E. Syahrul, J. Dubois, V. Vajnovszki, T. Saidani, Mohamed Atri
{"title":"Lossless Image Compression Using Burrows Wheeler Transform (Methods and Techniques)","authors":"E. Syahrul, J. Dubois, V. Vajnovszki, T. Saidani, Mohamed Atri","doi":"10.1109/SITIS.2008.40","DOIUrl":"https://doi.org/10.1109/SITIS.2008.40","url":null,"abstract":"The burrows-wheeler transform (BWT) is a combinatorial algorithm originally created for text compression such as bzip2, and that has been recently applied to image compression field. This paper focuses on the impact of compression scheme based on the combinatorial transform on high-level resolution medical images. It overviews the original scheme and some improvements that have been develop in post processing of BWT in this context. The performances of these techniques are compared and discussed. Moreover, considerations on the imagepsilas sizes and data formats are also considered.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126076783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Nain, V. Laxmi, Bhavitavya Bhadviya, B. Deepak, Mushtaq Ahmed
{"title":"Fast Feature Point Detector","authors":"N. Nain, V. Laxmi, Bhavitavya Bhadviya, B. Deepak, Mushtaq Ahmed","doi":"10.1109/SITIS.2008.97","DOIUrl":"https://doi.org/10.1109/SITIS.2008.97","url":null,"abstract":"This paper presents a new feature point detector that is accurate, efficient and fast. A detailed qualitative evaluation of the proposed feature point detector for gray scale images is then carried out in support of the proposed technique. Experiments have proved that this feature point detector is robust to affine transformations, noise and perspective deformations. More over the proposed detector requires only 28 additions per pixel to evaluate the interest point and its strength, making it one of the fastest feature detectors. The accuracy, speed and parallelizability of this algorithm makes it a strong contender for hardware implementations and applications requiring real time feature point abstraction.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121585135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigate the Performance of Fuzzy Artmap Classifier for Face Recognition System","authors":"J. A. Karim, R. Yusof, M. Khalid","doi":"10.1109/SITIS.2008.59","DOIUrl":"https://doi.org/10.1109/SITIS.2008.59","url":null,"abstract":"Face recognition has become one of the most active research areas of computer vision. In this paper we present a face recognition system (FRS) based on eigenfaces as feature extractor and fuzzy artmap (FAM) neural network as classifier. The motivation of using FAM as a classifier is because of its unique solution to the stability-plasticity dilemma, where it has the ability to preserve previously learned knowledge and potential to adapt new patterns indefinitely. FAM is also used to overcome the problem of long training duration and incremental learning without forgetting the previous learnt data. The FRS applies homomorphic filtering for preprocessing. The paper explains the methodology used and discusses on the experiments conducted to investigate the performance of the FRS using fuzzy artmap. From the experiments, the proposed FRS obtained a recognition rate of 97.5% using local dataset and 98% using Olivetti Research Lab (ORL) dataset.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114268294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Cuppens, N. Cuppens-Boulahia, Y. Bouzida, Wael Kanoun, Aurel Croissant
{"title":"Expression and Deployment of Reaction Policies","authors":"F. Cuppens, N. Cuppens-Boulahia, Y. Bouzida, Wael Kanoun, Aurel Croissant","doi":"10.1109/SITIS.2008.96","DOIUrl":"https://doi.org/10.1109/SITIS.2008.96","url":null,"abstract":"Current prevention techniques provide restrictive responses that may take a local reaction in a limited information system infrastructure. In this paper, an in depth and comprehensive approach is introduced for responding to intrusions in an efficient way. This approach considers not only the threat and the architecture of the monitored information system, but also the security policy. The proposed reaction workflow links the lowest level of the information system corresponding to intrusion detection mechanisms,including misuse and anomaly techniques, and access control techniques with the higher level of the security policy. This reaction workflow evaluates the intrusion alerts at three different levels, it then reacts against threats with appropriate counter measures in each level accordingly.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124410149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Mobile Web Search Experience with Slide-Film Interface","authors":"Roman Y. Shtykh, Qun Jin","doi":"10.1109/SITIS.2008.43","DOIUrl":"https://doi.org/10.1109/SITIS.2008.43","url":null,"abstract":"With slide-film interface discussed in this paper we propose a new mobile Web search experience. The interface abolishes fatigue-inducing scrolling while preserving ¿quality¿ summaries of Web search results to improve the efficacy and efficiency of mobile Web search. The evaluation of the approach shows that the proposed interface is superior to the conventional mobile search method in a number of aspects like easy navigation and good viewability of search results and can be its good alternative.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126703470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modified SLT Denoising Method","authors":"X. Chen, Silong Peng","doi":"10.1109/SITIS.2008.29","DOIUrl":"https://doi.org/10.1109/SITIS.2008.29","url":null,"abstract":"Wavelet shrinkage denoising has been investigated for a long time due to its simplicity and good results. SLT denoising proposed by Yacov Hel-Or et al. recently generates mapping functions (MFs), also known as shrinkage function, which are learned directly from example images using least-squares fitting. In this paper, we design MFs with the prior information properly incorporated in SLT denoising. Since coefficients in the same wavelet subband have different statistic characteristics, we first classify wavelet coefficients into different classes. Then MFs for different regions are deduced with corresponding prior model. Experimental results give a direct show that the proposed method obtains higher PSNR (Peak Signal to Noise Ratio), and improve visual quality of the denoised images.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129986888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulated Annealing on Cubic Splines for Vectorizing Outlines of Generic Shapes","authors":"M. Sarfraz","doi":"10.1109/SITIS.2008.11","DOIUrl":"https://doi.org/10.1109/SITIS.2008.11","url":null,"abstract":"A new technique has been proposed for the outline capture of generic shapes. The overall technique has various phases including extracting outlines of images, detecting corner points from the detected outline, curve fitting, and addition of extra knot points if needed. The idea of simulated annealing has been used to optimize the shape parameters in the description of the generalized cubic spline introduced.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124862397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Functional Analysis to Specific Parameters: Description of Knowledge Based CAD Model","authors":"Jean-Bernard Bluntzer, S. Gomes, J. Sagot","doi":"10.1109/SITIS.2008.41","DOIUrl":"https://doi.org/10.1109/SITIS.2008.41","url":null,"abstract":"This paper proposes a specific CAD model architecture and a specific design method based on a functional analysis in order to reduce the time dedicated to routine engineering. This method is directly integrated into our ACSP PLM (Product Lifecycle Management) system in order to work in a worldwide and collaborative design environment. The main objective of our methodology is to define the CAD model geometry according to the modifications and the functional requirements. In order to obtain this control, we are able to identify functional parameters and functional rules through the functional requirements and we are also able to extract the specific parameters and the specific rules from the older CAD models stored in the PDM (Product Data Management) system of the previous, validated project. Our method explains how to obtain and to link the different kinds of parameters and rules. It defines also a specific architecture in order to perform and to build the foundation of a knowledge based engineering methodology.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126834719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyunwook Cha, Jea-Tek Ryu, B. Roh, JeongWook Kim, Hyuncheol Jeong
{"title":"Detection of SIP De-Registration and Call-Disruption Attacks Using a Retransmission Mechanism and a Countermeasure Scheme","authors":"Hyunwook Cha, Jea-Tek Ryu, B. Roh, JeongWook Kim, Hyuncheol Jeong","doi":"10.1109/SITIS.2008.56","DOIUrl":"https://doi.org/10.1109/SITIS.2008.56","url":null,"abstract":"SIP is an application-level signaling protocol that manages a mutual multimedia communication session. Presently, SIP is widely used with Internet messaging, games and with VoIP (voice over IP) due to advantages such as its simplicity, flexibility and variety of protocols. However, SIP is associated with many types of security issues and requires a countermeasure device against call-disturbance attacks that can cause a great amount of inconvenience to users. Therefore, this study analyses SIP De- registration and call-disruption attacks and proposes a means of detecting these attacks. Attack detection is accomplished through a comparison of the messages last sent by the user and those that are considered to be an attack based on a Retransmission mechanism. When a message is detected as an attack, the user is informed and a re-authentication process is performed.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115339666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Filter Based on Image Region Characteristics for Optimal Edge Detection","authors":"Lussiana Etp, Yuhilza Hanum, S. Madenda","doi":"10.1109/SITIS.2008.78","DOIUrl":"https://doi.org/10.1109/SITIS.2008.78","url":null,"abstract":"A number of edge detection filters developed recently have included a parameter to reduce noise in an image. Noise reduction depends on the parameter value keyed-in by an operator. Therefore, the detected edge relies on the accuracy of the operator in determining the parameter value. The parameter is also used to reduce noise in the image as a whole. The resulted edge is not optimal, since each region of the image doesn¿t have the same noise disturbance as others. This paper describe the development of adaptive edge detection method based on image region characteristics. Filter¿s parameter is determined automatically for every region according to its noise and blur characters. In other words, filter parameter becomes more adaptive based on image region characteristics. The result of the experiment shows that the adaptive method developed in this paper is more optimal than the previous methods.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114973261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}