{"title":"Contoulet denoising of natural images","authors":"A. Bin Mansoor, S.A. Khan","doi":"10.1109/ICALIP.2008.4590267","DOIUrl":"https://doi.org/10.1109/ICALIP.2008.4590267","url":null,"abstract":"The paper investigates the image denoising utilizing a new discrete transform, contourlet transform through thresholding technique for natural images. We investigate the new transform with varied amount of noise for three sigma thresholding on a block of four natural images. Signal to noise ratio and visual judgement are made to assess the denoised images. The method displays improved signal to noise ratio for noisy images, but with observable artifacts.","PeriodicalId":175885,"journal":{"name":"2008 International Conference on Audio, Language and Image Processing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115381626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image compression method based on Generalized Finite Automata","authors":"Xiaohu Ma, Huanqin Chen","doi":"10.1109/ICALIP.2008.4590096","DOIUrl":"https://doi.org/10.1109/ICALIP.2008.4590096","url":null,"abstract":"In this paper, we introduce an approach to compress gray image using deterministic generalized finite automata (GFA). By detecting the self-similarity inside an input digitized gray image, a GFA can be constructed to describe the image. The decode algorithm can restore the image from the deterministic generalized finite automata efficiently. This method has a smaller number of states than an equivalent classical finite automaton. Meanwhile it also has an advantage of higher compression without further degradation of quality.","PeriodicalId":175885,"journal":{"name":"2008 International Conference on Audio, Language and Image Processing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The parsing algorithm of HPSG-deductive system","authors":"Erqing Xu","doi":"10.1109/ICALIP.2008.4590159","DOIUrl":"https://doi.org/10.1109/ICALIP.2008.4590159","url":null,"abstract":"Parsing as logic deduction has become a latest approach in linguistics. HDS is an HPSG-deductive system basing on Martin-Lof typed lambda calculus. However, HDS is a formal system. HDS does not overtly include concrete parsing process. Therefore this paper presents an algorithm, which automatically finds out HDS deduction for concrete parsing. The feature of the algorithm is that it is type-driven and it is able to discover the possible phonologically null traces in a sentence and to fill traces with information so as to normalize these sentences. An application example shows validity of the algorithm.","PeriodicalId":175885,"journal":{"name":"2008 International Conference on Audio, Language and Image Processing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115547581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. P. Lekshmi, S. Kumar, Divya S. Vidyadharan, S. Naveen
{"title":"Analysis of facial expressions using PCA on half and full faces","authors":"V. P. Lekshmi, S. Kumar, Divya S. Vidyadharan, S. Naveen","doi":"10.1109/ICALIP.2008.4590224","DOIUrl":"https://doi.org/10.1109/ICALIP.2008.4590224","url":null,"abstract":"Face recognition and expression analysis is one of the most challenging research areas in the field of computer vision. Even though face exhibits different facial expressions, which can be instantly recognized by human eyes, it is very difficult for a computer to extract and use the information content from these expressions. In this paper we present a method to analyze facial expression by focusing on the regions such as eyes, mouth etc whose geometries are mostly affected by variation in facial expressions. Face regions are recognized using principal component analysis (PCA) method. Face images are projected on to a feature space and the weight vectors are compared to get minimum variation. The geometric coordinates of highly expression reflected areas are extracted for analyzing facial expressions. Our method reliably works even with faces, which carry heavy expressions. A comparative study was done by exploiting the symmetrical structure of faces. Our approach performed well for individual half regions of faces. This method exhibits a good performance ratio.","PeriodicalId":175885,"journal":{"name":"2008 International Conference on Audio, Language and Image Processing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115913935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information hiding in AVS compressed stream","authors":"Xingguang Song, Yuting Su, Jing Hu, Zhong Ji","doi":"10.1109/ICALIP.2008.4590099","DOIUrl":"https://doi.org/10.1109/ICALIP.2008.4590099","url":null,"abstract":"This paper presents a novel information hiding algorithm for AVS (audio video coding standard), taking advantage of the specific features of this self developed Chinese audio video compression standard. AVS adopts Exp-Golomb coding and context based adaptive variable length coding to solve the entropy coding problem, almost all the syntax elements are encoded using Exp-Golomb codes. In the compressed bitstream, hidden bits are embedded by modulating the corresponding Exp-Golomb code, which is based on the mapping rules between these codes and the hidden bits. The hiding positions are limited to maintain the quality of the reconstructed images. Hidden information can be retrieved by decoding the Exp-Golomb code from bitstream, requiring neither original media nor complete video decoding. The experimental results show that the hidden algorithm has little effect on the video quality and the bitrate hasnpsilat been changed.","PeriodicalId":175885,"journal":{"name":"2008 International Conference on Audio, Language and Image Processing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115953841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Qu, Zheng Xiao, Mei Gong, Ying Huang, Xiaodong Li, Xihong Wu
{"title":"Distance dependent head-related transfer function database of KEMAR","authors":"T. Qu, Zheng Xiao, Mei Gong, Ying Huang, Xiaodong Li, Xihong Wu","doi":"10.1109/ICALIP.2008.4590089","DOIUrl":"https://doi.org/10.1109/ICALIP.2008.4590089","url":null,"abstract":"The measurement and structure of a database of distance-dependent head-related transfer function is introduced in this paper. This database was setup by measuring a high spatial resolution head-related transfer function at a total of 6344 space points, with distance from 20 to 160 cm, elevation from -40 to 90 degrees, and azimuth from 0 to 360 degrees. The databasepsilas reliability was confirmed by the object and subject evaluations.","PeriodicalId":175885,"journal":{"name":"2008 International Conference on Audio, Language and Image Processing","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116214522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method combination to extract text from images and videos with complex backgrounds","authors":"Wuyi Yang, Shuwu Zhang, Zhi Zeng, Haibo Zheng","doi":"10.1109/ICALIP.2008.4590070","DOIUrl":"https://doi.org/10.1109/ICALIP.2008.4590070","url":null,"abstract":"Text extraction from images with complex backgrounds remains a challenging problem. Existing thresholding methods succeed in extracting text from images with simple or slowly varying backgrounds. However, when the backgrounds include sharply varying contours, some background pixels, which have similar intensities to the text, are classified to the text pixels in the binary image. In the literature, seed-fill method is used to remove these background pixels. But, existing seed-fill method cannot remove the background pixels inside the characters. To overcome the disadvantages of the previous methods, we propose a novel text extraction method. This method combines a locally adaptive seed-fill method, a locally adaptive thresholding method and a stroke-model-based method with the following steps: (1) The locally adaptive seed-fill method, the locally adaptive thresholding method and the stroke-model-based method are respectively used to get three binary images; (2) The final binary image is gotten by fusing the three binary images. Experimental results demonstrate the effectiveness of the proposed method in comparison with other related works in the literature.","PeriodicalId":175885,"journal":{"name":"2008 International Conference on Audio, Language and Image Processing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115529035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image encryption strategy transparent to transcoding","authors":"Nan Jiang, Wenyu Liu","doi":"10.1109/ICALIP.2008.4590197","DOIUrl":"https://doi.org/10.1109/ICALIP.2008.4590197","url":null,"abstract":"A new encryption strategy proposed in this paper, which based on duple permutation, is designed for transparent transcoding. Firstly the original image is divided into several macro blocks by certain size, and the sequence of macro block rows is reordered. Then, the macro blocks are permuted in rows. Theoretical analysis and experimental results indicate that the strategy proposed in this paper is transparent to transcoding, security and low computation complexity. It has little adverse impact on the compact ratio. All the attributes mentioned above make this strategy suitable to be the encryption approach for image transmission.","PeriodicalId":175885,"journal":{"name":"2008 International Conference on Audio, Language and Image Processing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114643634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency warping and subband merging for approximating the critical bands with cosine-modulated filter banks","authors":"M. Parfieniuk, A. Petrovsky, W. Wan","doi":"10.1109/ICALIP.2008.4590274","DOIUrl":"https://doi.org/10.1109/ICALIP.2008.4590274","url":null,"abstract":"A novel approach to designing nonuniform cosine-modulated filter banks is presented. Frequency warping and subband merging are used together to obtain more freedom of frequency partitioning, and thus to approximate the critical bands of hearing more accurately. On the other hand, for a given accuracy, different compromises between warping strength and the number of channels can be investigated to minimize the computational complexity of the system.","PeriodicalId":175885,"journal":{"name":"2008 International Conference on Audio, Language and Image Processing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123689263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiajia Zhang, Hui-xian Huang, Chenhao Wang, Hongbin Pan
{"title":"A steganographic method based on self-organizing map and HVS","authors":"Jiajia Zhang, Hui-xian Huang, Chenhao Wang, Hongbin Pan","doi":"10.1109/ICALIP.2008.4590270","DOIUrl":"https://doi.org/10.1109/ICALIP.2008.4590270","url":null,"abstract":"In order to provide large capacity of hidden secret data and imperceptibility of stego-image, in this paper, a novel image steganographic method based on self-organizing map and HVS was presented. According to contrast and texture sensitivity, self-organizing map based on competitive learning is trained. So NNs trained is the key of the embedded and extracted secret data. The method exploits neighboring pixels(upper, left, right, bottom) to estimate the degree of sensitivity of pixels with NNs trained so that pixels in less sensitive areas can potentially carry more hidden data. From the experimental results, compared with SOC, the proposed method can hide a much larger information and maintains a better visual quality of stego-image.","PeriodicalId":175885,"journal":{"name":"2008 International Conference on Audio, Language and Image Processing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123740494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}