首页 > 最新文献

2005 5th International Conference on Information Communications & Signal Processing最新文献

英文 中文
A Robust BPCS-Steganography against the Visual Attack 抗视觉攻击的稳健bpcs隐写
Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689227
M. Niimi, H. Noda, B. Segee
This paper discusses a visual attack to BPCS-Steganography (Bit-Plane Complexity Segmentation-Steganography) and presents a countermeasure. BPCS categorizes each small block within cover images into either a "noise-like region" or an "informative region" by means of the binary-image feature called complexity and replaces noisy blocks with the binary patterns mapped from the bit sequences of secret data. The binary patterns must be complex because it is replacing complex regions. If the binary patterns to be inserted are simple, then the logical operation called conjugate operation is applied that transforms a simple pattern to a complex pattern. We need to keep, for each block, the flag called a conjugation flag representing whether or not conjugation had been applied to correctly extract the embedded information. In the case where the conjugation flags must be embedded within cover images, we are unable to use the complexity thresholding for the embedding of the flags. Thus the flags must be embedded into a fixed area. To this effect it is easy to recognize unnatural patterns on the LSB plane of stego-images. It can be used as a signature or a distinguishing mark between natural images and images with information embedded by BPCS. We propose secure BPCS which is robust against the visual attack. It is realized by assigning the meaning of the conjugation flag to a pixel of each block and making the specific rule to embed and extract it
本文讨论了比特平面复杂度分割(BPCS-Steganography, Bit-Plane Complexity segmentation,简称BPCS-Steganography)的一种视觉攻击,并提出了相应的对策。BPCS通过称为复杂度的二值图像特征将封面图像中的每个小块分类为“类噪声区域”或“信息区域”,并用从秘密数据的位序列映射的二值模式替换噪声块。二进制模式必须是复杂的,因为它正在替换复杂的区域。如果要插入的二进制模式很简单,则应用称为共轭操作的逻辑操作,将简单模式转换为复杂模式。对于每个块,我们需要保留称为共轭标记的标志,表示是否应用了共轭来正确提取嵌入的信息。在共轭标志必须嵌入封面图像的情况下,我们无法使用复杂性阈值来嵌入标志。因此,旗子必须嵌入固定的区域。因此,在隐写图像的LSB平面上很容易识别出不自然的图案。它可以作为自然图像与BPCS嵌入信息的图像之间的签名或区分标记。我们提出了一种对视觉攻击具有鲁棒性的安全BPCS。该算法通过将共轭标志的含义分配给每个块的一个像素,并制定特定的规则来嵌入和提取它来实现
{"title":"A Robust BPCS-Steganography against the Visual Attack","authors":"M. Niimi, H. Noda, B. Segee","doi":"10.1109/ICICS.2005.1689227","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689227","url":null,"abstract":"This paper discusses a visual attack to BPCS-Steganography (Bit-Plane Complexity Segmentation-Steganography) and presents a countermeasure. BPCS categorizes each small block within cover images into either a \"noise-like region\" or an \"informative region\" by means of the binary-image feature called complexity and replaces noisy blocks with the binary patterns mapped from the bit sequences of secret data. The binary patterns must be complex because it is replacing complex regions. If the binary patterns to be inserted are simple, then the logical operation called conjugate operation is applied that transforms a simple pattern to a complex pattern. We need to keep, for each block, the flag called a conjugation flag representing whether or not conjugation had been applied to correctly extract the embedded information. In the case where the conjugation flags must be embedded within cover images, we are unable to use the complexity thresholding for the embedding of the flags. Thus the flags must be embedded into a fixed area. To this effect it is easy to recognize unnatural patterns on the LSB plane of stego-images. It can be used as a signature or a distinguishing mark between natural images and images with information embedded by BPCS. We propose secure BPCS which is robust against the visual attack. It is realized by assigning the meaning of the conjugation flag to a pixel of each block and making the specific rule to embed and extract it","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115281853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Maximum Likelihood Multiuser Detection of DS/CDMA Signals in Improper Noiset 非适当噪声下DS/CDMA信号的最大似然多用户检测
Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689039
Y. Yoon, Hyung-Myung Kim
The improper signals are often encountered in communications and signal processing. Since the known maximum-likelihood (ML) multiuser detection problem is only for proper noises, we derive the improper version of this expansion. We show that the proposed scheme improves the near-far resistance (NFR) for any spreading sequences and channel conditions. This gain comes from appropriate management of the additional information contained in nonzero pseudo-covariance matrix. The average NFR is obtained in a random channel environment and random spreading sequence. The proposed scheme halves the effective number of users. Although the ML multiuser detection gives us the optimum bit error rate (BER) performance, the computational complexity that is exponential in the number of users makes it impractical. In this paper, an efficient ML multiuser detection is developed. First, we relieve the combinatorial constraint of ML detection and obtain the initial decision of the symbols. Then, the most error probable symbols are chosen by referring the reliability measures of the initial symbols. The ML searching is accomplished with only the chosen symbols. Computer simulations demonstrate the results of the paper and show the error rate performance of the proposed near-ML multiuser detection
在通信和信号处理中经常会遇到不正确的信号。由于已知的最大似然(ML)多用户检测问题仅适用于适当的噪声,因此我们推导了该扩展的不适当版本。结果表明,该方案在任何扩频序列和信道条件下都能提高近远电阻(NFR)。这种增益来自于对包含在非零伪协方差矩阵中的附加信息的适当管理。在随机信道环境和随机扩频序列下得到平均NFR。该方案将有效用户数量减半。尽管ML多用户检测为我们提供了最佳的误码率(BER)性能,但用户数量呈指数增长的计算复杂性使其不切实际。本文提出了一种高效的机器学习多用户检测方法。首先,我们解除了机器学习检测的组合约束,得到了符号的初始判定。然后,参考初始符号的可靠性度量,选择最可能出错的符号。ML搜索仅使用选定的符号完成。计算机仿真验证了本文的结果,并显示了所提出的近机器学习多用户检测的错误率性能
{"title":"Maximum Likelihood Multiuser Detection of DS/CDMA Signals in Improper Noiset","authors":"Y. Yoon, Hyung-Myung Kim","doi":"10.1109/ICICS.2005.1689039","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689039","url":null,"abstract":"The improper signals are often encountered in communications and signal processing. Since the known maximum-likelihood (ML) multiuser detection problem is only for proper noises, we derive the improper version of this expansion. We show that the proposed scheme improves the near-far resistance (NFR) for any spreading sequences and channel conditions. This gain comes from appropriate management of the additional information contained in nonzero pseudo-covariance matrix. The average NFR is obtained in a random channel environment and random spreading sequence. The proposed scheme halves the effective number of users. Although the ML multiuser detection gives us the optimum bit error rate (BER) performance, the computational complexity that is exponential in the number of users makes it impractical. In this paper, an efficient ML multiuser detection is developed. First, we relieve the combinatorial constraint of ML detection and obtain the initial decision of the symbols. Then, the most error probable symbols are chosen by referring the reliability measures of the initial symbols. The ML searching is accomplished with only the chosen symbols. Computer simulations demonstrate the results of the paper and show the error rate performance of the proposed near-ML multiuser detection","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115419779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integrated Headsets Using the Adaptive Hybrid Active Noise Control System 采用自适应混合主动噪声控制系统的集成耳机
Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689271
Y. Chong, Liang Wang, S. Ting, W. Gan
An integrated approach towards the development of an active noise control (ANC) headset for audio and communication applications is explored and evaluated. Two different ANC methods are presented and their performance compared. The first method called the integrated feedback active noise control (IFBANC) system employs adaptive feedback ANC technique. Its main advantage is the use of a single error microphone per ear-cup. The second method is the integrated hybrid active noise control (IHANC) system. This approach combines adaptive feedforward and feedback ANC techniques and requires the use of an error microphone and a reference microphone that is mounted on the external of the ear-cup. Simulations have been conducted for both integrated ANC methods and they performed equally well in the lower frequency range. However, the IHANC system continues to perform moderately well in the mid frequency range where the IFBANC system exhibits only slight attenuation. In addition, the IHANC system performs better than the IFBANC system in attenuating narrowly spaced periodic noise in the lower frequency range
探索和评估了一种用于音频和通信应用的主动噪声控制(ANC)耳机的综合开发方法。提出了两种不同的ANC方法,并对其性能进行了比较。第一种方法称为综合反馈主动噪声控制(IFBANC)系统,采用自适应反馈ANC技术。它的主要优点是每个耳杯使用一个误差麦克风。第二种方法是集成混合有源噪声控制系统。这种方法结合了自适应前馈和反馈ANC技术,需要使用安装在耳罩外部的误差麦克风和参考麦克风。对两种集成的ANC方法进行了仿真,结果表明它们在较低的频率范围内表现同样良好。然而,IHANC系统在中频范围内继续表现良好,而IFBANC系统仅表现出轻微的衰减。此外,IHANC系统在较低频率范围内对窄间隔周期性噪声的衰减性能优于IFBANC系统
{"title":"Integrated Headsets Using the Adaptive Hybrid Active Noise Control System","authors":"Y. Chong, Liang Wang, S. Ting, W. Gan","doi":"10.1109/ICICS.2005.1689271","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689271","url":null,"abstract":"An integrated approach towards the development of an active noise control (ANC) headset for audio and communication applications is explored and evaluated. Two different ANC methods are presented and their performance compared. The first method called the integrated feedback active noise control (IFBANC) system employs adaptive feedback ANC technique. Its main advantage is the use of a single error microphone per ear-cup. The second method is the integrated hybrid active noise control (IHANC) system. This approach combines adaptive feedforward and feedback ANC techniques and requires the use of an error microphone and a reference microphone that is mounted on the external of the ear-cup. Simulations have been conducted for both integrated ANC methods and they performed equally well in the lower frequency range. However, the IHANC system continues to perform moderately well in the mid frequency range where the IFBANC system exhibits only slight attenuation. In addition, the IHANC system performs better than the IFBANC system in attenuating narrowly spaced periodic noise in the lower frequency range","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115422971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Audio Encryption Using Fragile Watermarking 使用脆弱水印的音频加密
Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689175
Mikko Löytynoja, N. Cvejic, Eeva Lähetkangas, Tapio Seppänen MediaTeam
The main application area for digital watermarking is copyright protection. We propose a method that increases the robustness of copyright protection watermarks by persuading users not to try attacking the watermark. The method embeds two watermarks into media; a robust one and fragile one. Copy protection information is embedded into the robust watermark. The fragile watermark contains some application specific information that the user do not want to lose. The fragile watermark is constructed so that it is destroyed, if the robust watermark is attacked. The proposed method is demonstrated with a audio encryption scenario that uses the mobile phone to play protected audio files. The audio decryption keys are embedded into the fragile watermark
数字水印的主要应用领域是版权保护。我们提出了一种通过说服用户不要尝试攻击水印来提高版权保护水印鲁棒性的方法。该方法将两个水印嵌入到介质中;一个强健的,一个脆弱的。复制保护信息嵌入到鲁棒水印中。脆弱水印包含一些用户不希望丢失的特定于应用程序的信息。构造脆弱水印,使其在鲁棒水印受到攻击时被破坏。通过一个使用手机播放受保护的音频文件的音频加密场景演示了所提出的方法。音频解密密钥嵌入到脆弱的水印中
{"title":"Audio Encryption Using Fragile Watermarking","authors":"Mikko Löytynoja, N. Cvejic, Eeva Lähetkangas, Tapio Seppänen MediaTeam","doi":"10.1109/ICICS.2005.1689175","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689175","url":null,"abstract":"The main application area for digital watermarking is copyright protection. We propose a method that increases the robustness of copyright protection watermarks by persuading users not to try attacking the watermark. The method embeds two watermarks into media; a robust one and fragile one. Copy protection information is embedded into the robust watermark. The fragile watermark contains some application specific information that the user do not want to lose. The fragile watermark is constructed so that it is destroyed, if the robust watermark is attacked. The proposed method is demonstrated with a audio encryption scenario that uses the mobile phone to play protected audio files. The audio decryption keys are embedded into the fragile watermark","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123350042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Selection of Spreading Sequence Subsets for DS-CDMA Systems over Multipath Channels 多径信道上DS-CDMA系统扩展序列子集的选择
Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689304
S. Xie, Z. Gu, S. Rahardja, J. C. Wong, Y. Xin
The performance of a direct-sequence code division multiple access (DS-CDMA) system is largely dependent on the correlation properties of the spreading sequences in use. Given a set of sequences, it is thus important to select an appropriate subset for optimal performance. In this paper, two new selection criteria of sequence subsets are given for synchronous and asynchronous DS-CDMA systems over multipath fading channels respectively when the multipath intensity profiles (MIP) are known. Simulation results show that subsets of sequences based on the proposed selection criteria can provide better bit-error rate (BER) performance than those based on the existing mean-square correlation selection criteria
直接序列码分多址(DS-CDMA)系统的性能在很大程度上取决于所使用的扩频序列的相关特性。给定一组序列,因此选择一个适当的子集以获得最佳性能是很重要的。针对多径衰落信道下的同步和异步DS-CDMA系统,在多径强度分布(MIP)已知的情况下,分别给出了两种新的序列子集选择准则。仿真结果表明,基于所提选择准则的序列子集比基于均方相关选择准则的序列子集具有更好的误码率性能
{"title":"Selection of Spreading Sequence Subsets for DS-CDMA Systems over Multipath Channels","authors":"S. Xie, Z. Gu, S. Rahardja, J. C. Wong, Y. Xin","doi":"10.1109/ICICS.2005.1689304","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689304","url":null,"abstract":"The performance of a direct-sequence code division multiple access (DS-CDMA) system is largely dependent on the correlation properties of the spreading sequences in use. Given a set of sequences, it is thus important to select an appropriate subset for optimal performance. In this paper, two new selection criteria of sequence subsets are given for synchronous and asynchronous DS-CDMA systems over multipath fading channels respectively when the multipath intensity profiles (MIP) are known. Simulation results show that subsets of sequences based on the proposed selection criteria can provide better bit-error rate (BER) performance than those based on the existing mean-square correlation selection criteria","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization of SIC Receiver and CDMA Power Control by Discrete Stochastic Approximation 基于离散随机逼近的SIC接收机和CDMA功率控制优化
Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689306
N. Benvenuto, G. Carnevale, S. Tomasin
In an uplink CDMA transmission, we consider a base station that utilizes successive interference cancellation (SIC) and performs power control of the mobile terminals to minimize the system power. Since the joint optimization of power control and ordering (JOPCO) detection in SIC requires a computational effort that grows exponentially with the number of active users, in this paper we propose an approximated solution obtained by modelling JOPCO as a discrete stochastic optimization problem. The proposed algorithm is based on the construction of a Markov chain whose states are the orderings. Moreover, in order to further reduce complexity, an efficient description of the state probabilities is derived. Simulations performed on an UMTS scenario show that the proposed technique yields a performance close to the optimal JOPCO solution
在上行CDMA传输中,我们考虑采用连续干扰消除(SIC)并对移动终端进行功率控制以最小化系统功率的基站。由于SIC中功率控制和排序(JOPCO)检测的联合优化需要随着活跃用户数量呈指数增长的计算量,因此本文提出了将JOPCO建模为离散随机优化问题的近似解。该算法基于状态为有序的马尔可夫链的构造。此外,为了进一步降低复杂性,推导了一种有效的状态概率描述。在UMTS场景下进行的仿真表明,所提出的技术产生的性能接近最优JOPCO解决方案
{"title":"Optimization of SIC Receiver and CDMA Power Control by Discrete Stochastic Approximation","authors":"N. Benvenuto, G. Carnevale, S. Tomasin","doi":"10.1109/ICICS.2005.1689306","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689306","url":null,"abstract":"In an uplink CDMA transmission, we consider a base station that utilizes successive interference cancellation (SIC) and performs power control of the mobile terminals to minimize the system power. Since the joint optimization of power control and ordering (JOPCO) detection in SIC requires a computational effort that grows exponentially with the number of active users, in this paper we propose an approximated solution obtained by modelling JOPCO as a discrete stochastic optimization problem. The proposed algorithm is based on the construction of a Markov chain whose states are the orderings. Moreover, in order to further reduce complexity, an efficient description of the state probabilities is derived. Simulations performed on an UMTS scenario show that the proposed technique yields a performance close to the optimal JOPCO solution","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122633715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparison between Tnime-slot Scheduling Approaches for All-Photonic Networks 全光子网络时隙调度方法的比较
Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689244
Xiao liu, N. Saberi, Mark J. Coates, Lorne G. Mason
The internal switches in all-photonic networks do not perform data conversion into the electronic domain. Although this removal of O-E-O conversion eliminates a potential capacity bottleneck, it also introduces scheduling challenges; photonic switches cannot perform queuing operations, so traffic arrivals at these switches must be carefully scheduled. The (overlaid) star topology is an excellent match for an all-photonic network because it simplifies the scheduling problem. In such a network architecture, optical time division multiplexing (OTDM) approaches for scheduling the state of the central switch in the star are attractive. In this paper, we describe two OTDM algorithms that we have recently developed, one that performs scheduling on a slot-by-slot basis and another that schedules frames of multiple slots. We report and analyze the results of OPNET simulations that compare the performance of these scheduling algorithms
全光子网络的内部开关不进行数据到电子域的转换。虽然这种O-E-O转换消除了潜在的容量瓶颈,但它也带来了调度挑战;光子交换机不能执行排队操作,因此到达这些交换机的流量必须仔细安排。(覆盖的)星型拓扑是全光子网络的一个很好的匹配,因为它简化了调度问题。在这样的网络结构中,光时分复用(OTDM)方法对星型中心交换机的状态进行调度是很有吸引力的。在本文中,我们描述了我们最近开发的两种OTDM算法,一种是在逐插槽的基础上执行调度,另一种是调度多个插槽的帧。我们报告并分析了OPNET仿真的结果,比较了这些调度算法的性能
{"title":"A Comparison between Tnime-slot Scheduling Approaches for All-Photonic Networks","authors":"Xiao liu, N. Saberi, Mark J. Coates, Lorne G. Mason","doi":"10.1109/ICICS.2005.1689244","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689244","url":null,"abstract":"The internal switches in all-photonic networks do not perform data conversion into the electronic domain. Although this removal of O-E-O conversion eliminates a potential capacity bottleneck, it also introduces scheduling challenges; photonic switches cannot perform queuing operations, so traffic arrivals at these switches must be carefully scheduled. The (overlaid) star topology is an excellent match for an all-photonic network because it simplifies the scheduling problem. In such a network architecture, optical time division multiplexing (OTDM) approaches for scheduling the state of the central switch in the star are attractive. In this paper, we describe two OTDM algorithms that we have recently developed, one that performs scheduling on a slot-by-slot basis and another that schedules frames of multiple slots. We report and analyze the results of OPNET simulations that compare the performance of these scheduling algorithms","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123983229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Development of a Privacy Conscious Video Communication System Using JPEG2000 Technology 基于JPEG2000技术的隐私意识视频通信系统的开发
Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689137
S. Tansuriyavong, T. Suzuki, M. Takeda, M. Iwahashi
This paper aims at extracting human region based on the multi-resolution expression of wavelet transform technique, and also creating transparent image of person based on bit-plane encoding technique, which both techniques are a constituent technology of JPEG2000. The purpose of using these techniques is to reduce the computational cost and data transfer bit rate. We developed the privacy conscious video communication system by using these techniques. In this system, the persons who stay far from the camera at the sending site are displayed as a high-transparent person at the receiving site, in order to protect their privacy
基于小波变换的多分辨率表达技术提取人体区域,基于位平面编码技术生成透明人体图像,这两种技术都是JPEG2000的组成技术。使用这些技术的目的是为了降低计算成本和数据传输比特率。我们利用这些技术开发了具有隐私意识的视频通信系统。在本系统中,在发送现场远离摄像头的人员在接收现场显示为高透明度人员,以保护其隐私
{"title":"Development of a Privacy Conscious Video Communication System Using JPEG2000 Technology","authors":"S. Tansuriyavong, T. Suzuki, M. Takeda, M. Iwahashi","doi":"10.1109/ICICS.2005.1689137","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689137","url":null,"abstract":"This paper aims at extracting human region based on the multi-resolution expression of wavelet transform technique, and also creating transparent image of person based on bit-plane encoding technique, which both techniques are a constituent technology of JPEG2000. The purpose of using these techniques is to reduce the computational cost and data transfer bit rate. We developed the privacy conscious video communication system by using these techniques. In this system, the persons who stay far from the camera at the sending site are displayed as a high-transparent person at the receiving site, in order to protect their privacy","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125570417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparison of Spreading Sequences in Synchronous MC-CDMA Systems 同步MC-CDMA系统中扩展序列的性能比较
Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689124
Z. Gu, S. Xie, S. Rahardja, E. T. Sze, Y. Xin
The bit error rate (BER) performance of various spreading sequences in a synchronous multicarrier code-division multiple access (MC-CDMA) system is compared by numerical simulations in this paper. The underlying subcarriers are correlated. Gold, orthogonal Gold, 4-phase family A, Walsh-Hadamard (WH) and new orthogonal unified complex Hadamard transform (UCHT) sequences are investigated here. Simulation results show that both orthogonal WH and UCHT sequences give the best BER performance among various spreading sequences. The disparity in performance between the various spreading sequences can be explained by the property of the zero-delay cross-correlation in frequency domain
通过数值仿真,比较了同步多载波码分多址(MC-CDMA)系统中不同扩展序列的误码率性能。底层子载波是相关的。研究了Gold、正交Gold、4相族A、Walsh-Hadamard (WH)和新型正交统一复Hadamard变换(UCHT)序列。仿真结果表明,在各种扩频序列中,正交WH序列和UCHT序列都具有最佳的误码率性能。不同扩频序列之间的性能差异可以用频域零延迟互相关特性来解释
{"title":"Performance Comparison of Spreading Sequences in Synchronous MC-CDMA Systems","authors":"Z. Gu, S. Xie, S. Rahardja, E. T. Sze, Y. Xin","doi":"10.1109/ICICS.2005.1689124","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689124","url":null,"abstract":"The bit error rate (BER) performance of various spreading sequences in a synchronous multicarrier code-division multiple access (MC-CDMA) system is compared by numerical simulations in this paper. The underlying subcarriers are correlated. Gold, orthogonal Gold, 4-phase family A, Walsh-Hadamard (WH) and new orthogonal unified complex Hadamard transform (UCHT) sequences are investigated here. Simulation results show that both orthogonal WH and UCHT sequences give the best BER performance among various spreading sequences. The disparity in performance between the various spreading sequences can be explained by the property of the zero-delay cross-correlation in frequency domain","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126177776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Applying Saturated Cut Method in Dynamic Multicast Traffic Grooming in IP/MPLS over WDM Mesh Networks 饱和切割方法在WDM Mesh网络IP/MPLS动态组播业务疏导中的应用
Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689246
Bin Chen, S. Bose, W. Zhong
Handling low and medium speed traffic flows using cost-effective traffic grooming strategies is becoming increasingly important for the efficient operation of WDM networks. In this paper, we apply the saturated cut method to routing sub-wavelength multicast traffic in reconfigurable, unicast, mesh WDM networks. Simulations show that setting up lightpaths for the saturated cut significantly improves network-blocking performance
使用经济有效的流量疏导策略处理中低速度流量对于WDM网络的高效运行变得越来越重要。在本文中,我们将饱和切割方法应用于可重构、单播、网状WDM网络中的亚波长组播路由。仿真结果表明,为饱和切割设置光路可以显著提高网络阻塞性能
{"title":"Applying Saturated Cut Method in Dynamic Multicast Traffic Grooming in IP/MPLS over WDM Mesh Networks","authors":"Bin Chen, S. Bose, W. Zhong","doi":"10.1109/ICICS.2005.1689246","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689246","url":null,"abstract":"Handling low and medium speed traffic flows using cost-effective traffic grooming strategies is becoming increasingly important for the efficient operation of WDM networks. In this paper, we apply the saturated cut method to routing sub-wavelength multicast traffic in reconfigurable, unicast, mesh WDM networks. Simulations show that setting up lightpaths for the saturated cut significantly improves network-blocking performance","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130007393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2005 5th International Conference on Information Communications & Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1