Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.400
S. Oshima, T. Nakashima, Y. Nishikido
To defend DoS (denial of service) Attacks, the access filtering mechanism is adopted on the end servers or the IDS (intrusion detection system). The difficulty to define the filtering rules comes from the hardness to identify normal and anomaly packets from the incoming packets. In this paper, we analyze the amount of incoming packet to our college and extract characters of IP packets classified by the source and destination IP addresses and destination port numbers. We can clearly identify the countries and providers of denial packets and extract the characters of crawls of search engines.
为了防御DoS (denial of service)攻击,终端服务器或入侵检测系统通常采用访问过滤机制。定义过滤规则的困难在于很难从传入报文中识别正常和异常报文。本文分析了我院接收到的数据包数量,并根据源、目的IP地址和目的端口号对IP数据包进行了特征提取。我们可以清楚地识别出拒绝数据包的国家和提供商,并提取出搜索引擎爬虫的特征。
{"title":"Extraction for Characteristics of Anomaly Accessed IP Packets Based on Statistical Analysis","authors":"S. Oshima, T. Nakashima, Y. Nishikido","doi":"10.1109/IIH-MSP.2007.400","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.400","url":null,"abstract":"To defend DoS (denial of service) Attacks, the access filtering mechanism is adopted on the end servers or the IDS (intrusion detection system). The difficulty to define the filtering rules comes from the hardness to identify normal and anomaly packets from the incoming packets. In this paper, we analyze the amount of incoming packet to our college and extract characters of IP packets classified by the source and destination IP addresses and destination port numbers. We can clearly identify the countries and providers of denial packets and extract the characters of crawls of search engines.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116905720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.246
Akira Nishimura
Reproducing stego audio signal via a loudspeaker and detecting embedded data from a recorded sound from a microphone are challenging with respect to the application of data hiding. A watermarking technique using subband amplitude modulation was applied to a system that displays text information synchronously with the watermarked audio signal transmitted in the air. The robustness of the system was evaluated by a computer simulation in terms of the correct rate of data transmission under reverberant and noisy conditions. The results showed that the performance of detection and the temporal precision of synchronization were sufficiently high. Objective measurement of the watermarked audio quality using the PEAQ method revealed that the mean objective difference grade obtained from 100 watermarked music samples exhibited an intermediate value between the mean ODGs of 96-kbps and 128-kbps MP3 encoded music samples.
{"title":"Presentation of Information Synchronized with the Audio Signal Reproduced by Loudspeakers using an AM-based Watermark","authors":"Akira Nishimura","doi":"10.1109/IIH-MSP.2007.246","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.246","url":null,"abstract":"Reproducing stego audio signal via a loudspeaker and detecting embedded data from a recorded sound from a microphone are challenging with respect to the application of data hiding. A watermarking technique using subband amplitude modulation was applied to a system that displays text information synchronously with the watermarked audio signal transmitted in the air. The robustness of the system was evaluated by a computer simulation in terms of the correct rate of data transmission under reverberant and noisy conditions. The results showed that the performance of detection and the temporal precision of synchronization were sufficiently high. Objective measurement of the watermarked audio quality using the PEAQ method revealed that the mean objective difference grade obtained from 100 watermarked music samples exhibited an intermediate value between the mean ODGs of 96-kbps and 128-kbps MP3 encoded music samples.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129398208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.281
S. Salleh, I. Kamarulafizam, A. I. Chowdhury, Mohd. Zin Zamri
This paper describes the architecture and implementation of telemedicine via Internet for heart sounds and hearing screening diagnosis. Web based application are used as a medium for interaction between patients and doctors. Using ActiveX technology and Internet protocol, the biomedical signals are captured and sent to server. To strengthen analyses of heart sounds, time-frequency method using B-distribution technique has been applied. Features of heart sounds were obtained using singular value decomposition. The appointed doctors then view the signals and analyze heart condition. Recommendation of further action can be made and sent to the users.
{"title":"Signal Processing Application for Telemedicine","authors":"S. Salleh, I. Kamarulafizam, A. I. Chowdhury, Mohd. Zin Zamri","doi":"10.1109/IIH-MSP.2007.281","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.281","url":null,"abstract":"This paper describes the architecture and implementation of telemedicine via Internet for heart sounds and hearing screening diagnosis. Web based application are used as a medium for interaction between patients and doctors. Using ActiveX technology and Internet protocol, the biomedical signals are captured and sent to server. To strengthen analyses of heart sounds, time-frequency method using B-distribution technique has been applied. Features of heart sounds were obtained using singular value decomposition. The appointed doctors then view the signals and analyze heart condition. Recommendation of further action can be made and sent to the users.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128728006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.345
M. Sato-Ilic, L. Jain
This paper proposes a clustering method for asymmetric similarity data. In this method, systematic asymmetry in the data is explained by using self-similarity of objects. We exploit an additive fuzzy clustering model for capturing the classification structure in the data. Moreover, the symmetric similarity data is restored by using the result of the clustering method. Therefore, we can exploit many data analyses in which objective data is symmetric similarity data. Several numerical examples are shown in order to show the better performance of the proposed method.
{"title":"Asymmetric Clustering Based on Self-Similarity","authors":"M. Sato-Ilic, L. Jain","doi":"10.1109/IIH-MSP.2007.345","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.345","url":null,"abstract":"This paper proposes a clustering method for asymmetric similarity data. In this method, systematic asymmetry in the data is explained by using self-similarity of objects. We exploit an additive fuzzy clustering model for capturing the classification structure in the data. Moreover, the symmetric similarity data is restored by using the result of the clustering method. Therefore, we can exploit many data analyses in which objective data is symmetric similarity data. Several numerical examples are shown in order to show the better performance of the proposed method.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127019185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.236
D. Fernandes, Ce Zhu
In this paper, we present a new method to perform overlapped block motion compensation (OBMC) using the modified Sigmoid window (MSW). The proposed MSW-OBMC method uses a variable weighting function to generate a window in order to maximally reduce the blocky artifacts on the edges of the block under consideration. It can be applied in any block partitioned motion compensation scheme. Benchmarked with other relevant methods, the proposed method shows better performance in reducing prediction error energy or blocky artifacts.
{"title":"Overlapped Block Motion Compensation Using Modified Sigmoid Window","authors":"D. Fernandes, Ce Zhu","doi":"10.1109/IIH-MSP.2007.236","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.236","url":null,"abstract":"In this paper, we present a new method to perform overlapped block motion compensation (OBMC) using the modified Sigmoid window (MSW). The proposed MSW-OBMC method uses a variable weighting function to generate a window in order to maximally reduce the blocky artifacts on the edges of the block under consideration. It can be applied in any block partitioned motion compensation scheme. Benchmarked with other relevant methods, the proposed method shows better performance in reducing prediction error energy or blocky artifacts.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.223
Chih-Shan Liu, Jen-Chun Lin, Nai-Chung Yang, C. Kuo
Recently, many visual devices are applied to mobile phone, PDA or other products. These devices can receive real-time videos from wireless network or internet. In order to watch video programs, the video frame sizes receiving from various devices must be properly changed. Although many fast downscaling algorithms have been proposed, such as SA, AWA and MDN, their performances do not achieve high visual quality. In this paper, we propose a method to address this problem. Considering the correlation of motion characteristics of neighbor blocks in temporal and spatial domain, the method applies embedded Kalman filter to traditional fast downscaling algorithms. The experimental results indicate that the performance of the proposed method for fast downscaling videos provides an effective improvement.
{"title":"Motion Vector Re-estimation for Trans-coding Using Kalman Filter","authors":"Chih-Shan Liu, Jen-Chun Lin, Nai-Chung Yang, C. Kuo","doi":"10.1109/IIH-MSP.2007.223","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.223","url":null,"abstract":"Recently, many visual devices are applied to mobile phone, PDA or other products. These devices can receive real-time videos from wireless network or internet. In order to watch video programs, the video frame sizes receiving from various devices must be properly changed. Although many fast downscaling algorithms have been proposed, such as SA, AWA and MDN, their performances do not achieve high visual quality. In this paper, we propose a method to address this problem. Considering the correlation of motion characteristics of neighbor blocks in temporal and spatial domain, the method applies embedded Kalman filter to traditional fast downscaling algorithms. The experimental results indicate that the performance of the proposed method for fast downscaling videos provides an effective improvement.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130210896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIHMSP.2007.4457533
Bo Shen, Yong Xu, Guangming Lu, David Zhang
Lacunae is a typical sign of iris, and the detection of lacunae is of great importance in automatic iris diagnosis. In this paper, we first introduce the lacunae detection in iris images. Although current literature has a variety of edge detection algorithms, they do not always lead to acceptable results in extracting various features in an image. Lacunae usually have poor local contrast and the application of existing edge detection algorithms yield results which are not satisfactory. Thus, we proposed a lacunae detecting approach based on Gaussian filters, which is robust to noise. When the Gaussian filter in the vertical orientation is implemented to normalized iris image, the time complexity of this approach is reduced considerably. Experimental results show the validity of this approach.
{"title":"Detecting Iris Lacunae Based on Gaussian Filter","authors":"Bo Shen, Yong Xu, Guangming Lu, David Zhang","doi":"10.1109/IIHMSP.2007.4457533","DOIUrl":"https://doi.org/10.1109/IIHMSP.2007.4457533","url":null,"abstract":"Lacunae is a typical sign of iris, and the detection of lacunae is of great importance in automatic iris diagnosis. In this paper, we first introduce the lacunae detection in iris images. Although current literature has a variety of edge detection algorithms, they do not always lead to acceptable results in extracting various features in an image. Lacunae usually have poor local contrast and the application of existing edge detection algorithms yield results which are not satisfactory. Thus, we proposed a lacunae detecting approach based on Gaussian filters, which is robust to noise. When the Gaussian filter in the vertical orientation is implemented to normalized iris image, the time complexity of this approach is reduced considerably. Experimental results show the validity of this approach.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130519795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.362
Z. Salleh, M. Y. Mashor, Nor Rizuan Mat Noor, S. Aniza, N. Rahim, A. Wahab, S. Noor, F. Idris, H. Hasan
The Ziehl-Neelsen stain, also known as the acid-fast stain, was first described by two German doctors; Franz Ziehl (1859 to 1926), a bacteriologist and Friedrich Neelsen (1854 to 1894), a pathologist.It is a special bacteriological stain used to identify acid-fast Mycobacteria. The preparation of Ziehl-Neelsen slides require several procedures and the slide should be examined under oil immersion by using the 100X magnification. There are some factors that may degrade the image quality such as under expose, over expose, under stain and thick samples. Thus, the images should be enhanced to improve the image quality in term of contrast and intensity. This paper proposes a contrast enhancement technique based on bright stretching and dark stretching algorithms for color images. Although the adopted image processing technique is quite simple, the results indicate that our method may have some potential to be used for improving the quality of Ziehl-Neelsen slide images.
{"title":"Colour Contrast Enhancement Based on Bright and Dark Stretching for Ziehl-Neelsen Slide Images","authors":"Z. Salleh, M. Y. Mashor, Nor Rizuan Mat Noor, S. Aniza, N. Rahim, A. Wahab, S. Noor, F. Idris, H. Hasan","doi":"10.1109/IIH-MSP.2007.362","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.362","url":null,"abstract":"The Ziehl-Neelsen stain, also known as the acid-fast stain, was first described by two German doctors; Franz Ziehl (1859 to 1926), a bacteriologist and Friedrich Neelsen (1854 to 1894), a pathologist.It is a special bacteriological stain used to identify acid-fast Mycobacteria. The preparation of Ziehl-Neelsen slides require several procedures and the slide should be examined under oil immersion by using the 100X magnification. There are some factors that may degrade the image quality such as under expose, over expose, under stain and thick samples. Thus, the images should be enhanced to improve the image quality in term of contrast and intensity. This paper proposes a contrast enhancement technique based on bright stretching and dark stretching algorithms for color images. Although the adopted image processing technique is quite simple, the results indicate that our method may have some potential to be used for improving the quality of Ziehl-Neelsen slide images.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130703462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chin-Feng Lin, Cheng-Hsing Chung, Zhi-Lu Chen, Chang-Jin Song, Zhi-Xiang Wang
In this paper, we propose a chaos base unequal encryption mechanism for which can apply in mobile medicine system. A main idea for using chaos sequence is to increase the un- predication compared with other kind of random sequences. In addition, an essential feature of this unequal encryption scheme is that a bit stream mapping of ID chaotic scrambler and a permutation scheme are allocated to the medical information that requires higher level encryption. In contrast, a bit stream mapping of ID chaotic scrambler are granted to messages that can tolerate low level encryption but meet high speed encryption. Simulation results show when correct deciphering parameters are put in, the signal will be completely recovered. As long as there is an input parameter error, for example, with 0.00000001% initial point error, it could make chaotic array, and the encrypted signals will not be recovered back.
{"title":"A Chaos Based Unequal Encryption Mechanism in Mobile Medicine System","authors":"Chin-Feng Lin, Cheng-Hsing Chung, Zhi-Lu Chen, Chang-Jin Song, Zhi-Xiang Wang","doi":"10.1109/IIH-MSP.2007.5","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.5","url":null,"abstract":"In this paper, we propose a chaos base unequal encryption mechanism for which can apply in mobile medicine system. A main idea for using chaos sequence is to increase the un- predication compared with other kind of random sequences. In addition, an essential feature of this unequal encryption scheme is that a bit stream mapping of ID chaotic scrambler and a permutation scheme are allocated to the medical information that requires higher level encryption. In contrast, a bit stream mapping of ID chaotic scrambler are granted to messages that can tolerate low level encryption but meet high speed encryption. Simulation results show when correct deciphering parameters are put in, the signal will be completely recovered. As long as there is an input parameter error, for example, with 0.00000001% initial point error, it could make chaotic array, and the encrypted signals will not be recovered back.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"33 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132870888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-11-26DOI: 10.1109/IIH-MSP.2007.214
Hsiang-Cheh Huang, Yu-Hsiu Huang, Jeng-Shyang Pan, Yuh-Yih Lu
We propose an effective scheme for protecting and recovering sensitive information based on reversible data hiding techniques in this paper. It is commonly seen that confidential information within an image is deliberately removed, marked or mosaicked before being delivered to the public, including displaying the marked images on the TV screens or newspapers. However, in some cases such as the plate number of VIP's car, the information need be retained by some means. With our scheme, confidential information in an image can be protected, and then adaptively hidden, based on the characteristics of original image, with reversible data hiding techniques. It is done by first mosaicking the region with confidential information, and then delivering the modified image to the public. Only those who have the right to view the confidential information can recover original image with the secret key. Simulation results demonstrate their applicability and usefulness.
{"title":"Information Protection and Recovery with Reversible Data Hiding","authors":"Hsiang-Cheh Huang, Yu-Hsiu Huang, Jeng-Shyang Pan, Yuh-Yih Lu","doi":"10.1109/IIH-MSP.2007.214","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.214","url":null,"abstract":"We propose an effective scheme for protecting and recovering sensitive information based on reversible data hiding techniques in this paper. It is commonly seen that confidential information within an image is deliberately removed, marked or mosaicked before being delivered to the public, including displaying the marked images on the TV screens or newspapers. However, in some cases such as the plate number of VIP's car, the information need be retained by some means. With our scheme, confidential information in an image can be protected, and then adaptively hidden, based on the characteristics of original image, with reversible data hiding techniques. It is done by first mosaicking the region with confidential information, and then delivering the modified image to the public. Only those who have the right to view the confidential information can recover original image with the secret key. Simulation results demonstrate their applicability and usefulness.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132048443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}