{"title":"A new method for Visual Secret Sharing","authors":"H. Firouzi, M. Ehdaie, M. Aref","doi":"10.1109/ISTEL.2008.4651375","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651375","url":null,"abstract":"In this paper a new probabilistic view to the visual secret sharing (VSS) is presented and as a result, a new VSS scheme is proposed. The proposed scheme is a threshold scheme with perfect black pixel reconstruction. We present the scheme by introducing two sets C<sub>0</sub> and C<sub>1</sub>. We consider an unknown probability distribution on the elements of C<sub>0</sub> and C<sub>1</sub>. Perfectness provides some linear constraints on the probabilities of C<sub>0</sub> and C<sub>1</sub> elements. By solving the provided system of linear equations, the probability distributions are specified and we achieve a perfect VSS scheme.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124846610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Best known PSLs for binary sequences from bit length 71 through 100","authors":"M. Amin Nasrabadi, M. Bastani","doi":"10.1109/ISTEL.2008.4651390","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651390","url":null,"abstract":"This paper develops a new evolutionary algorithm for generating low autocorrelation binary sequences. These sequences are of interest in pulse compression technique. The proposed algorithm is fast enough to yield optimum or near optimum codes. The generated sequences were compared to the best literature and were seen that its results are better than the others. This suggested method could change 11 rows of the previous best known PSLs table, whereas the previous literature could change only one record. These records were combined with the best results reported in the papers to produce a new best minimal-PSL binary sequence table for bit lengths 71 through 100.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126352545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganalysis of LSB-Matching steganography by removing most significant bit planes","authors":"M. A. Mehrabi, H. Aghaeinia, M. Abolghasemi","doi":"10.1109/ISTEL.2008.4651396","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651396","url":null,"abstract":"This paper proposed a new steganalysis scheme of LSB-matching steganography based on statistical moments of the DFT of histogram of multi-level wavelet subbands. Before deriving these wavelet subbands a pre-processing apply to images under the test. The pre-processing contains removing some most significant bit planes. Then we decompose the image using three-level Haar discrete wavelet transform (DWT) into 13 subbands (here the image itself is considered as the LL0 subband).The Fourier transform of each subband histogram, is calculated. Then it is divided into low and high frequency bands. The first three statistical moments of each band are selected to form a 78-dimensional feature vector for Steganalysis. Support vector machines (SVM) classifier is then used to discriminate between stego-images and innocent images.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"196 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125392869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of security solutions on worm propagation","authors":"M. R. Faghani, H. Saidi, M. Ataei","doi":"10.1109/ISTEL.2008.4651266","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651266","url":null,"abstract":"Automated propagating malwares such as worms have drawn significant attention due to their adverse impact on Internet and network security. According to latest advisories, malware creation has reached epidemic proportions. While much research attention has been paid in developing stochastic models of worm propagation, the real world prevention mechanisms have not been deployed in simulations. Describing the worm propagation cycle in real world and identifying the ways that worms exploit to spread themselves, this article will step through common practices to prevent worm propagation and also examines these results in the analytical worm propagation model.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"8 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114136295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fuzzy approach for multi-feature pedestrian tracking with particle filter","authors":"M. Komeili, N. Armanfard, E. Kabir","doi":"10.1109/ISTEL.2008.4651366","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651366","url":null,"abstract":"Particle filter is one of the best methods of object tracking in video sequences. Particle filter usually is used with only one feature. In this paper, we propose a novel method for multi-feature object tracking in a particle filter framework. A fuzzy inference system by which reliability of features can be measured has been designed. This is done based on observations diversity and spatial scattering of particles. The features are combined in proportion to their reliabilities. Efficiency of our algorithm is demonstrated using color, edge and texture features. Experimental results over a set of real-world sequences show that our methodpsilas performance is better than some other solutions proposed for feature weighting.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel primary user detection method for multiple-antenna cognitive radio","authors":"H. Sadeghi, P. Azmi","doi":"10.1109/ISTEL.2008.4651297","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651297","url":null,"abstract":"As we know, cognitive radios should not interfere with the primary users and so, should detect them and vacate the frequency bands when required. In this paper, we propose a novel multiple-antenna receiver diversity scheme based on cyclostationary detection, in order to improve the reliability of primary user detection. We derive closed-form expressions for the probabilities of detection and false alarm in the proposed scheme. The performance is probed by computer simulations and compared to the conventional spectrum sensing methods. The results show the performance enhancement of the proposed spectrum sensing method over the conventional ones.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"32 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124534612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of telecommunication service providers’ pricing strategies for packet based services","authors":"Seyed Mohammad Reza Mirsarraf, Ali Reza Mansoori","doi":"10.1109/ISTEL.2008.4651267","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651267","url":null,"abstract":"To remain competitive in the turbulent and rapidly evolving telecommunication market, service providers (SPs) should use proper pricing strategy to retain subscribers and even attract more subscribers. The SPpsilas pricing strategy should modify the prices continually regarding to the market to maximize its revenue. In this paper two novel pricing strategies are introduced, one based on game theory and the other based on Infinite Impulse Response (IIR) filtering. A simple strategy entitled fixed price strategy which calculates the price according to the cost is also used and compared with the other two pricing strategies. To show effectiveness of the strategies a telecommunication market is modeled in which some SPs operate and each SP uses one of the three pricing strategies. Simulation results show that the game theory-based strategy is the most effective strategy among the three strategies. An analytical model to compute average key parameters of SP in equilibrium market is also reported in the paper. This model is used to check analytical and simulative coincidence.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design flow for hardware implementation of digital filters","authors":"R. Yousefi, A. Ahmadi, S. M. Fakhraie","doi":"10.1109/ISTEL.2008.4651369","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651369","url":null,"abstract":"Digital filters are the basic component of telecommunication, multimedia and radar systems. In this paper, we demonstrate a design flow for hardware implementation of digital filters. In this methodology, we start with high level modeling of filters. Then based on the specification of the problem, we extract a golden model for it. To extract golden model, we analyze peak value estimation, coefficients quantization, word-length optimization and parasitic oscillations. After extracting the golden model, three approaches for hardware implementation are investigated. Area and frequency constraints are important issue for method of implementation. In real-time applications that frequency is an important issue, a fully combinational method should be used. In applications with low sample rates area is more important so we recommend using bit serial- implementation method.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133459198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Hendijani, M. Khalaj-AmirHoseini, V.K. Sharghi, H. Hadidian-Moghadam
{"title":"Design, simulation, and fabrication of tapered microstrip filters by applying the method of small reflections","authors":"N. Hendijani, M. Khalaj-AmirHoseini, V.K. Sharghi, H. Hadidian-Moghadam","doi":"10.1109/ISTEL.2008.4651287","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651287","url":null,"abstract":"In this paper we will introduce a novel method to design tapered transmission line microstrip filters. The proposed approach is based on the theory of partial reflections. Presuming a desired frequency response characteristic, we obtain the tapered line width variation. In order to validate this method a wide-band band stop tapered microstrip filter was designed, simulated, and fabricated.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130115777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Noise reduction from speech signal based on wavelet transform and Kullback-Leibler divergence","authors":"S. Tabibian, A. Akbari","doi":"10.1109/ISTEL.2008.4651407","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651407","url":null,"abstract":"A new method for noise reduction from speech signals based on the Kullback-Leibler (KL) divergence has been presented in this paper. First, the algorithm performs the wavelet packet transform to the noisy speech and decomposes it into subbands; then we apply a threshold on the noisy speech coefficients, in each subband, to obtain the enhanced speech. To determine the threshold, first the distributions of the noisy speech, estimated noise and estimated clean speech subbands are calculated; then a symmetric KL distance is calculated between the noisy speech and noise distributions. Finally a speech/noise decision is made based on the calculated distance. We conducted some tests using the TIMIT database in order to assess the performance of the proposed method and to compare it to the previous speech enhancement methods. The algorithm is evaluated using the perceptual evaluation of speech quality measure (PESQ) and the gain on input SNR. We obtain an improvement of 2db on SNR and 0.5 on PESQ-MOS score for the proposed method in comparison to the results of the previous wavelet based techniques for tested noises.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131788702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}