data embedding techniques distort the original image as a side effect. To overcome such a problem, reversible data embedding is used to restore the original content after the removal of the embedded data. However, it is assumed that the embedded image is not altered and such a constraint is sometimes considered unnecessary because as long as the image can be restored to an acceptable level, moderate alteration on the embedded image should be allowed. Such a reasoning leads to a new category of techniques called near-reversible data embedding, in which the embedded image is allowed to be manipulated and the image can be restored to some extent that is very close to the original image. In this paper, a novel near-reversible data embedding algorithm is proposed based on projection histogram manipulations. The experimental results demonstrated that proposed algorithm performs very well in terms of embedding capacity, image fidelity, and robustness against common image processing operations.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125023811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IMHAP – An Experimental Platform for Humanoid Procedural Animation IMHAP -一个实验平台的人形程序动画
C. Liang, Pai-Cheng Tao, Tsai-Yen Li
Humanoid animation is one of the most common but complicated types of animation. Although more sophisticated animation packages have been developed in recent years, there is no extensible platform allowing researchers to test developed procedures for experimental purposes. In this paper, we present an experimental platform called IMHAP (Intelligent Media Lab's Humanoid Animation Platform) especially for humanoid animation generated with procedural approaches. IMHAP is constructed with a model-view- control (MVC) methodology and features flexibility and extensibility. In addition to present the architecture of the system, we also use a few lower-body motions generated with a procedural approach to demonstrate the use of the system as an experimental testbed for humanoid animation.
人形动画是最常见但也最复杂的动画类型之一。虽然近年来开发了更复杂的动画包,但没有可扩展的平台允许研究人员测试用于实验目的的开发程序。在本文中,我们提出了一个名为IMHAP(智能媒体实验室的类人动画平台)的实验平台,专门用于用程序方法生成的类人动画。IMHAP是用模型-视图-控制(MVC)方法构建的,具有灵活性和可扩展性。除了介绍系统的架构外,我们还使用了一些用程序方法生成的下半身运动来演示该系统作为人形动画的实验测试平台的使用。
{"title":"IMHAP – An Experimental Platform for Humanoid Procedural Animation","authors":"C. Liang, Pai-Cheng Tao, Tsai-Yen Li","doi":"10.1109/IIH-MSP.2007.439","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.439","url":null,"abstract":"Humanoid animation is one of the most common but complicated types of animation. Although more sophisticated animation packages have been developed in recent years, there is no extensible platform allowing researchers to test developed procedures for experimental purposes. In this paper, we present an experimental platform called IMHAP (Intelligent Media Lab's Humanoid Animation Platform) especially for humanoid animation generated with procedural approaches. IMHAP is constructed with a model-view- control (MVC) methodology and features flexibility and extensibility. In addition to present the architecture of the system, we also use a few lower-body motions generated with a procedural approach to demonstrate the use of the system as an experimental testbed for humanoid animation.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125043054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhancement of the Mutual Authentication protocol on RFID Passive Tags RFID无源标签相互认证协议的改进
Kuo-Ching Liu, Hsin-Wei Wang, Hui-Feng Huang
Radio frequency identification (RFID) is being deployed for a wide variety of applications, including supply chain management, inventory, storage, etc. However, RFID systems can have security problems if the tag offers no access control and certificated mechanisms. By utilizing responses from a tag, an adversary may try to obtain the information of the product and trace the user. In 2006, Lee et al. proposed a mutual authentication scheme based on synchronized secret information. They show their scheme offers the most enhanced security feature in RFID mutual authentication to protect a user's privacy and possesses a low computation for tags. However, we will show that Lee et al's scheme is still susceptible to a forgery attack. We also present a simple method to strengthen its security.
射频识别(RFID)正在广泛应用于各种应用,包括供应链管理、库存、存储等。然而,如果标签不提供访问控制和认证机制,RFID系统可能存在安全问题。通过利用来自标签的响应,攻击者可能试图获取产品信息并跟踪用户。2006年,Lee等人提出了一种基于同步秘密信息的相互认证方案。他们表明,该方案在RFID互认证中提供了最增强的安全特性,以保护用户的隐私,并且具有低的标签计算量。然而,我们将证明Lee等人的方案仍然容易受到伪造攻击。我们还提出了一种简单的增强其安全性的方法。
{"title":"Enhancement of the Mutual Authentication protocol on RFID Passive Tags","authors":"Kuo-Ching Liu, Hsin-Wei Wang, Hui-Feng Huang","doi":"10.1109/IIH-MSP.2007.396","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.396","url":null,"abstract":"Radio frequency identification (RFID) is being deployed for a wide variety of applications, including supply chain management, inventory, storage, etc. However, RFID systems can have security problems if the tag offers no access control and certificated mechanisms. By utilizing responses from a tag, an adversary may try to obtain the information of the product and trace the user. In 2006, Lee et al. proposed a mutual authentication scheme based on synchronized secret information. They show their scheme offers the most enhanced security feature in RFID mutual authentication to protect a user's privacy and possesses a low computation for tags. However, we will show that Lee et al's scheme is still susceptible to a forgery attack. We also present a simple method to strengthen its security.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125331377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secret Sharing and Information Hiding by Shadow Images 秘密共享和信息隐藏的阴影图像
Chinchen Chang, T. Kieu
Secret sharing schemes and information hiding schemes have been separately developed by many researchers over years. Some researchers have been integrated information hiding technique into their proposed secret sharing scheme with the purpose of hiding shares and authentication. However, the combination of a secret sharing scheme and an information hiding technique with high embedding capacity is not explored by researchers. This paper presents a new secret sharing and information hiding scheme by grayscale images. The proposed scheme embeds a secret image and a secret bit stream into two shadow images. The experimental results show that the proposed scheme achieves very high embedding capacity (i.e. about 3 bits per pixel). Furthermore, after the secret bit stream has been extracted, the secret image can be completely restored pixel by pixel.
多年来,许多研究人员分别开发了秘密共享方案和信息隐藏方案。一些研究人员将信息隐藏技术集成到他们提出的秘密共享方案中,目的是隐藏共享和身份验证。然而,将秘密共享方案与高嵌入容量的信息隐藏技术相结合的研究尚未得到充分的研究。提出了一种新的基于灰度图像的秘密共享和信息隐藏方案。该方案将一个秘密图像和一个秘密比特流嵌入到两个阴影图像中。实验结果表明,该方案具有很高的嵌入容量(约为每像素3比特)。此外,在提取秘密比特流后,可以逐像素完全恢复秘密图像。
{"title":"Secret Sharing and Information Hiding by Shadow Images","authors":"Chinchen Chang, T. Kieu","doi":"10.1109/IIH-MSP.2007.275","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.275","url":null,"abstract":"Secret sharing schemes and information hiding schemes have been separately developed by many researchers over years. Some researchers have been integrated information hiding technique into their proposed secret sharing scheme with the purpose of hiding shares and authentication. However, the combination of a secret sharing scheme and an information hiding technique with high embedding capacity is not explored by researchers. This paper presents a new secret sharing and information hiding scheme by grayscale images. The proposed scheme embeds a secret image and a secret bit stream into two shadow images. The experimental results show that the proposed scheme achieves very high embedding capacity (i.e. about 3 bits per pixel). Furthermore, after the secret bit stream has been extracted, the secret image can be completely restored pixel by pixel.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122712972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Biometric Verification by Fusing Hand Geometry and Palmprint 融合手部几何和掌纹的生物特征验证
Wen-Shiung Chen, Yao-Shan Chiang, Yen-Hsun Chiu
This paper presents a biometric recognition system with fusion of hand geometry and palmprint of a human hand based on wavelet transform and statistical moments. The feature extraction module adopts the gradient direction (i.e., angle) and quadratic spline function of wavelet transform as the discriminating texture features in palmprint, and the statistical moments calculated from hand geometry. The system generates the palmprint feature codes using a binary gray encoding. The recognition rates up to 94.17%, 95.50%, 96.67%, and 98.33%, respectively, using different feature extraction methods may be achieved.
提出了一种基于小波变换和统计矩的手掌几何特征与掌纹融合的生物特征识别系统。特征提取模块采用小波变换的梯度方向(即角度)和二次样条函数作为掌纹的判别纹理特征,并根据手的几何形状计算统计矩。系统采用二值灰度编码生成掌纹特征码。采用不同的特征提取方法,其识别率分别可达94.17%、95.50%、96.67%和98.33%。
{"title":"Biometric Verification by Fusing Hand Geometry and Palmprint","authors":"Wen-Shiung Chen, Yao-Shan Chiang, Yen-Hsun Chiu","doi":"10.1109/IIH-MSP.2007.351","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.351","url":null,"abstract":"This paper presents a biometric recognition system with fusion of hand geometry and palmprint of a human hand based on wavelet transform and statistical moments. The feature extraction module adopts the gradient direction (i.e., angle) and quadratic spline function of wavelet transform as the discriminating texture features in palmprint, and the statistical moments calculated from hand geometry. The system generates the palmprint feature codes using a binary gray encoding. The recognition rates up to 94.17%, 95.50%, 96.67%, and 98.33%, respectively, using different feature extraction methods may be achieved.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128256461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1