Songzhu Mei, Jiangjiang Wu, Yong Cheng, Jun Ma, Jiangchun Ren, Xiaoxing Li
Cloud computing bring a tremendous complexity to information security. Many researches have been done to establish and maintain the trust relationship in cloud. Remote attestation is one of the most important feature of trusted computing. But conventional ways of remote attestation can only attest to the presence of a particular binary. They cannot measure program behavior. Existing dynamic remote attestation technologies can solve some of these problems. But they are not suitable for cloud computing when users lose their control over their critical data and business processes. In our opinion, cloud should give controls back to the users at some extent. So we propose TBVMM, a novel mechanism for cloud computing to fill the trust gap between the infrastructure and upper software stacks. TBVMM will pave a way for establishing better trust relationships in cloud environments.
{"title":"Trusted Bytecode Virtual Machine Module: Towards Dynamic Remote Attestation in Cloud Computing","authors":"Songzhu Mei, Jiangjiang Wu, Yong Cheng, Jun Ma, Jiangchun Ren, Xiaoxing Li","doi":"10.1109/IPTC.2011.12","DOIUrl":"https://doi.org/10.1109/IPTC.2011.12","url":null,"abstract":"Cloud computing bring a tremendous complexity to information security. Many researches have been done to establish and maintain the trust relationship in cloud. Remote attestation is one of the most important feature of trusted computing. But conventional ways of remote attestation can only attest to the presence of a particular binary. They cannot measure program behavior. Existing dynamic remote attestation technologies can solve some of these problems. But they are not suitable for cloud computing when users lose their control over their critical data and business processes. In our opinion, cloud should give controls back to the users at some extent. So we propose TBVMM, a novel mechanism for cloud computing to fill the trust gap between the infrastructure and upper software stacks. TBVMM will pave a way for establishing better trust relationships in cloud environments.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129527677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multiple objects tracking is a challenging task. This article presents an algorithm which can detect and track multiple objects, and update target model automatically. The contributions of this paper as follow: Firstly, we use color histogram(HC) and histogram of orientated gradients(HOG) to represent the objects, model update is realized under the frame of kalman filter and gaussian model, secondly we use Gaussian Mixture Model(GMM) and Bhattacharyya distance to detect object appearance. Particle filter with combined features and model update mechanism can improve tracking effects. Experiments on video sequences demonstrate that multiple objects tracking based on improved algorithm have good performance.
{"title":"Model Update Particle Filter for Multiple Objects Detection and Tracking","authors":"Yunji Zhao, Hailong Pei","doi":"10.1109/IPTC.2011.10","DOIUrl":"https://doi.org/10.1109/IPTC.2011.10","url":null,"abstract":"Multiple objects tracking is a challenging task. This article presents an algorithm which can detect and track multiple objects, and update target model automatically. The contributions of this paper as follow: Firstly, we use color histogram(HC) and histogram of orientated gradients(HOG) to represent the objects, model update is realized under the frame of kalman filter and gaussian model, secondly we use Gaussian Mixture Model(GMM) and Bhattacharyya distance to detect object appearance. Particle filter with combined features and model update mechanism can improve tracking effects. Experiments on video sequences demonstrate that multiple objects tracking based on improved algorithm have good performance.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces definition of machine learning and the basic structure, describes a variety of machine learning methods, compares and analyzes their advantages and their limitations, introduces the main research areas of machine learning, especially introduces technological application of machine learning methods.
{"title":"Machine Learning Methods and Their Application Research","authors":"Haoyong Lv, Hengyao Tang","doi":"10.1109/IPTC.2011.34","DOIUrl":"https://doi.org/10.1109/IPTC.2011.34","url":null,"abstract":"This paper introduces definition of machine learning and the basic structure, describes a variety of machine learning methods, compares and analyzes their advantages and their limitations, introduces the main research areas of machine learning, especially introduces technological application of machine learning methods.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"577 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134410336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Introduce the research contents of computer graphics research, development history, composition and function of the graphics system, applications and implementation of realistic graphics technology, generalize the graphics basic content, in order to better grasp the computer graphics and image processing technology.
{"title":"A Survey of Computer Graphics and Graphics Image Processing Technology","authors":"Haoyong Lv, Zhihong Wu","doi":"10.1109/IPTC.2011.57","DOIUrl":"https://doi.org/10.1109/IPTC.2011.57","url":null,"abstract":"Introduce the research contents of computer graphics research, development history, composition and function of the graphics system, applications and implementation of realistic graphics technology, generalize the graphics basic content, in order to better grasp the computer graphics and image processing technology.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to remove noise effectively and reduce the loss of original information in image processing, a new parallel Gaussian filtering algorithm (PGF) based on Graphics Processing Units (GPU) is presented in this letter. The proposed method compares color difference between neighboring of the pixel and the center of the pixel before making Recursive Gaussian filter, moreover it can improve the speed of calculation using GPU. In our experiment, the image of LiNa (size of 512 pixel×512 pixel) is chosen to test our algorithm. The results show that our algorithm improves the PSNR of image, and the speed of GPU processing is more than eight times faster than CPU processing.
{"title":"A Parallel Gaussian Filtering Algorithm Based on Color Difference","authors":"Y. Ma, K. Xie, Minfang Peng","doi":"10.1109/IPTC.2011.20","DOIUrl":"https://doi.org/10.1109/IPTC.2011.20","url":null,"abstract":"In order to remove noise effectively and reduce the loss of original information in image processing, a new parallel Gaussian filtering algorithm (PGF) based on Graphics Processing Units (GPU) is presented in this letter. The proposed method compares color difference between neighboring of the pixel and the center of the pixel before making Recursive Gaussian filter, moreover it can improve the speed of calculation using GPU. In our experiment, the image of LiNa (size of 512 pixel×512 pixel) is chosen to test our algorithm. The results show that our algorithm improves the PSNR of image, and the speed of GPU processing is more than eight times faster than CPU processing.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116507596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital watermarking is an efficient method to protect multimedia documents. Robust watermarks, which survive to any change or alteration of the protected documents, are typically used for copyright protection. Fragile watermarks, which are vulnerable to a little alteration, are typically used for content authentication. In the paper, we propose a hybrid watermarking method joining a robust and a fragile watermark, and thus combining copyright protection and content authentication. As a result this approach is at the same time resistant against tampering and copy attacks. Our contribution is setting up the relationship between fragile watermark and robust watermark. We make use of DCT coefficients to embed watermark information. The experimental results show that the proposed method can resist tampering and copy attacks at the same time.
{"title":"A Hybrid Watermarking Technique to Resist Tampering and Copy Attacks","authors":"Peng Zheng, Weihua Wang, Juanjuan Wang","doi":"10.1109/IPTC.2011.35","DOIUrl":"https://doi.org/10.1109/IPTC.2011.35","url":null,"abstract":"Digital watermarking is an efficient method to protect multimedia documents. Robust watermarks, which survive to any change or alteration of the protected documents, are typically used for copyright protection. Fragile watermarks, which are vulnerable to a little alteration, are typically used for content authentication. In the paper, we propose a hybrid watermarking method joining a robust and a fragile watermark, and thus combining copyright protection and content authentication. As a result this approach is at the same time resistant against tampering and copy attacks. Our contribution is setting up the relationship between fragile watermark and robust watermark. We make use of DCT coefficients to embed watermark information. The experimental results show that the proposed method can resist tampering and copy attacks at the same time.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121891790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
While modern anti-counterfeiting printing technologies usually adopt special ink, laser holographic images, line texture, they need to increase certain supporting printing equipment and the cost. They have such shortcomings as high cost, complex technology, narrow application area and no information hiding, etc. This paper aiming at these problems proposes a kind of information hiding technology based on the shapes of halftone-AM-dot(Amplitude Modulation). The technology combining modern communication modulation technology and information coding technology, chooses anti-counterfeiting information as modulation signal to modulate dot shapes and makes itself carry information in AM screening image process. After plenty of experimental simulation, this method realized the information hiding. It can be used to anti-counterfeiting printing with low cost and excellent performance.
{"title":"The Shapes of Halftone-AM-Dots Based on Information Hiding","authors":"X. Yi, Cao Peng","doi":"10.1109/IPTC.2011.22","DOIUrl":"https://doi.org/10.1109/IPTC.2011.22","url":null,"abstract":"While modern anti-counterfeiting printing technologies usually adopt special ink, laser holographic images, line texture, they need to increase certain supporting printing equipment and the cost. They have such shortcomings as high cost, complex technology, narrow application area and no information hiding, etc. This paper aiming at these problems proposes a kind of information hiding technology based on the shapes of halftone-AM-dot(Amplitude Modulation). The technology combining modern communication modulation technology and information coding technology, chooses anti-counterfeiting information as modulation signal to modulate dot shapes and makes itself carry information in AM screening image process. After plenty of experimental simulation, this method realized the information hiding. It can be used to anti-counterfeiting printing with low cost and excellent performance.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132084186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to improve the solution accuracy and the convergence of Population Migration Algorithm (PMA) and avoiding its prematurity, in this paper, we combined chaos theory with PMA. By introducing logistic mapping of chaos theory into PMA, we use the ergodicity, randomicity and regularity of chaos theory to attain an improved algorithm. The experimental results show that: by introducing the ergodicity, randomicity and regularity of chaos theory into PMA, the solution accuracy and the convergence property of PMA can effectively improve and effectively avoid prematurity phenomenon. The improved algorithm performs very well.
{"title":"A New Population Migration Algorithm Based on the Chaos Theory","authors":"Yuwu Lu, Xueying Liu","doi":"10.1109/IPTC.2011.44","DOIUrl":"https://doi.org/10.1109/IPTC.2011.44","url":null,"abstract":"In order to improve the solution accuracy and the convergence of Population Migration Algorithm (PMA) and avoiding its prematurity, in this paper, we combined chaos theory with PMA. By introducing logistic mapping of chaos theory into PMA, we use the ergodicity, randomicity and regularity of chaos theory to attain an improved algorithm. The experimental results show that: by introducing the ergodicity, randomicity and regularity of chaos theory into PMA, the solution accuracy and the convergence property of PMA can effectively improve and effectively avoid prematurity phenomenon. The improved algorithm performs very well.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130979003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The computational complexity of H.264 video coding standard is two or three times higher than that of H.263 and MPEG-4. Especially, the operation of the entropy coding is one of the most time-consuming parts in the decoder. According to the characteristics of two-dimensional code table for CAVLC, a fast algorithm was proposed in H.264 decoder implementation, which enable different strategies to be made respectively based on the Variable Length Codes and the Fixed Length Codes existing in two-dimensional code table for CAVLC. The computer simulation results indicate that the decoding time of the entropy decode algorithm can be decreased by 75.1%-82.7% than the original algorithm in the H.264 reference software.
{"title":"An Optimization for CAVLC Code Table Lookup Algorithm in H. 264 Decoder","authors":"Da Lu, Guofan Liu, Lingli Zhu","doi":"10.1109/IPTC.2011.27","DOIUrl":"https://doi.org/10.1109/IPTC.2011.27","url":null,"abstract":"The computational complexity of H.264 video coding standard is two or three times higher than that of H.263 and MPEG-4. Especially, the operation of the entropy coding is one of the most time-consuming parts in the decoder. According to the characteristics of two-dimensional code table for CAVLC, a fast algorithm was proposed in H.264 decoder implementation, which enable different strategies to be made respectively based on the Variable Length Codes and the Fixed Length Codes existing in two-dimensional code table for CAVLC. The computer simulation results indicate that the decoding time of the entropy decode algorithm can be decreased by 75.1%-82.7% than the original algorithm in the H.264 reference software.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123116178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruifeng Xu, Li-xin Ma, Bo Hu, He-ran Ma, Bo-hao Tao
In order to prevent the harm of corona, the power sector needs to detect and analyze the fault of corona discharge. This paper put forward a single-channel structure corona detection system based on solar-blind UV detection technology, which is able to locate corona discharge effectively. And the absolute discharge area formula has been derived to quantify the corona discharge intensity. On that basis, a corona discharge fault diagnosis method has been built based on BP neural network, which can make the correct classification of the corona failure.
{"title":"Intelligent High-Voltage Discharge Fault Detection and Its Diagnosis Methods Based on ANN","authors":"Ruifeng Xu, Li-xin Ma, Bo Hu, He-ran Ma, Bo-hao Tao","doi":"10.1109/IPTC.2011.37","DOIUrl":"https://doi.org/10.1109/IPTC.2011.37","url":null,"abstract":"In order to prevent the harm of corona, the power sector needs to detect and analyze the fault of corona discharge. This paper put forward a single-channel structure corona detection system based on solar-blind UV detection technology, which is able to locate corona discharge effectively. And the absolute discharge area formula has been derived to quantify the corona discharge intensity. On that basis, a corona discharge fault diagnosis method has been built based on BP neural network, which can make the correct classification of the corona failure.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130892057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}