R. Nishimura, S. Enomoto, P. Mokhtari, H. Takemoto
{"title":"Application of Three-Dimensional Audio to Copyrighted Multimedia Contents","authors":"R. Nishimura, S. Enomoto, P. Mokhtari, H. Takemoto","doi":"10.1109/IIH-MSP.2013.84","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.84","url":null,"abstract":"Copyright is important to protect proprietary properties of multimedia contents, but it possibly poses a challenge in applying complicated signal processing to commercial multimedia products. It is usually forbidden to make a copy of copyrighted materials so that signal processing should be applied on the fly. As a result, such signal processing needs considerable computational costs and requires special devices and software, leading users to hesitate to adopt it. In this article, a method is introduced which enables users to listen to surround sound audio tracks as three-dimensional (3D) audio, without infringement of copyright, with a common multimedia player currently available on a usual PC. The 3D sound can be one that would be heard in an appropriate listening room with a set of ideal loudspeakers, and also can be properly individualized to each listener. Although the method adds a temporal delay in audio contents relative to visual contents, the delay can fall within an acceptable range with respect to the human perception of multimedia contents.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116179567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Study of Information Planning Method for Large Enterprise Group Based on Strategic Business Analysis","authors":"Weixiong Chen, Zhiqiang Ye, Jiaan Yi","doi":"10.1109/IIH-MSP.2013.164","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.164","url":null,"abstract":"Considering the new questions in Strategic Information Planning (SIP), we put forward a improved SIP methodology based on Strategic Business Analysis (SBA). It bring forward a formula for Strategic Matching Degree (SMD), so as to identify the key business and key information system. It also proposes a key business analysis & adjustment process under dynamic environment. As a result, the SBA method can reduce IT investment and increase IT planning work efficiency.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115837491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Contourlet-Domain Image Signature for Content Authentication","authors":"Xiaofeng Wang, Lixin Zhang, Kemu Pang","doi":"10.1109/IIH-MSP.2013.143","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.143","url":null,"abstract":"An image signature approach for content authentication is proposed. In the proposal, Contour let transformation is used to extract image feature, and the statistics of Contour let transformation coefficients are used to generate image signature. Then a tampering detection and tampering localization algorithm are developed by using generated image signature. Proposed method is robust for perceptually insignificant distortions introduced by content-preserving manipulations such as JPEG compression, adding noise, filtering, etc. It is sensitive to the changes caused by malicious attacks, and it possesses the functionality to detect the changed image regions.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":" 40","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132188296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Method for Estimating F0 of Steady Complex Tone in Noisy Reverberant Environments","authors":"Kenichiro Miwa, M. Unoki","doi":"10.1109/IIH-MSP.2013.119","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.119","url":null,"abstract":"This paper proposes a method for robustly and accurately estimating fundamental frequency (F0) of the steady complex tone on the basis of an amplitude modulation/demodulation technique. It is based on the well-known mechanism of pitch perception for AM tone. The comparative results revealed that the percentage correct rates of the estimated F0s using a few recent methods (TEMPO, PHIA, and CmpCep) were drastically reduced as the SNR decreased and as the reverberation time increased. The results also demonstrated that the proposed method robustly and accurately estimated F0 in both noisy and reverberant environments.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131580634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Application of Business Intelligence in the Nuclear Power Maintenance","authors":"Zinian Shi","doi":"10.1109/IIH-MSP.2013.159","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.159","url":null,"abstract":"With the continuously development of enterprise informatization, the effect of group enterprise scale effect and fine management preliminary reveals, scientific decision-making difficulty is greatly increased, business intelligence applications demand urgently. Against this backdrop, this paper through the research of BI and a company using the BI components for nuclear power maintenance business intelligence analysis as an example for the BI platform description, elaborate the importance of the development of enterprise business intelligence, analysis and put forward three trends of group business intelligence application in the future will show.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132980386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guoqing Zhao, Bin Hu, Xiaowei Li, Chengsheng Mao, R. Huang
{"title":"A Pervasive Stress Monitoring System Based on Biological Signals","authors":"Guoqing Zhao, Bin Hu, Xiaowei Li, Chengsheng Mao, R. Huang","doi":"10.1109/IIH-MSP.2013.137","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.137","url":null,"abstract":"In this research, we focus on detecting stress based on electroencephalogram (EEG) method. An experiment has been conducted with 59 subjects, the results show that three EEG features from Fpz point, LZ-complexity, alpha relative power and the ratio of alpha power to beta power, are effective respectively in the stress detection using K-Nearest-Neighbor classifier, however Naive Bayesian classifier is not suitable for the stress prediction based EEG data. Meanwhile, we introduced the stress index for indicating stress level. Based on these work, we build a pervasive stress detection system which enables people to monitor their stress level opportunely. The proposed system provides services both for ordinary users in \"User Panel\" and psychiatrists in \"Doctor Panel\". The \"User Panel\" integrates biological signals acquisition which collects user's EEG data for stress classification, self-assessment questionnaire as reference to stress index, history record for logging user's state, and chatting with doctor, aiming to keep in touch with psychiatrists if necessary. In \"Doctor Panel\", psychiatrists can view all users' historical status and chat with them.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133647623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Subjective Evaluation of High-Definition Virtual Sound Field Using a 157-Channel Surrounding Loudspeaker Array","authors":"Y. Iwaya, T. Tsuchiya","doi":"10.1109/IIH-MSP.2013.85","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.85","url":null,"abstract":"In recent years, computation power to simulate sound fields from the three-dimensional numerical models has progressed fast, for example, using GPU cluster systems. However, the intervals among loudspeakers used in reproduction of the rendered sound field are insufficient to avoid spatial aliasing. Therefore, it is impossible to reproduce the rendered sound field accurately with current loudspeaker systems. Nevertheless, subjective impression of reproduction field with an insufficient system might be similar to intended sound field. The intended spatial attributes to render, such as sound position, sound directivity, reverberation, should be evaluated subjectively. For this report we performed a subjective evaluation of the sound fields rendered with a graphical processing unit (GPU) cluster. The sound fields were reproduced by a surrounding loudspeaker array. The number of loudspeakers in the array was 157. However the distance among loudspeakers was 50 cm and was insufficient to reproduce frequencies higher than 340 Hz. Listeners answered their subjective impressions on distance and directivity of sound source of a singing voice. We confirmed listeners could perceive the rendered distances in part when the directivity of the sound source was also rendered.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115180716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao Yu, Bi Jin, Y. Lu, Xiwei Chen, Zhengming Yi, Kai Zhang, Shaoliang Wang
{"title":"Multi-threshold Image Segmentation Based on Firefly Algorithm","authors":"Chao Yu, Bi Jin, Y. Lu, Xiwei Chen, Zhengming Yi, Kai Zhang, Shaoliang Wang","doi":"10.1109/IIH-MSP.2013.110","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.110","url":null,"abstract":"Multi-threshold image segmentation have achieved good results, but multi-threshold searching can be very time consuming, in order to improve the efficiency of multi-threshold searching, in this paper, the Firefly Algorithm is applied to solve multi-threshold searching. With maximum entropy as the optimization objective function, more information of images can be reserved, then using the Firefly Algorithm's heuristic searching, the optimal thresholds of image segmentation can be found. Experimental results show that compared to Genetic Algorithm, our proposed Firefly Algorithm has a higher convergence speed and produces a better segmentation effect when applied to image segmentation.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115413579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Analysis on Cyber-physical System Using Attack Tree","authors":"Feng Xie, Tianbo Lu, Xiaobo Guo, Jingli Liu, Yong Peng, Yang Gao","doi":"10.1109/IIH-MSP.2013.113","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.113","url":null,"abstract":"Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. Existing risk assessment for CPS always focuses on the reliability assessment, using Probability Risk Assessment (PRA). In this way, the assessment of physical part and cyber part is isolated as PRA is difficult to quantify the risks from the cyber world. Methodologies should be developed to assess the both parts as a whole system, considering this integrated system has a high coupling between the physical layer and cyber layer. In this paper, a risk assessment idea for CPS with the use of attack tree is proposed. Firstly, it presents a detailed description about the threat and vulnerability attributes of each leaf in an attack tree and tells how to assign value to its threat and vulnerability vector. Then this paper focuses on calculating the threat and vulnerability vector of an attack path with the use of the leaf vector values. Finally, damage is taken into account and an idea to calculate the risk value of the whole attack path is given.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao-Ho Chen, Tsong-Yi Chen, Min-Tsung Wu, T. Tang, Wu-Chih Hu
{"title":"License Plate Recognition for Moving Vehicles Using a Moving Camera","authors":"Chao-Ho Chen, Tsong-Yi Chen, Min-Tsung Wu, T. Tang, Wu-Chih Hu","doi":"10.1109/IIH-MSP.2013.129","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.129","url":null,"abstract":"This paper is dedicated to a license plate recognition (LPR) system for moving vehicles by using car video camera. The proposed LPR method mainly consists of preprocessing, plate location, and character segmentation & recognition. At irst, the possible regions of license plate are enhanced from the captured images through the proposed edge detection method and gradient-based binarization. Then, the correct plate regions are selected by analyzing the horizontal projection and the corner distribution. A vertical Sobel processing is performed on the segmented license-plate region and then the proposed weighted-binarization method is employed to segment each character of the license, followed by the skew correction. Finally, a probabilistic neural network (PNN) technique is applied to recognize each segmented character. Experimental results show that the accuracy rates of license-plate location and license-plate recognition can achieve 91.7% and 88.5%, respectively.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"88 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}