{"title":"High efficient joint fingerprinting and decryption for multimedia distribution","authors":"Panyaporn Prangjarote, Chih-Yang Lin, C. Yeh","doi":"10.1109/ICICS.2013.6782792","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782792","url":null,"abstract":"In fingerprint-based secure multimedia distribution systems, the encryption process is performed at the sender side before transmission, and the fingerprint embedding and decryption processes are performed at the receiver side simultaneously. In this paper, a low complexity joint fingerprint and decryption (JFD) scheme based on exclusive-or operations has been proposed, which can be effectively used for traitor tracing. The scheme encrypts only sub-pixels of the entire image using a tiny lookup table generated by a stream cipher. In the decryption process, some pixels can be completely recovered and the fingerprinting process depends on four different directions of sub-image blocks. The method successfully leaves the user's fingerprint during decryption and produces slightly different media copies. The experimental results show that the proposed scheme is highly effective in terms of perceptual security and fingerprinted visual quality.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web image mining for facial age estimation","authors":"Phyo-Kyaw Sai, Jian-Gang Wang, E. Teoh","doi":"10.1109/ICICS.2013.6782962","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782962","url":null,"abstract":"Face image based age estimation is an approach to classify face images into one of several pre-defined age-groups. It is challenging because the aging variation is specific to a given individual and is determined by not only the person's gene, but also by many external factors, such as exposure, weather conditions (e.g. ambient humidity), health, gender, living style and living location. Age categorization is a multiclass problem. Lack of a good public aging dataset makes it difficult to estimate age from face image. Due to large multiclass nature of human ages, it is difficult to collect large aging database. In this paper, we proposed a novel approach to collect high quality aging face images. Application Programming Interface (API) services provided by Microsoft Search Engine Bing are adopted for this purpose. Automatic collection of age-specified query images was implemented in C# programming interface with Microsoft BING API services. The experimental results of age estimation has verified that our approach is a good way to collect aging images in huge volume since internet hosts a large number of images with age labeling. It serves as an alternative cheap platform to gather face images for age classification.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient resiliency mechanisms for next generation passive optical networks","authors":"Jiajia Chen","doi":"10.1109/ICICS.2013.6782903","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782903","url":null,"abstract":"Future broadband access networks are expected to cover large service areas while fulfilling high bandwidth request on a per-user basis. The rapidly increasing traffic demand is also driven by the growing popularity of mobile data services, which is placing high-capacity requirement on the backhaul. Due to advances in wavelength division multiplexing (WDM) technology, WDM based architectures have been considered as promising candidates for next generation optical access, such as WDM passive optical network (PON), and hybrid WDM/time division multiplexing (TDM) PON. Meanwhile, resilience technique will play a more prominent role in emerging access networks due to their significantly increased capacity and coverage compared to the current deployments. Therefore, efficient resiliency mechanisms are highly required to enable uninterrupted network operation where a certain level of reliability performance can be guaranteed. In this work, we first evaluate reliability performance of each segment of next generation optical access networks and then identify the most important part for protection. A particular attention is paid to the reduction of failure impact.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Glottal activity detection using Finite Rate of Innovation methods","authors":"T. Amin, P. Marziliano","doi":"10.1109/ICICS.2013.6782776","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782776","url":null,"abstract":"A novel algorithm which accurately determines the glottal closing instants and glottal opening instants from the Differentiated Electroglottographic signals is presented.The glottal closing instants and glottal opening instant are modeled as non-bandlimited signals and methods for sampling and reconstructing signals with Finite Rate of Innovation are then used to recover the glottal closing instants and glottal opening instants. In comparison with existing methods, the proposed scheme achieves improved performance by providing 99% reliable estimates of glottal closing and opening instants respectively.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129394142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical properties for cascaded Rayleigh fading channel models","authors":"Y. Ibdah, Yanwu Ding","doi":"10.1109/ICICS.2013.6782974","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782974","url":null,"abstract":"In this paper, statistical models for cascaded Rayleigh fading channels with and without line-of-sight (LOS) are presented. The models comprise two individual summations of sinusoids with the Doppler frequencies calculated using fewer variables to reduce complexity. Statistical properties, including auto- and cross-correlations of the in-phase, quadrature components, and squared envelopes of the channels, are derived. The time-average statistical properties and the corresponding variance are also investigated to justify the convergence performance of the proposed models. Simulation results are provided to validate the performance of proposed models.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130931099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Aung, P. Chong, Xinxing Zhao, Anthony Chua Yong Pheng, Tiah Khoon Ng, See Xinyou, Kok Siong Lai
{"title":"Hybrid routing in lossy link mobile ad hoc networks","authors":"C. Aung, P. Chong, Xinxing Zhao, Anthony Chua Yong Pheng, Tiah Khoon Ng, See Xinyou, Kok Siong Lai","doi":"10.1109/ICICS.2013.6782952","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782952","url":null,"abstract":"Routing protocols in mobile ad hoc network (MANET) are designed to provide data delivery in frequently changing network topology. Existing MANET routing protocols set up an end-to-end path between source and destination prior to data forwarding. Maintaining a connected path before data delivery may not work well when the network is partially disconnected or disrupted. This paper discusses Opportunistic Multi-link Delay Tolerant Routing (OMDTR) which is designed to provide data delivery in the network where fully connected network topology is not guaranteed. OMDTR learns the local network connectivity and deliver the data if there is connectivity within two-hop. OMDTR exploits the robustness of flooding-based routing when there is no local network connectivity. Performance measurements of OMDTR protocol show that OMDTR increases the data delivery compared to pure flooding-based routing and pure end-to-end routing in mobile multi-hop wireless network with relatively high and low network density.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125730032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Lei, Tianfu Wang, Siping Chen, Dong Ni, Haijun Lei
{"title":"Robust watermarking scheme for medical image using optimization method","authors":"B. Lei, Tianfu Wang, Siping Chen, Dong Ni, Haijun Lei","doi":"10.1109/ICICS.2013.6782932","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782932","url":null,"abstract":"Currently, most medical images are stored and exchanged without any consideration of security, and hence it is highly desirable to provide content protection for medical images that are used in a secured environment. In this paper, a new and robust watermarking method is proposed to address this security issue. Specifically, signature information and textual data are inserted into the original medical images. The integer wavelet transform (IWT) are combined with singular value decomposition (SVD) to provide robustness in the proposed method. Meanwhile, differential evolution (DE) is used to optimally design the quantization steps (QSs) for controlling the watermarking strength. With hybrid techniques such as IWT, SVD, and DE, the proposed watermarking algorithm not only achieves good imperceptibility, but also high robustness. Experimental results demonstrate that the proposed method outperforms existing methods.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114576074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the design of GSC beamformer in reverberant environment","authors":"Zhibao Li, K. Yiu","doi":"10.1109/ICICS.2013.6782893","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782893","url":null,"abstract":"The generalized sidelobe canceller (GSC) beamformer is an effective and efficient technique for speech enhancement, whereas the design of beamformer is still a challenge in a reverberant environment, due to the difficulty of room impulse responses (RIRs) estimation. In this paper, we will study the design of GSC beamformer based on the RIRs estimated by image source method, which is a simple but effective method for room acoustics simulation.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121100362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Convex optimization and its applications in robust adaptive beamforming","authors":"Z. Yu, Z. Gu, W. Ser, M. Er","doi":"10.1109/ICICS.2013.6782919","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782919","url":null,"abstract":"Convex optimization plays an important role in science and engineering research. In many signal processing applications, convex optimization is one of the critical mathematical tools. For example, robust adaptive beamformer is always formulated as quadratic optimization problem with some linear or quadratic constraints. In this paper, we review some of the progresses of our group on using Constraints on Magnitude Response (CMRs) for robust adaptive beamforming. Some mathematical skills on how to transform the beamformer with CMRs into convex programming problems are introduced. With proper convex formulations, the proposed beamformers posses simple implementation, flexible performance control, as well as significant SINR enhancement.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126897159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GPP-based optimization for joint-detection in TD-SCDMA uplink","authors":"Jinde Zhou, K. Niu, Zhiqiang He, Jiaru Lin","doi":"10.1109/ICICS.2013.6782863","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782863","url":null,"abstract":"Joint detection is a high complexity module in TD-SCDMA system. This paper analyzes the selection of algorithm, and presents an overview of optimization methods for the selected algorithm based on general purpose processors (GPPs) It includes look-up-able (LUT), Single Instruction Multiple Data (SIMD) and Intel Integrated Performance Primitives (Intel IPP) Library. The results of timing test illustrate that with utilizing these methods, the joint detection module in TD-SCDMA system can achieve huge benefits in real-time performance.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"58 36","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131471042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}