首页 > 最新文献

2009 Ninth International Conference on Hybrid Intelligent Systems最新文献

英文 中文
A Novel Data Purification Algorithm Based on Outlier Mining 一种新的基于离群值挖掘的数据净化算法
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.231
Jianfeng Dong, Xiaofeng Wang, Feng Hu, Liyan Xiao
This paper presents a data purification algorithm based on outlier mining. In order to implement the purifying of training data, we define the central bias function of complex events and dissimilarity function of event set, and put forward an exception set growth algorithm based on bias priority. Experiment proves that the algorithm can solve non-deterministic polynomial hard and control the algorithm complexity within polynomial complexity.
提出了一种基于离群值挖掘的数据净化算法。为了实现训练数据的净化,定义了复杂事件的中心偏差函数和事件集的不相似函数,提出了一种基于偏差优先级的异常集生长算法。实验证明,该算法能较好地求解非确定性多项式,并将算法复杂度控制在多项式复杂度以内。
{"title":"A Novel Data Purification Algorithm Based on Outlier Mining","authors":"Jianfeng Dong, Xiaofeng Wang, Feng Hu, Liyan Xiao","doi":"10.1109/HIS.2009.231","DOIUrl":"https://doi.org/10.1109/HIS.2009.231","url":null,"abstract":"This paper presents a data purification algorithm based on outlier mining. In order to implement the purifying of training data, we define the central bias function of complex events and dissimilarity function of event set, and put forward an exception set growth algorithm based on bias priority. Experiment proves that the algorithm can solve non-deterministic polynomial hard and control the algorithm complexity within polynomial complexity.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Application of Intelligent Control to Combustion Control System of CFB Boiler 智能控制在循环流化床锅炉燃烧控制系统中的应用
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.145
Qingjin Meng, B. Xing, Hongliang Yu, Jingjian Wu
The combustion in circulated fluidized-bed (CFB) boiler is a complex and multi-variables coupling process. It is too difficult to build an exact mathematic model to describe the process. The main stream pressure control is an important subsystem of burning system, and it is difficult for the norm PID algorithm to control it. According to these, the human-simulated intelligent control technique is applied to the main steam pressure. It compensates the disadvantages of traditional control method and had perfect advantages in economy and in reality. The control rules of the controller can be modified, compensated and perfect in the practical operation. The practice shows that this controller has strong self-adaptability.
循环流化床锅炉的燃烧是一个复杂的多变量耦合过程。要建立一个精确的数学模型来描述这一过程太难了。主流压力控制是燃烧系统的一个重要子系统,常规PID算法难以对其进行控制。在此基础上,将仿人智能控制技术应用于主蒸汽压力控制。它弥补了传统控制方法的不足,具有较好的经济性和现实性。该控制器的控制规则在实际操作中可以修改、补偿和完善。实践表明,该控制器具有较强的自适应性。
{"title":"The Application of Intelligent Control to Combustion Control System of CFB Boiler","authors":"Qingjin Meng, B. Xing, Hongliang Yu, Jingjian Wu","doi":"10.1109/HIS.2009.145","DOIUrl":"https://doi.org/10.1109/HIS.2009.145","url":null,"abstract":"The combustion in circulated fluidized-bed (CFB) boiler is a complex and multi-variables coupling process. It is too difficult to build an exact mathematic model to describe the process. The main stream pressure control is an important subsystem of burning system, and it is difficult for the norm PID algorithm to control it. According to these, the human-simulated intelligent control technique is applied to the main steam pressure. It compensates the disadvantages of traditional control method and had perfect advantages in economy and in reality. The control rules of the controller can be modified, compensated and perfect in the practical operation. The practice shows that this controller has strong self-adaptability.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123158988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Developed Restricted Rotation for Binary Trees Transformation 二叉树变换的一种发展的受限旋转
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.23
Ro-Yu Wu, Jou-Ming Chang, Chir-Ho Chang
In this paper, we use four types of restricted rotations for tree transformation proposed by Wu et al [13] and develop their algorithm to transform weight sequences between any two binary trees. Converting a source tree to a destination tree, it is not necessary to rotate each pair of corresponding nodes whose weights are the same. From the proposed algorithm, we can also obtain an upper bound of n - 1 between any two binary trees.
在本文中,我们使用Wu等[13]提出的四种受限旋转进行树变换,并开发了任意两棵二叉树之间权序列变换的算法。在将源树转换为目标树时,不需要旋转每一对权值相同的对应节点。利用该算法,我们还可以得到任意两棵二叉树之间n - 1的上界。
{"title":"A Developed Restricted Rotation for Binary Trees Transformation","authors":"Ro-Yu Wu, Jou-Ming Chang, Chir-Ho Chang","doi":"10.1109/HIS.2009.23","DOIUrl":"https://doi.org/10.1109/HIS.2009.23","url":null,"abstract":"In this paper, we use four types of restricted rotations for tree transformation proposed by Wu et al [13] and develop their algorithm to transform weight sequences between any two binary trees. Converting a source tree to a destination tree, it is not necessary to rotate each pair of corresponding nodes whose weights are the same. From the proposed algorithm, we can also obtain an upper bound of n - 1 between any two binary trees.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123168299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LSB Algorithm Research Based on Chaos 基于混沌的LSB算法研究
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.201
Guang-ming Yang, Yang Zhou
In this paper, we have researched the conceptions and methods of the image compression and chaotic, then improved the information hiding algorithm based on the Least Significant Bits (LSB). Embedding the compressed watermarking image in the host image with chaotic method, this can enhance the robustness and security of the LSB algorithm. The experiment results demonstrate that the algorithm is stable and robust to attacks; it can improve the performance of image watermarking.
本文研究了图像压缩和混沌的概念和方法,改进了基于最小有效位(LSB)的信息隐藏算法。利用混沌方法将压缩后的水印图像嵌入到主机图像中,增强了LSB算法的鲁棒性和安全性。实验结果表明,该算法具有较强的鲁棒性和稳定性;它可以提高图像水印的性能。
{"title":"LSB Algorithm Research Based on Chaos","authors":"Guang-ming Yang, Yang Zhou","doi":"10.1109/HIS.2009.201","DOIUrl":"https://doi.org/10.1109/HIS.2009.201","url":null,"abstract":"In this paper, we have researched the conceptions and methods of the image compression and chaotic, then improved the information hiding algorithm based on the Least Significant Bits (LSB). Embedding the compressed watermarking image in the host image with chaotic method, this can enhance the robustness and security of the LSB algorithm. The experiment results demonstrate that the algorithm is stable and robust to attacks; it can improve the performance of image watermarking.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128831574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research and Implementation of Embedded Intelligent Network Self-Healing Equipment Based on E1 Link 基于E1链路的嵌入式智能网络自愈设备的研究与实现
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.157
Jingping Song, Zhiliang Zhu, Ye Yang, Hai Yu, Mengmeng Li
An intelligent network self-healing solution with regard to the current problem existing in the dedicated network was proposed in this paper. The solution can implement the self-healing by introducing intelligent network self-healing devices which were developed and produced on our own between outside and inside networks, without changing of the current network structure. The devices enable the 1 + 1 hot backup of links and also possess functions such as malfunction supervision, localization, automatic processing, etc.
针对目前专用网络中存在的问题,提出了一种智能网络自愈方案。该方案在不改变现有网络结构的情况下,通过在内部网络和外部网络之间引入自主研发的智能网络自愈装置实现自愈。设备实现1 + 1链路热备份,并具有故障监控、定位、自动处理等功能。
{"title":"Research and Implementation of Embedded Intelligent Network Self-Healing Equipment Based on E1 Link","authors":"Jingping Song, Zhiliang Zhu, Ye Yang, Hai Yu, Mengmeng Li","doi":"10.1109/HIS.2009.157","DOIUrl":"https://doi.org/10.1109/HIS.2009.157","url":null,"abstract":"An intelligent network self-healing solution with regard to the current problem existing in the dedicated network was proposed in this paper. The solution can implement the self-healing by introducing intelligent network self-healing devices which were developed and produced on our own between outside and inside networks, without changing of the current network structure. The devices enable the 1 + 1 hot backup of links and also possess functions such as malfunction supervision, localization, automatic processing, etc.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117306136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Design of Embedded VideoTelephone Based on PJSIP Stack 基于PJSIP栈的嵌入式可视电话软件设计
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.261
Lifeng Wei, Qinghui Wang, Hongwei Ren
Considering the high requirement of the ability to process data, BF561 is chosen as hardware platform, which is the new microprocessor especially designed for multimedia application, so are the embedded operation system uClinux whose kernel can be configured freely and the PJSIP stack to develop the endpoint. The video telephone endpoint is achieved which integrates software and hardware, transmit data through networks, has lower power consumption. By means of online test, this endpoint works smoothly.
考虑到对数据处理能力的高要求,选用BF561作为硬件平台,它是专为多媒体应用设计的新型微处理器,选用内核可自由配置的嵌入式操作系统uClinux,采用PJSIP栈开发端点。实现了软硬件一体化、数据通过网络传输、低功耗的视频电话终端。通过在线测试,该端点工作正常。
{"title":"Software Design of Embedded VideoTelephone Based on PJSIP Stack","authors":"Lifeng Wei, Qinghui Wang, Hongwei Ren","doi":"10.1109/HIS.2009.261","DOIUrl":"https://doi.org/10.1109/HIS.2009.261","url":null,"abstract":"Considering the high requirement of the ability to process data, BF561 is chosen as hardware platform, which is the new microprocessor especially designed for multimedia application, so are the embedded operation system uClinux whose kernel can be configured freely and the PJSIP stack to develop the endpoint. The video telephone endpoint is achieved which integrates software and hardware, transmit data through networks, has lower power consumption. By means of online test, this endpoint works smoothly.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115237874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Concealment Searching Model in P2P Network P2P网络中一种有效的隐藏搜索模型
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.194
Hongfeng Zhu, Tianhua Liu, Zhenhua Tan
Abstract With the development of application of the peer-to-peer networks, the problem of the privacy preservation has aroused extensive concern. Though many previous researches have focused on the realization of the anonymous communications, these anonymous technologies usually need complex structures which increase the cost of maintenance and the difficulty of management, and prolong the transmission delay. Aimed at the privacy preservation of searching content in P2P network, especially the network without searching server, a concealment searching model based on one-way function and Soundex algorithm is proposed. It can protect searching content of peers and resist attacks of snooping, replay, disguise and so on, meanwhile the model support accurate search and fuzzy search. According to the analysis, this concealment searching model achieves relatively high security as well as searching effectively.
随着点对点网络应用的发展,隐私保护问题引起了广泛关注。虽然以往的许多研究都集中在匿名通信的实现上,但这些匿名技术通常需要复杂的结构,增加了维护成本和管理难度,并延长了传输延迟。针对P2P网络特别是无搜索服务器网络中搜索内容的隐私保护问题,提出了一种基于单向函数和Soundex算法的隐藏搜索模型。该模型能够保护对等体的搜索内容,抵御窥探、重播、伪装等攻击,同时支持精确搜索和模糊搜索。分析表明,该隐蔽性搜索模型具有较高的安全性和较好的搜索效果。
{"title":"An Efficient Concealment Searching Model in P2P Network","authors":"Hongfeng Zhu, Tianhua Liu, Zhenhua Tan","doi":"10.1109/HIS.2009.194","DOIUrl":"https://doi.org/10.1109/HIS.2009.194","url":null,"abstract":"Abstract With the development of application of the peer-to-peer networks, the problem of the privacy preservation has aroused extensive concern. Though many previous researches have focused on the realization of the anonymous communications, these anonymous technologies usually need complex structures which increase the cost of maintenance and the difficulty of management, and prolong the transmission delay. Aimed at the privacy preservation of searching content in P2P network, especially the network without searching server, a concealment searching model based on one-way function and Soundex algorithm is proposed. It can protect searching content of peers and resist attacks of snooping, replay, disguise and so on, meanwhile the model support accurate search and fuzzy search. According to the analysis, this concealment searching model achieves relatively high security as well as searching effectively.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124537992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing and Evaluating a Rule-Based Approach to Querying Regular EL+ Ontologies 基于规则的正则EL+本体查询方法的实现与评估
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.314
Yuting Zhao, Jeff Z. Pan, Y. Ren
Recent years have witnessed the wide recognition of the importance of ontology and rule in the AI research. In this paper, we report our implementation and evaluation of a rule-based approach to querying regular EL+, a restriction of a well known description logics based ontology language EL+, by only allowing regular role axioms. It is known that, without such a restriction, query answering in EL+ in general is undividable. In our approach, a regular EL+ ontology is first translated into a logic program which contains a set of rules, and then by forward chaining reasoning the pseudo model of the above logic program is calculated. Query answering for EL+ is rewritten to instance checking in the pseudo model of a logic program. To the best of our knowledge, this is the first report of implementation and evaluation for regular EL+ ontologism.
近年来,本体和规则在人工智能研究中的重要性得到了广泛的认识。在本文中,我们报告了一种基于规则的方法的实现和评估,该方法通过只允许正则角色公理来查询正则EL+,正则EL+是基于描述逻辑的本体语言EL+的限制。我们知道,在没有这种限制的情况下,EL+中的查询回答一般是不可除的。在我们的方法中,首先将常规的EL+本体转换为包含一组规则的逻辑程序,然后通过前向链推理计算出上述逻辑程序的伪模型。将EL+的查询应答重写为逻辑程序伪模型中的实例检查。据我们所知,这是第一个关于常规EL+本体的实现和评估的报告。
{"title":"Implementing and Evaluating a Rule-Based Approach to Querying Regular EL+ Ontologies","authors":"Yuting Zhao, Jeff Z. Pan, Y. Ren","doi":"10.1109/HIS.2009.314","DOIUrl":"https://doi.org/10.1109/HIS.2009.314","url":null,"abstract":"Recent years have witnessed the wide recognition of the importance of ontology and rule in the AI research. In this paper, we report our implementation and evaluation of a rule-based approach to querying regular EL+, a restriction of a well known description logics based ontology language EL+, by only allowing regular role axioms. It is known that, without such a restriction, query answering in EL+ in general is undividable. In our approach, a regular EL+ ontology is first translated into a logic program which contains a set of rules, and then by forward chaining reasoning the pseudo model of the above logic program is calculated. Query answering for EL+ is rewritten to instance checking in the pseudo model of a logic program. To the best of our knowledge, this is the first report of implementation and evaluation for regular EL+ ontologism.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Automated Thickness Measurement of Nacreous Layer of Seawater Pearls Based on Optical Coherence Tomography 基于光学相干层析成像的海水珍珠珍珠层厚度自动测量
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.72
Chengkun Xue, Yankui Sun, Daoshun Wang, Peng Li
The nondestructive optical coherence tomography measurement can show the shell-nucleus features, quantify the nacre thickness and thus has the potential to identify or grade the pearls [1]. However, the automated thickness measurement of nacreous layer based on OCT has not been reported. In this article, an automated approach is first time proposed to measure the thickness of nacreous layer using OCT raw data. This approach made use of the signal characteristic of OCT scan line, integrated with support vector machine (SVM), hidden markov model (HMM) and circle fitting technologies to measure the thickness of the nacreous layer of seawater pearls. The experimental results show this approach is accurate and adaptable.
无损光学相干层析成像测量可以显示壳核特征,量化珍珠层厚度,从而有可能对珍珠进行识别或分级[1]。然而,基于OCT的珠光层厚度自动测量尚未见报道。本文首次提出了一种利用OCT原始数据自动测量珠光层厚度的方法。该方法利用OCT扫描线的信号特征,结合支持向量机(SVM)、隐马尔可夫模型(HMM)和圆拟合技术对海水珍珠珍珠层厚度进行测量。实验结果表明,该方法准确、适应性强。
{"title":"Automated Thickness Measurement of Nacreous Layer of Seawater Pearls Based on Optical Coherence Tomography","authors":"Chengkun Xue, Yankui Sun, Daoshun Wang, Peng Li","doi":"10.1109/HIS.2009.72","DOIUrl":"https://doi.org/10.1109/HIS.2009.72","url":null,"abstract":"The nondestructive optical coherence tomography measurement can show the shell-nucleus features, quantify the nacre thickness and thus has the potential to identify or grade the pearls [1]. However, the automated thickness measurement of nacreous layer based on OCT has not been reported. In this article, an automated approach is first time proposed to measure the thickness of nacreous layer using OCT raw data. This approach made use of the signal characteristic of OCT scan line, integrated with support vector machine (SVM), hidden markov model (HMM) and circle fitting technologies to measure the thickness of the nacreous layer of seawater pearls. The experimental results show this approach is accurate and adaptable.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"89 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116302863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Self-Reference Watermarking Scheme Based on Wet Paper Coding 基于湿纸编码的自参考水印方案
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.52
Chinchen Chang, Pei-Yu Lin, Jung-San Lee
Fragile watermarking is applied to protect the integrity of the digital media. Current fragile watermarking schemes mainly provide the functionality of detecting and locating the tampered regions of an authorized image. The capability to recover the tampered regions has rarely been discussed in the literature. In fact, the recovery ability is an important issue while proving and maintaining the image integrity. For achieving these purposes, we first utilize the concept of self-reference to preserve the significant information of a protected image. Then we embed the information into the protected image using the technique of wet paper coding. According to experimental results, the new scheme is highly sensitive to detect and locate the tampered area. In particular, the results show that the quality of recovery image is satisfactory.
脆弱水印用于保护数字媒体的完整性。现有的脆弱水印方案主要提供检测和定位授权图像篡改区域的功能。恢复被篡改区域的能力在文献中很少被讨论。事实上,恢复能力是证明和维护图像完整性的一个重要问题。为了达到这些目的,我们首先利用自引用的概念来保留受保护图像的重要信息。然后利用湿纸编码技术将信息嵌入到被保护图像中。实验结果表明,该方案对篡改区域的检测和定位具有很高的灵敏度。结果表明,恢复图像的质量令人满意。
{"title":"A Self-Reference Watermarking Scheme Based on Wet Paper Coding","authors":"Chinchen Chang, Pei-Yu Lin, Jung-San Lee","doi":"10.1109/HIS.2009.52","DOIUrl":"https://doi.org/10.1109/HIS.2009.52","url":null,"abstract":"Fragile watermarking is applied to protect the integrity of the digital media. Current fragile watermarking schemes mainly provide the functionality of detecting and locating the tampered regions of an authorized image. The capability to recover the tampered regions has rarely been discussed in the literature. In fact, the recovery ability is an important issue while proving and maintaining the image integrity. For achieving these purposes, we first utilize the concept of self-reference to preserve the significant information of a protected image. Then we embed the information into the protected image using the technique of wet paper coding. According to experimental results, the new scheme is highly sensitive to detect and locate the tampered area. In particular, the results show that the quality of recovery image is satisfactory.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"26 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123462062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2009 Ninth International Conference on Hybrid Intelligent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1