{"title":"Information hiding algorithm for palette images based on HVS","authors":"Junling Ren","doi":"10.1109/ITAPP.2010.5566635","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566635","url":null,"abstract":"This article is based on Human Visual System (HVS). The carrier image is divided into three regions: the smooth region, the texture region and the fringe region. After the secret image being scrambled, the different merging coefficients are set in the respective region of the carrier image to mix the secret image and the carrier image together. According to the characteristics of the palette image, the scrambling coefficients are embedded into the carrier image palette to increase the confidentiality of the information. During carrier image partitioning, variation coefficient is introduced to describe the data dispersion degree of the image. Thus the stability of the threshold is enhanced, and a much better hiding effect on the secret information is achieved.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126170005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New detection scheme for spread spectrum audio watermarking","authors":"Lili Li, Xiangzhong Fang","doi":"10.1109/WCINS.2010.5541794","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541794","url":null,"abstract":"This paper presents a new improved scheme to the detection algorithm for the spread spectrum audio watermark. Based on the traditional detection method, our detection algorithm normalizes the correlation sequence and then compares its energy against a threshold to determine whether an audio segment is watermarked or not. Because this energy is independent of the amplitude of the audio segment, the detection is not affected by the audio signal and thus the detection error rate is very low. Experimental results show that the proposed detector makes great progress on the robustness to normal attacks.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"14 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126189712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multimode Multi-Band Excitation with Linear Prediction vocoder","authors":"Yanxia Liang, Jiawei Yang, Ye Li","doi":"10.1109/WCINS.2010.5541932","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541932","url":null,"abstract":"This paper presents a Multimode Multi-Band Excitation with Linear Prediction model (MMBE-LP) at 2.35kbps. Unvoiced/Voiced (U/V) decisions and spectrum amplitudes estimations are improved in this vocoder compared with MBE vocoder. For better quantization results, different codebooks are used for different modes of U/V decision, so the number of sub-bands in a frame is fixed. Spectral amplitudes are estimated by Linear Prediction Mode and quantized by MSVQ (Multi-Stage Vector Quantization). Simulation results show that the unvoiced and voiced parts of synthetic speech are coherent with the parts of original speech obviously.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115002307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of quasi cyclic LDPC with ACE constraint","authors":"Jilong Li, Na Di, Ming Yang, Zhiyong Wu","doi":"10.1109/WCINS.2010.5541895","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541895","url":null,"abstract":"In this paper, LDPC code structure and decoder implementation is reviewed. The effect of graph connectivity on LDPC performance is analyzed. The metric of ACE (approximate cycle EMD) in code construction avoids small trapping sets by emphasizing the connectivity. A construction algorithm with ACE constraint is proposed which maximize the girth and stopping sets in a best effort way. Simulation results justify the efficiency of the algorithm.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115233935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple channel shortening equalizer for wireless TDD-OFDM systems","authors":"Ping Zhang, J. Qin","doi":"10.1109/WCINS.2010.5541759","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541759","url":null,"abstract":"In a Orthogonal Frequency Division Multiplexing (OFDM) system, a channel shortening equalizer (CSE) combats multipath interferences by shortening the channel delay spread to the desired length. In this paper, a simple and efficient channel shortening pre-equalizer for a wireless OFDM system is proposed. The equalizer takes advantages of the characteristics of a wireless channel which can be represented as a finite impulse response (FIR) filter and is an all zero system. It eliminates the zeros of FIR to effectively reduce the length of channel impulse response. The proposed equalizer simplifies wireless OFDM transceivers. The simulation results show the validity of the proposed preequalizer.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121102926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhen-Guo Yang, Liusheng Huang, Mingjun Xiao, Wang-gui Liu
{"title":"Flow-Based Transmission Scheduling in Delay Tolerant Networks with bandwidth constraint","authors":"Zhen-Guo Yang, Liusheng Huang, Mingjun Xiao, Wang-gui Liu","doi":"10.1109/WCINS.2010.5544128","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544128","url":null,"abstract":"Routing is one of the most challenging problems in Delay-Tolerant Networks (DTNs) due to network partitioning and intermittent connectivity. Most existing protocols are based on unlimited bandwidth. Previous protocols based on limited bandwidth (MaxProp, RAPID, etc) only consider the scenario that each node has at most one contact opportunity during any time interval, and discuss the packet scheduling mechanisms for each separate contact to minimize the average delivery delay. However, in many applications of DTNs, more than one contact opportunities with the same source node, which are called as related contact opportunities, may arise in the same time interval. But previous scheduling algorithms cannot apply to such applications. Therefore, we propose a more general scheduling algorithm to optimize the delivery delay in bandwidth limited DTNs including the scenario that multiple related contact opportunities may arise in the same interval, called Flow-Based Transmission Scheduling (FBTS). We evaluate it on publicly available data sets against MED, MaxProp and RAPID. The results show that the delivery delay of FBTS is at least 35% shorter than that of existing works.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121112734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple beams scanning double square loop antenna for UWB communications","authors":"A. Raaza, A. Mehta","doi":"10.1109/WCINS.2010.5541792","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541792","url":null,"abstract":"A novel method of producing multiple axial and tilted beams using eight feed double square loop (DSL) antenna is proposed. With varying permittivity value of dielectric substrate, the DSL antenna produces multiple beams and steer each of the beam produced at step of 45° throughout the 360° of space, thus offering wide range of option for any modern wireless device integrated with this antenna to focus the beam in target direction. Also the antenna operates in four different frequencies providing multi-channel operation in UWB region.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127109641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on a secure mobile payment based on multi-agents","authors":"Wang Qiongqiong, Xin Ming-jun","doi":"10.1109/WCINS.2010.5541862","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541862","url":null,"abstract":"As mobile agent can provide better flexibility and performance, it takes an important part in the mobile business application nowadays. At the same time, it has to face much more new uncertain secure problems in several business domains. Therefore, there is a secure mobile payment protocol based on multi-agents to resolve the above security problem, so as to integrate the current mobile agent security solutions and the existing mobile payment protocols. The protocol disscussed in this paper uses n agents to realize decentralization, which makes that the signature won't become effective unless there have k proxy agents from the n proxy agents. Finally, it demonstrates the mobile payment protocol discussed in this paper performs better than the existing methods.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127306287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Multihoming Scheme in a Loc/ID split context","authors":"Haisheng Jiang, Sidong Zhang","doi":"10.1109/WCINS.2010.5541834","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541834","url":null,"abstract":"With the developing of the Internet technologies, more and more terminal equipments or networks access the Internet through multiple links called multihoming. However, traditional multihoming schemes based on IP address may cause some problems such as route expansion and disruptive connections. In this paper we propose a novel multihoming scheme named the Identifier Base Multihoming Scheme (IBMS) under the Loc/ID split architecture, introduce the basic theory and the implement details, especially in the form of scenario analysis. IBMS is an identifier based multihoming scheme that can be executed both for networks and individual terminals. It is designed to offer the functions of the redundancy, load sharing, security guarantee and some other traffic engineering abilities which contribute to fulfill the demands of route control, scalability, non-disruptive connectivity, reliability, availability of the network. Scenario analysis show the effectiveness of the IBMS in the identifier based on the universal network architecture (IBUNA) under the Loc/ID split context.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125061766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Periodic message-based modeling and performance analysis of AFDX","authors":"Du-juan Li, Jian-dong Zhang, Bin Liu","doi":"10.1109/WCINS.2010.5541912","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541912","url":null,"abstract":"Avionics Full Duplex Switched Ethernet (AFDX) has developed into a new generation avionics bus system with its superior performance of network communication, such as the low cost, good scalability, and deterministic latency. Based on periodic message, this paper gives the Petri Net model of AFDX and simulates it, and the solving of the model provides two important performance indices—network load and delay time in the process of periodic message transmission. It helps to further the understanding of the message transmission mechanism of AFDX network by analyzing the performance curve, and proves that AFDX can satisfy the transmission requirement of new generation avionics bus system, which provides the important technology support for the design and improvement of the system.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126180693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}