2013 9th International Conference on Information, Communications & Signal Processing最新文献

筛选
英文 中文
High efficient joint fingerprinting and decryption for multimedia distribution 用于多媒体分发的高效联合指纹和解密
2013 9th International Conference on Information, Communications & Signal Processing Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782792
Panyaporn Prangjarote, Chih-Yang Lin, C. Yeh
{"title":"High efficient joint fingerprinting and decryption for multimedia distribution","authors":"Panyaporn Prangjarote, Chih-Yang Lin, C. Yeh","doi":"10.1109/ICICS.2013.6782792","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782792","url":null,"abstract":"In fingerprint-based secure multimedia distribution systems, the encryption process is performed at the sender side before transmission, and the fingerprint embedding and decryption processes are performed at the receiver side simultaneously. In this paper, a low complexity joint fingerprint and decryption (JFD) scheme based on exclusive-or operations has been proposed, which can be effectively used for traitor tracing. The scheme encrypts only sub-pixels of the entire image using a tiny lookup table generated by a stream cipher. In the decryption process, some pixels can be completely recovered and the fingerprinting process depends on four different directions of sub-image blocks. The method successfully leaves the user's fingerprint during decryption and produces slightly different media copies. The experimental results show that the proposed scheme is highly effective in terms of perceptual security and fingerprinted visual quality.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Web image mining for facial age estimation 基于Web图像挖掘的面部年龄估计
2013 9th International Conference on Information, Communications & Signal Processing Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782962
Phyo-Kyaw Sai, Jian-Gang Wang, E. Teoh
{"title":"Web image mining for facial age estimation","authors":"Phyo-Kyaw Sai, Jian-Gang Wang, E. Teoh","doi":"10.1109/ICICS.2013.6782962","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782962","url":null,"abstract":"Face image based age estimation is an approach to classify face images into one of several pre-defined age-groups. It is challenging because the aging variation is specific to a given individual and is determined by not only the person's gene, but also by many external factors, such as exposure, weather conditions (e.g. ambient humidity), health, gender, living style and living location. Age categorization is a multiclass problem. Lack of a good public aging dataset makes it difficult to estimate age from face image. Due to large multiclass nature of human ages, it is difficult to collect large aging database. In this paper, we proposed a novel approach to collect high quality aging face images. Application Programming Interface (API) services provided by Microsoft Search Engine Bing are adopted for this purpose. Automatic collection of age-specified query images was implemented in C# programming interface with Microsoft BING API services. The experimental results of age estimation has verified that our approach is a good way to collect aging images in huge volume since internet hosts a large number of images with age labeling. It serves as an alternative cheap platform to gather face images for age classification.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Efficient resiliency mechanisms for next generation passive optical networks 新一代无源光网络的有效弹性机制
2013 9th International Conference on Information, Communications & Signal Processing Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782903
Jiajia Chen
{"title":"Efficient resiliency mechanisms for next generation passive optical networks","authors":"Jiajia Chen","doi":"10.1109/ICICS.2013.6782903","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782903","url":null,"abstract":"Future broadband access networks are expected to cover large service areas while fulfilling high bandwidth request on a per-user basis. The rapidly increasing traffic demand is also driven by the growing popularity of mobile data services, which is placing high-capacity requirement on the backhaul. Due to advances in wavelength division multiplexing (WDM) technology, WDM based architectures have been considered as promising candidates for next generation optical access, such as WDM passive optical network (PON), and hybrid WDM/time division multiplexing (TDM) PON. Meanwhile, resilience technique will play a more prominent role in emerging access networks due to their significantly increased capacity and coverage compared to the current deployments. Therefore, efficient resiliency mechanisms are highly required to enable uninterrupted network operation where a certain level of reliability performance can be guaranteed. In this work, we first evaluate reliability performance of each segment of next generation optical access networks and then identify the most important part for protection. A particular attention is paid to the reduction of failure impact.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Glottal activity detection using Finite Rate of Innovation methods 利用有限创新率方法检测声门活动
2013 9th International Conference on Information, Communications & Signal Processing Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782776
T. Amin, P. Marziliano
{"title":"Glottal activity detection using Finite Rate of Innovation methods","authors":"T. Amin, P. Marziliano","doi":"10.1109/ICICS.2013.6782776","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782776","url":null,"abstract":"A novel algorithm which accurately determines the glottal closing instants and glottal opening instants from the Differentiated Electroglottographic signals is presented.The glottal closing instants and glottal opening instant are modeled as non-bandlimited signals and methods for sampling and reconstructing signals with Finite Rate of Innovation are then used to recover the glottal closing instants and glottal opening instants. In comparison with existing methods, the proposed scheme achieves improved performance by providing 99% reliable estimates of glottal closing and opening instants respectively.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129394142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Statistical properties for cascaded Rayleigh fading channel models 级联瑞利衰落信道模型的统计特性
2013 9th International Conference on Information, Communications & Signal Processing Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782974
Y. Ibdah, Yanwu Ding
{"title":"Statistical properties for cascaded Rayleigh fading channel models","authors":"Y. Ibdah, Yanwu Ding","doi":"10.1109/ICICS.2013.6782974","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782974","url":null,"abstract":"In this paper, statistical models for cascaded Rayleigh fading channels with and without line-of-sight (LOS) are presented. The models comprise two individual summations of sinusoids with the Doppler frequencies calculated using fewer variables to reduce complexity. Statistical properties, including auto- and cross-correlations of the in-phase, quadrature components, and squared envelopes of the channels, are derived. The time-average statistical properties and the corresponding variance are also investigated to justify the convergence performance of the proposed models. Simulation results are provided to validate the performance of proposed models.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130931099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid routing in lossy link mobile ad hoc networks 有损链路移动自组网中的混合路由
2013 9th International Conference on Information, Communications & Signal Processing Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782952
C. Aung, P. Chong, Xinxing Zhao, Anthony Chua Yong Pheng, Tiah Khoon Ng, See Xinyou, Kok Siong Lai
{"title":"Hybrid routing in lossy link mobile ad hoc networks","authors":"C. Aung, P. Chong, Xinxing Zhao, Anthony Chua Yong Pheng, Tiah Khoon Ng, See Xinyou, Kok Siong Lai","doi":"10.1109/ICICS.2013.6782952","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782952","url":null,"abstract":"Routing protocols in mobile ad hoc network (MANET) are designed to provide data delivery in frequently changing network topology. Existing MANET routing protocols set up an end-to-end path between source and destination prior to data forwarding. Maintaining a connected path before data delivery may not work well when the network is partially disconnected or disrupted. This paper discusses Opportunistic Multi-link Delay Tolerant Routing (OMDTR) which is designed to provide data delivery in the network where fully connected network topology is not guaranteed. OMDTR learns the local network connectivity and deliver the data if there is connectivity within two-hop. OMDTR exploits the robustness of flooding-based routing when there is no local network connectivity. Performance measurements of OMDTR protocol show that OMDTR increases the data delivery compared to pure flooding-based routing and pure end-to-end routing in mobile multi-hop wireless network with relatively high and low network density.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125730032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust watermarking scheme for medical image using optimization method 基于优化方法的医学图像鲁棒水印方案
2013 9th International Conference on Information, Communications & Signal Processing Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782932
B. Lei, Tianfu Wang, Siping Chen, Dong Ni, Haijun Lei
{"title":"Robust watermarking scheme for medical image using optimization method","authors":"B. Lei, Tianfu Wang, Siping Chen, Dong Ni, Haijun Lei","doi":"10.1109/ICICS.2013.6782932","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782932","url":null,"abstract":"Currently, most medical images are stored and exchanged without any consideration of security, and hence it is highly desirable to provide content protection for medical images that are used in a secured environment. In this paper, a new and robust watermarking method is proposed to address this security issue. Specifically, signature information and textual data are inserted into the original medical images. The integer wavelet transform (IWT) are combined with singular value decomposition (SVD) to provide robustness in the proposed method. Meanwhile, differential evolution (DE) is used to optimally design the quantization steps (QSs) for controlling the watermarking strength. With hybrid techniques such as IWT, SVD, and DE, the proposed watermarking algorithm not only achieves good imperceptibility, but also high robustness. Experimental results demonstrate that the proposed method outperforms existing methods.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114576074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On the design of GSC beamformer in reverberant environment 混响环境下GSC波束形成器的设计
2013 9th International Conference on Information, Communications & Signal Processing Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782893
Zhibao Li, K. Yiu
{"title":"On the design of GSC beamformer in reverberant environment","authors":"Zhibao Li, K. Yiu","doi":"10.1109/ICICS.2013.6782893","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782893","url":null,"abstract":"The generalized sidelobe canceller (GSC) beamformer is an effective and efficient technique for speech enhancement, whereas the design of beamformer is still a challenge in a reverberant environment, due to the difficulty of room impulse responses (RIRs) estimation. In this paper, we will study the design of GSC beamformer based on the RIRs estimated by image source method, which is a simple but effective method for room acoustics simulation.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121100362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convex optimization and its applications in robust adaptive beamforming 凸优化及其在鲁棒自适应波束形成中的应用
2013 9th International Conference on Information, Communications & Signal Processing Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782919
Z. Yu, Z. Gu, W. Ser, M. Er
{"title":"Convex optimization and its applications in robust adaptive beamforming","authors":"Z. Yu, Z. Gu, W. Ser, M. Er","doi":"10.1109/ICICS.2013.6782919","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782919","url":null,"abstract":"Convex optimization plays an important role in science and engineering research. In many signal processing applications, convex optimization is one of the critical mathematical tools. For example, robust adaptive beamformer is always formulated as quadratic optimization problem with some linear or quadratic constraints. In this paper, we review some of the progresses of our group on using Constraints on Magnitude Response (CMRs) for robust adaptive beamforming. Some mathematical skills on how to transform the beamformer with CMRs into convex programming problems are introduced. With proper convex formulations, the proposed beamformers posses simple implementation, flexible performance control, as well as significant SINR enhancement.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126897159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
GPP-based optimization for joint-detection in TD-SCDMA uplink 基于gpp的TD-SCDMA上行链路联合检测优化
2013 9th International Conference on Information, Communications & Signal Processing Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782863
Jinde Zhou, K. Niu, Zhiqiang He, Jiaru Lin
{"title":"GPP-based optimization for joint-detection in TD-SCDMA uplink","authors":"Jinde Zhou, K. Niu, Zhiqiang He, Jiaru Lin","doi":"10.1109/ICICS.2013.6782863","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782863","url":null,"abstract":"Joint detection is a high complexity module in TD-SCDMA system. This paper analyzes the selection of algorithm, and presents an overview of optimization methods for the selected algorithm based on general purpose processors (GPPs) It includes look-up-able (LUT), Single Instruction Multiple Data (SIMD) and Intel Integrated Performance Primitives (Intel IPP) Library. The results of timing test illustrate that with utilizing these methods, the joint detection module in TD-SCDMA system can achieve huge benefits in real-time performance.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"58 36","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131471042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信