Pub Date : 2016-05-27DOI: 10.1109/ICCE-TW.2016.7520956
Imdad MaungMaung, Y. Tew, Koksheik Wong
Authentication of digital audio has become indispensable for validating genuine information, especially in very important situations involving legal issues. Study in audio authentication especially for AAC audio is still limited and the conventional authentication techniques are mostly applicable to MP3 audio and uncompressed audio. In this work, we propose an authentication scheme for AAC compressed audio based on data hiding technique, where interconnected authentication values (i.e., temporal dependency) and cryptographic hash function are utilized. The proposed authentication scheme can detect any tampering of audio spectral values at the expense of small degradation in audio quality. Experiments were carried out to verify the basic performance of the proposed authentication method. At the expense of <; 0.19 dB in terms of SNR, the proposed method can authenticate the source (sender) of the audio and detect the tampered frames, if any.
{"title":"Authentication for AAC compressed audio using data hiding","authors":"Imdad MaungMaung, Y. Tew, Koksheik Wong","doi":"10.1109/ICCE-TW.2016.7520956","DOIUrl":"https://doi.org/10.1109/ICCE-TW.2016.7520956","url":null,"abstract":"Authentication of digital audio has become indispensable for validating genuine information, especially in very important situations involving legal issues. Study in audio authentication especially for AAC audio is still limited and the conventional authentication techniques are mostly applicable to MP3 audio and uncompressed audio. In this work, we propose an authentication scheme for AAC compressed audio based on data hiding technique, where interconnected authentication values (i.e., temporal dependency) and cryptographic hash function are utilized. The proposed authentication scheme can detect any tampering of audio spectral values at the expense of small degradation in audio quality. Experiments were carried out to verify the basic performance of the proposed authentication method. At the expense of <; 0.19 dB in terms of SNR, the proposed method can authenticate the source (sender) of the audio and detect the tampered frames, if any.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"51 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79130557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-27DOI: 10.1109/ICCE-TW.2016.7521003
Ting-Hao Tsai, Wen-Cheng Chou, Wen-Yen Lin, Ming-Yih Lee
This study describes the work of implementing tilt sensing for accelerometers into the patented companion chip architecture. The core hardware block for transforming acceleration into tilting angles is based on a patented low complexity algorithm and hence the gate count takes only a few thousands for the whole chip. The chip cannot only replace the role of an accelerometer providing acceleration information but also extra tilting information. Hence, the chip can totally off-load the burden of a micro-controller for the needs of streaming acceleration data from accelerometers, calculating tilt angles, and/or retrieving tilting information from another piece of HW. The features of the chip make it easy to integrate into any system whereas the tilting information is required.
{"title":"The design of a tilt sensing companion chip for accelerometers","authors":"Ting-Hao Tsai, Wen-Cheng Chou, Wen-Yen Lin, Ming-Yih Lee","doi":"10.1109/ICCE-TW.2016.7521003","DOIUrl":"https://doi.org/10.1109/ICCE-TW.2016.7521003","url":null,"abstract":"This study describes the work of implementing tilt sensing for accelerometers into the patented companion chip architecture. The core hardware block for transforming acceleration into tilting angles is based on a patented low complexity algorithm and hence the gate count takes only a few thousands for the whole chip. The chip cannot only replace the role of an accelerometer providing acceleration information but also extra tilting information. Hence, the chip can totally off-load the burden of a micro-controller for the needs of streaming acceleration data from accelerometers, calculating tilt angles, and/or retrieving tilting information from another piece of HW. The features of the chip make it easy to integrate into any system whereas the tilting information is required.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"36 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81106985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-27DOI: 10.1109/ICCE-TW.2016.7520935
J. Ni, Liuying Wu, Shihao Wang, Kang Wang
An improved algorithm based on bio-inspired neural network is proposed for Autonomous Underwater Vehicle (AUV) real-time path planning in three-dimensional (3D) environment in this paper. The algorithm has made an improvement in the shunting equation of the neural network model which is conductive to path planning especially in dynamic environments. The proposed approach has high efficiency and good real-time performance.
{"title":"3D real-time path planning for AUV based on improved bio-inspired neural network","authors":"J. Ni, Liuying Wu, Shihao Wang, Kang Wang","doi":"10.1109/ICCE-TW.2016.7520935","DOIUrl":"https://doi.org/10.1109/ICCE-TW.2016.7520935","url":null,"abstract":"An improved algorithm based on bio-inspired neural network is proposed for Autonomous Underwater Vehicle (AUV) real-time path planning in three-dimensional (3D) environment in this paper. The algorithm has made an improvement in the shunting equation of the neural network model which is conductive to path planning especially in dynamic environments. The proposed approach has high efficiency and good real-time performance.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"23 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73179060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-27DOI: 10.1109/ICCE-TW.2016.7520981
Muhammad Burhan Khan, H. Nisar, C. Ng, P. K. Lo, Yap Vooi Voon
Fault diagnosis of activated sludge wastewater treatment plant for abnormal operation can be done using image processing and analysis of microscopic images of samples collected from aeration tank of the plant. In this paper, a novel illumination compensated segmentation technique is proposed for bright field microscopic images of the activated sludge wastewater samples. The illumination noise is modeled as Gaussian distribution and used with global Otsu thresholding. The performance of the algorithm is assessed using accuracy and Rand index. The segmentation is assessed using gold approximations of ground truth images, which were prepared manually. The proposed algorithm is compared with the local adaptive algorithms of Sauvola and Bradley. The performance metrics showed better performance of the proposed algorithm.
{"title":"Segmentation of activated sludge flocs with modeling of illumination noise","authors":"Muhammad Burhan Khan, H. Nisar, C. Ng, P. K. Lo, Yap Vooi Voon","doi":"10.1109/ICCE-TW.2016.7520981","DOIUrl":"https://doi.org/10.1109/ICCE-TW.2016.7520981","url":null,"abstract":"Fault diagnosis of activated sludge wastewater treatment plant for abnormal operation can be done using image processing and analysis of microscopic images of samples collected from aeration tank of the plant. In this paper, a novel illumination compensated segmentation technique is proposed for bright field microscopic images of the activated sludge wastewater samples. The illumination noise is modeled as Gaussian distribution and used with global Otsu thresholding. The performance of the algorithm is assessed using accuracy and Rand index. The segmentation is assessed using gold approximations of ground truth images, which were prepared manually. The proposed algorithm is compared with the local adaptive algorithms of Sauvola and Bradley. The performance metrics showed better performance of the proposed algorithm.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"39 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76709842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-27DOI: 10.1109/ICCE-TW.2016.7520964
Feng-Yuan Tai, Jian-Kai Song, Yi-Chen Tsai, Hsiao-Ping Tsai
To protect privacy while using LBS, we propose a pattern-based cloaking system that incorporate a trusted privacy preserving server to compute the cloak region for each sensitive patterns. To prevent adversaries culling out some patterns with some simple clues, we define a pattern-safe-cloak (PSC) region as a rectangle area that contains at least other l-1 reasonable and dissimilar patterns. To facilitate the search of a minimal PSC region for sensitive patterns, we use an R-tree to store the spatially distributed insensitive patterns. Our initial study results show that although the average area of the optimal PSC regions discovered is smaller than that of the first discovered PSC regions, the cost of finding optimal PSC region is much higher.
{"title":"Cloaking sensitive patterns Td preserve location privacy for LBS applications","authors":"Feng-Yuan Tai, Jian-Kai Song, Yi-Chen Tsai, Hsiao-Ping Tsai","doi":"10.1109/ICCE-TW.2016.7520964","DOIUrl":"https://doi.org/10.1109/ICCE-TW.2016.7520964","url":null,"abstract":"To protect privacy while using LBS, we propose a pattern-based cloaking system that incorporate a trusted privacy preserving server to compute the cloak region for each sensitive patterns. To prevent adversaries culling out some patterns with some simple clues, we define a pattern-safe-cloak (PSC) region as a rectangle area that contains at least other l-1 reasonable and dissimilar patterns. To facilitate the search of a minimal PSC region for sensitive patterns, we use an R-tree to store the spatially distributed insensitive patterns. Our initial study results show that although the average area of the optimal PSC regions discovered is smaller than that of the first discovered PSC regions, the cost of finding optimal PSC region is much higher.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"6 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81691059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-27DOI: 10.1109/ICCE-TW.2016.7521052
Shih-Hsuan Yang, G. Sun
A new-generation digital set-top-box (STB), as a core device of smart home, will provide mobile devices various multimedia services. In this study, we propose a more accurate power consumption model for mobile devices that are receiving video streaming services under the MPEG-DASH framework. The proposed model considers the influence of the encoding parameters specified by the encoder and the CPU frequency and connection throughput of the mobile device. The quality level and bit rate of the streaming video is thus dynamically adjusted, which enables a smooth and more durable video service for mobile users. Experimental results show that the proposed method reduces approximately 10% of power consumption compared to the non-adaptive method.
{"title":"Power-aware adaptive video streaming from the set-top-box to mobile devices","authors":"Shih-Hsuan Yang, G. Sun","doi":"10.1109/ICCE-TW.2016.7521052","DOIUrl":"https://doi.org/10.1109/ICCE-TW.2016.7521052","url":null,"abstract":"A new-generation digital set-top-box (STB), as a core device of smart home, will provide mobile devices various multimedia services. In this study, we propose a more accurate power consumption model for mobile devices that are receiving video streaming services under the MPEG-DASH framework. The proposed model considers the influence of the encoding parameters specified by the encoder and the CPU frequency and connection throughput of the mobile device. The quality level and bit rate of the streaming video is thus dynamically adjusted, which enables a smooth and more durable video service for mobile users. Experimental results show that the proposed method reduces approximately 10% of power consumption compared to the non-adaptive method.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"29 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78646317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-27DOI: 10.1109/ICCE-TW.2016.7520972
S. Fukuda, S. Kurihara, Shintaro Hamanaka, M. Oguchi, Saneyasu Yamaguchi
Huge amount of applications are developed and running in smartphones. Monitoring and analyzing application behaviors are important. Dynamic analyses with actual application execution require long time. Thus, reducing monitoring time is an important issue. In our work, we focus on Android operating system, which is a popular operating system for smartphones, and propose a method for constructing an environment that enables an accelerated application monitoring with which application can be monitored in shorter time than the actual time. Android operating system is based on Linux kernel and processes in a system are provided time from the kernel. It is expected that speed of time flows that applications in a system recognize can be accelerated by modifying the kernel. In this paper, we assume some conditions for simplifying as the first phases of this work, and propose a method for providing accelerated time for application. Then, we evaluated our method by monitoring practical applications, and demonstrate that our method can suitably accelerate speed of recognized time flow.
{"title":"Accelerated application monitoring environment of Android","authors":"S. Fukuda, S. Kurihara, Shintaro Hamanaka, M. Oguchi, Saneyasu Yamaguchi","doi":"10.1109/ICCE-TW.2016.7520972","DOIUrl":"https://doi.org/10.1109/ICCE-TW.2016.7520972","url":null,"abstract":"Huge amount of applications are developed and running in smartphones. Monitoring and analyzing application behaviors are important. Dynamic analyses with actual application execution require long time. Thus, reducing monitoring time is an important issue. In our work, we focus on Android operating system, which is a popular operating system for smartphones, and propose a method for constructing an environment that enables an accelerated application monitoring with which application can be monitored in shorter time than the actual time. Android operating system is based on Linux kernel and processes in a system are provided time from the kernel. It is expected that speed of time flows that applications in a system recognize can be accelerated by modifying the kernel. In this paper, we assume some conditions for simplifying as the first phases of this work, and propose a method for providing accelerated time for application. Then, we evaluated our method by monitoring practical applications, and demonstrate that our method can suitably accelerate speed of recognized time flow.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75993722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-27DOI: 10.1109/ICCE-TW.2016.7520967
S. K. Datta, C. Bonnet
The Internet of Things (IoT) is different than the traditional Internet due to factors including (i) massive number of resource constrained devices, (ii) huge volume of small data exchange among physical things, (iii) autonomous configuration and management aspects and (iv) support for mobility. Named Data Networking (NDN) supports them natively and provides excellent mechanism for content retrieval in IoT ecosystems addressing their sustainability issue over a long term. This paper explores the advantages of NDN over traditional Internet paradigm for IoT and examines how NDN can be integrated into an IoT architecture. We explain the utilization of NDN mechanism for disseminating high level knowledge derived from raw sensor data to interested consumers through operational phases of the architecture.
{"title":"Integrating Named Data Networking in Internet of Things architecture","authors":"S. K. Datta, C. Bonnet","doi":"10.1109/ICCE-TW.2016.7520967","DOIUrl":"https://doi.org/10.1109/ICCE-TW.2016.7520967","url":null,"abstract":"The Internet of Things (IoT) is different than the traditional Internet due to factors including (i) massive number of resource constrained devices, (ii) huge volume of small data exchange among physical things, (iii) autonomous configuration and management aspects and (iv) support for mobility. Named Data Networking (NDN) supports them natively and provides excellent mechanism for content retrieval in IoT ecosystems addressing their sustainability issue over a long term. This paper explores the advantages of NDN over traditional Internet paradigm for IoT and examines how NDN can be integrated into an IoT architecture. We explain the utilization of NDN mechanism for disseminating high level knowledge derived from raw sensor data to interested consumers through operational phases of the architecture.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"6 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87648463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-27DOI: 10.1109/ICCE-TW.2016.7521000
Hsien-Wei Tseng, Chien-Da Huang, Liang-Yu Yen, Yu-De Liao, Yung-Wen Lee
Due to the pressure of modern life and work, resulting in poor quality of sleep, insomnia and other issues, in order to find suitable for daily life can get sleep quality approach to further analysis to improve sleep quality. This paper contained a Bluetooth device through a single conductive layer measured by EEG brainwave of slow-wave signals to judge the quality of sleep during sleep. This paper use wearable module DAQ100 to measure the sleep cycle α, β, θ, δ four single conductive layer, and transmit this date to the cloud to do data analysis by Bluetooth device, to improve the sleep quality.
{"title":"A method of measurement sleep quality by using EEG","authors":"Hsien-Wei Tseng, Chien-Da Huang, Liang-Yu Yen, Yu-De Liao, Yung-Wen Lee","doi":"10.1109/ICCE-TW.2016.7521000","DOIUrl":"https://doi.org/10.1109/ICCE-TW.2016.7521000","url":null,"abstract":"Due to the pressure of modern life and work, resulting in poor quality of sleep, insomnia and other issues, in order to find suitable for daily life can get sleep quality approach to further analysis to improve sleep quality. This paper contained a Bluetooth device through a single conductive layer measured by EEG brainwave of slow-wave signals to judge the quality of sleep during sleep. This paper use wearable module DAQ100 to measure the sleep cycle α, β, θ, δ four single conductive layer, and transmit this date to the cloud to do data analysis by Bluetooth device, to improve the sleep quality.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"416 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86545111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-27DOI: 10.1109/ICCE-TW.2016.7520933
Hongli Yu, Guilin Chen, Chih-Yung Chang
Wireless recharging becomes one of the most important problems in wireless sensor networks recently. This paper aims to construct a recharging path for mobile anchor to efficiently recharge the battery of each sensor in a given WSN. Initially, the boundary of recharging circle is analyzed such that mobile anchor can fully recharge the battery of any sensor if the recharging path tangent to the boundary. Based upon the recharging circle of each sensor, an initial recharging path can be constructed. Then this paper proposes a path reduction mechanism for further reducing the path length, aiming to minimizing the recharging path. Performance studies show that the proposed recharging path construction mechanism outperforms the existing works in terms of length of recharging path and recharging efficiency.
{"title":"Recharging path construction for mobile recharger in wireless sensor networks","authors":"Hongli Yu, Guilin Chen, Chih-Yung Chang","doi":"10.1109/ICCE-TW.2016.7520933","DOIUrl":"https://doi.org/10.1109/ICCE-TW.2016.7520933","url":null,"abstract":"Wireless recharging becomes one of the most important problems in wireless sensor networks recently. This paper aims to construct a recharging path for mobile anchor to efficiently recharge the battery of each sensor in a given WSN. Initially, the boundary of recharging circle is analyzed such that mobile anchor can fully recharge the battery of any sensor if the recharging path tangent to the boundary. Based upon the recharging circle of each sensor, an initial recharging path can be constructed. Then this paper proposes a path reduction mechanism for further reducing the path length, aiming to minimizing the recharging path. Performance studies show that the proposed recharging path construction mechanism outperforms the existing works in terms of length of recharging path and recharging efficiency.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"60 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80572678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}