{"title":"Neurofuzzy inference systems based on tribal particle swarm optimization for forecasting sunspot numbers","authors":"Cheng-Hung Chen, Yen-Yun Liao, Shu-Wei Liu","doi":"10.1109/ICICS.2013.6782878","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782878","url":null,"abstract":"This study presents tribal particle swarm optimization (TPSO) to optimize the parameters of the specific neurofuzzy inference system (NIS) for forecasting sunspot numbers. The proposed TPSO uses particle swarm optimization (PSO) as evolution strategies of the tribes optimization algorithm (TOA) to balance local and global exploration of the search space. Experimental results demonstrated that the proposed TPSO method converges quickly and yields a lower RMS error than other current methods.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A user authentication scheme on multi-server environments for cloud computing","authors":"Jen-Ho Yang, Ya-Fen Chang, Chih-Cheng Huang","doi":"10.1109/ICICS.2013.6782791","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782791","url":null,"abstract":"In the cloud computing, user authentication is an important security mechanism because it provides the functions of authentication, authorization, and accounting for cloud servers. However, the previously proposed user authentication schemes have many security and efficiency problems. In addition, these schemes can only work on single server environments. To solve the above problems, we propose a new user authentication scheme on multi-server environments for cloud computing in this paper. Compared with the related works, the proposed scheme has less computation costs. In addition, the proposed scheme can be applied to multi-server environments because the ID-based concept is used. Therefore, the proposed user authentication scheme provides efficiency, security, and flexibility for the cloud computing applications.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115239484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Lei, Tianfu Wang, Siping Chen, Dong Ni, Haijun Lei
{"title":"Robust watermarking scheme for medical image using optimization method","authors":"B. Lei, Tianfu Wang, Siping Chen, Dong Ni, Haijun Lei","doi":"10.1109/ICICS.2013.6782932","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782932","url":null,"abstract":"Currently, most medical images are stored and exchanged without any consideration of security, and hence it is highly desirable to provide content protection for medical images that are used in a secured environment. In this paper, a new and robust watermarking method is proposed to address this security issue. Specifically, signature information and textual data are inserted into the original medical images. The integer wavelet transform (IWT) are combined with singular value decomposition (SVD) to provide robustness in the proposed method. Meanwhile, differential evolution (DE) is used to optimally design the quantization steps (QSs) for controlling the watermarking strength. With hybrid techniques such as IWT, SVD, and DE, the proposed watermarking algorithm not only achieves good imperceptibility, but also high robustness. Experimental results demonstrate that the proposed method outperforms existing methods.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114576074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image segmentation approach for realizing zoomable streaming HEVC video","authors":"Yuri Umezaki, S. Goto","doi":"10.1109/ICICS.2013.6782830","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782830","url":null,"abstract":"With the popularity of mobile devices such as mobile phones and cameras, zooming and displaying an arbitrary region of interest (ROI) from a high-resolution video has gained considerable importance. In this study, we implement two methods - partial decoding and tiled encoding - for ROI-based streaming in High Efficiency Video Coding (HEVC). In partial decoding, only the ROI and dependence area are decoded; this approach reduces the calculation cost. In tiled encoding, video frames are split into a grid of tiles, each of which is encoded independently; this approach requires a compatible decoder, and it reduces the streaming bitrate and decoding calculation cost. We evaluated these two methods in terms of the decoding calculation cost, bandwidth efficiency, and video quality. Experimental results show that partial decoding reduced the decoding calculation cost by 35-55%. Tiled encoding showed optimal decoding calculation cost and bandwidth efficiency for a tile size of 128 pixels.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High efficient joint fingerprinting and decryption for multimedia distribution","authors":"Panyaporn Prangjarote, Chih-Yang Lin, C. Yeh","doi":"10.1109/ICICS.2013.6782792","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782792","url":null,"abstract":"In fingerprint-based secure multimedia distribution systems, the encryption process is performed at the sender side before transmission, and the fingerprint embedding and decryption processes are performed at the receiver side simultaneously. In this paper, a low complexity joint fingerprint and decryption (JFD) scheme based on exclusive-or operations has been proposed, which can be effectively used for traitor tracing. The scheme encrypts only sub-pixels of the entire image using a tiny lookup table generated by a stream cipher. In the decryption process, some pixels can be completely recovered and the fingerprinting process depends on four different directions of sub-image blocks. The method successfully leaves the user's fingerprint during decryption and produces slightly different media copies. The experimental results show that the proposed scheme is highly effective in terms of perceptual security and fingerprinted visual quality.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimum power allocation for OFDM in physical-layer network coding over a flat frequency-selective fading channel","authors":"Desi Luo, Qiyue Yu, W. Meng","doi":"10.1109/ICICS.2013.6782897","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782897","url":null,"abstract":"The physical layer network coding (PNC) takes advantages of signal interference at relay node and improves the channel capacity, therefore, PNC becomes an important research topic. However, the frequency-selective fading channel would destroy the performances of PNC. This paper considers orthogonal frequency division multiplex (OFDM) in PNC, when signals transmitted over a frequency-selective fading channel, and an optimum power allocation scheme is proposed. Simulation results show that the presented system not only eliminates the multi-path interference, but also maximizes the channel capacity by the optimum power allocation.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125057939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual-decoder-model scheduling for H.264 video transmission over wireless networks","authors":"Danyang Zhang, Fan Li, Chao Zhang","doi":"10.1109/ICICS.2013.6782913","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782913","url":null,"abstract":"In this paper, a dual-decoder-based scheduling algorithm is proposed for H.264 video transmission over wireless networks. In the algorithm, the packet is scheduled by the packet quality contribution index (PQCI). The PQCI is defined and estimated not only by the quality distortion made for the current frame, but also by that made for the frames which directly or indirectly related with the current frame. A dual-decoder-model algorithm is proposed for the PQCI estimation. A novel architecture with two simulated decoders in the sender is developed. The simulations show that the proposed algorithm significantly outperforms the conventional methods in terms of received video qualities.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123483357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Glottal activity detection using Finite Rate of Innovation methods","authors":"T. Amin, P. Marziliano","doi":"10.1109/ICICS.2013.6782776","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782776","url":null,"abstract":"A novel algorithm which accurately determines the glottal closing instants and glottal opening instants from the Differentiated Electroglottographic signals is presented.The glottal closing instants and glottal opening instant are modeled as non-bandlimited signals and methods for sampling and reconstructing signals with Finite Rate of Innovation are then used to recover the glottal closing instants and glottal opening instants. In comparison with existing methods, the proposed scheme achieves improved performance by providing 99% reliable estimates of glottal closing and opening instants respectively.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129394142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web image mining for facial age estimation","authors":"Phyo-Kyaw Sai, Jian-Gang Wang, E. Teoh","doi":"10.1109/ICICS.2013.6782962","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782962","url":null,"abstract":"Face image based age estimation is an approach to classify face images into one of several pre-defined age-groups. It is challenging because the aging variation is specific to a given individual and is determined by not only the person's gene, but also by many external factors, such as exposure, weather conditions (e.g. ambient humidity), health, gender, living style and living location. Age categorization is a multiclass problem. Lack of a good public aging dataset makes it difficult to estimate age from face image. Due to large multiclass nature of human ages, it is difficult to collect large aging database. In this paper, we proposed a novel approach to collect high quality aging face images. Application Programming Interface (API) services provided by Microsoft Search Engine Bing are adopted for this purpose. Automatic collection of age-specified query images was implemented in C# programming interface with Microsoft BING API services. The experimental results of age estimation has verified that our approach is a good way to collect aging images in huge volume since internet hosts a large number of images with age labeling. It serves as an alternative cheap platform to gather face images for age classification.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical properties for cascaded Rayleigh fading channel models","authors":"Y. Ibdah, Yanwu Ding","doi":"10.1109/ICICS.2013.6782974","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782974","url":null,"abstract":"In this paper, statistical models for cascaded Rayleigh fading channels with and without line-of-sight (LOS) are presented. The models comprise two individual summations of sinusoids with the Doppler frequencies calculated using fewer variables to reduce complexity. Statistical properties, including auto- and cross-correlations of the in-phase, quadrature components, and squared envelopes of the channels, are derived. The time-average statistical properties and the corresponding variance are also investigated to justify the convergence performance of the proposed models. Simulation results are provided to validate the performance of proposed models.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130931099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}