{"title":"A reversible two-level image authentication scheme based on chaotic fragile watermark","authors":"D. Xiao, Jian Jin","doi":"10.1109/CEWIT.2012.6606974","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606974","url":null,"abstract":"For image authentication, the capability of accurately locating tampered pixel and ensuring security is desirable. In this paper, we propose a novel reversible two-level image authentication scheme based on chaotic fragile watermark. In the embedding process, at the pixel level, by utilizing the pixel correlation technology, the location watermark of each pixel is generated and embedded to the LSB of the pixel itself firstly. At the image block level, the image is then partitioned into blocks, and the relation watermark of each block is computed and embedded into the top-left sub-block of its corresponding excursion block in a reversible way. The excursion block mapping sequence can be generated by sorting the keyed chaotic sequence. After all the relation watermarks are embedded, in each block embedded by relation watermark, the detection watermark is computed and embedded into the down-right subblock of the block itself in a reversible way. In the extracting process, the watermarked image is partitioned into blocks, then the embedded detection watermark of each block is extracted and the block itself is partially recovered for the first time. And the embedded relation watermark of each block is extracted and the block is fully recovered for the second time. Then we compute the new relation watermark and detection watermarks of each recovered block and perform comparison with the extracted ones. In the proposed scheme, the tampered watermark can pass the authentication because it does not reduce the value of image to some extent. But if the image content is tampered, the further step is taken at the pixel level to locate tamper to specific pixel by comparing the re-computed location watermark with the extracted location watermark. In the proposed image authentication scheme, the complicated nonlinear property of chaos is utilized to generate the pixel location watermark at the pixel level, construct the excursion block map, and create the relation watermark and detection watermark at the image block level. Theoretical analysis and computer simulation have verified the successful achievement of the proposed image authentication scheme.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114186841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective device and data origin authentication scheme in home networks","authors":"Soobok Shin, Hongjin Yeh, Kangseok Kim","doi":"10.1109/CEWIT.2012.6606977","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606977","url":null,"abstract":"Home network provides residents with autonomous services for convenient and secure life through communication among networked home devices. Particularly, as services of home network are provided through communication among home devices without human intervention, device and data origin authentication among devices are important for secure home. Most home devices do not have restrictions such as power supply and networking because home devices are located in home. On the other hand, home devices have the restrictions of computing power and memory capacity. Therefore security in home network should be designed effectively considering those restrictions. In this paper we propose device authentication scheme for secure home network. The proposed scheme does not have high computation complexity due to applying low cost operations such as hash function and exclusive-OR. Also the proposed scheme proposes mutual authentication and data origin authentication and then we show that our scheme is secure through security analysis.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"70 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116286343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Minkyung Kim, Dong-Wook Lee, Kangseok Kim, Jai-hoon Kim, W. Cho
{"title":"Predicting personal information behaviors with lifelog data","authors":"Minkyung Kim, Dong-Wook Lee, Kangseok Kim, Jai-hoon Kim, W. Cho","doi":"10.1109/CEWIT.2012.6606983","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606983","url":null,"abstract":"The research for monitoring and recognizing personal behaviors from various digital sensors has recently been doing in a variety of fields. We address this for “lifelog” - all of the digital information about personal daily life. The research typically focuses on collecting personal lifelog, managing huge amount of lifelog data, and recognizing activities and behavior patterns from them. The methods of extracting key features and characterizing patterns would be crucial for finding meaningful information from huge and complex lifelog data. The research is a significant challenge because individual's lifelog data would be useful to provide personal life services such as healthcare. In this paper, we propose the process for predicting personal future behavior by tracing back to the past experiences. The behavior prediction process is composed of five stages. Firstly, physical activities through various sensors are collected and then, major physical activities are extracted through feature selection. Secondly, behavioral context information such as location, time and object is annotated to each activity for recognizing the behavior states more exactly. Then all sequences of physical activities with contextual information are divided into each daily set. Thirdly, behavior patterns from them are extracted by analyzing key features. After that, all daily sequences are transferred as the set of semantic activities for presenting major behavior states. Fourthly, from the set of semantic activities, based on the behavior probability to be used for the behavior prediction in next step, a sequence tree is generated. Finally, the highest predicted activities can be shown in a user interface from the query based on `Time' or `Event'. In a user interface, the functions for retrieving past and current behaviors and searching the predicted behaviors will be provided by choosing specific point in time or the specific event. Currently we are building a system for processing the proposed behavior prediction.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116526893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inexpensive radar-based surveillance: Experimental study","authors":"V. Skvortsov, Keun Mvoung Lee, S. Yang","doi":"10.1109/CEWIT.2012.6606976","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606976","url":null,"abstract":"We present a novel approach which is helpful in building an inexpensive security or surveillance system for various applications. The system consists of a radar network that creates a virtual fence or barrier that is invisible, and in case of intrusion it will give an alarm, determine the location of a target and provide the target's relative velocity information. Our approach is a combination of continuous sensor measurements by commercially available automotive radar, specific network layout and advanced post-processing techniques. We use open source software and hardware to reduce the total cost of the system. The proposed network topology including radar coverage area is novel and similar to a half-fishbone shape, however the main focus of this paper is on creating a prototype of the radar network node. To get a control over the resolution of range measurements, the analysis of several post-processing algorithms for target detection was carried out. Another feature of our approach is an implementation of perceptual (robust) hash algorithm for storage of current signal `image' in memory and comparison of the signal and `no-intrusion' signal. During the work, applied software tool was created. It significantly simplifies the data acquisition and analysis. Extensive experimental measurements confirm the validity of the approach, show the performance of the radar and reveal some directions for future improvements.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125687983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A methodology for daylight optimisation of facades: An investigation of the opening design strategy with cellular automata for an office building","authors":"Jieun Kim","doi":"10.1109/CEWIT.2012.6606981","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606981","url":null,"abstract":"Daylighting has an important role in sustainable architecture as it affects the energy consumption in a building. Especially for an office building, daylight helps not only to reduce the load on artificial lighting but also to promote work efficiency through promoting good human health, wellbeing and user comfort. The objective of this research is to invent an innovative façade design strategy that comes from the development of digital technology and dynamic daylight performance measuring methods. Thus, the various parameters are studied through the computational process of Cellular Automata (CA) to generate the several alternative opening patterns on the building facade. The each CA design values were tested under static and dynamic sky condition to analyze the quality and quantity of daylight and visual comfort throughout the whole year. The results were compared to find the optimum alternative designs in terms of the daylighting design criteria, which were researched from building code, standard and design guidelines for the office building. Finally, the research of an adaptive façade design strategy was concluded with the results from the above hybridization of generative and performative design methodology. This study discovers the architectural design approach from the CA and it will make not only progress in building façade aesthetics, but also human comfort with building sustainability.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"89 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126111232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploration of heuristic rules for green home design decision support system","authors":"Hyungjung Kim, Dongjun Suh, Seongju Chang","doi":"10.1109/CEWIT.2012.6606980","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606980","url":null,"abstract":"Through a serious of energy simulation sessions, it is possible to compare energy performance pertaining to the different internal layouts applicable to typical apartment housing units to identify generalized rules for residential building design strategies and generating energy-saving alternatives. We explored the impact of different attributes of the internal walls such as length, material, geometry, and location on the heating load profiles by using multiple sensitivity analyses based on the Design Builder simulation tool. The results are summarized into a set of heuristic rules for evaluating apartment unit's internal layout design alternatives to maximize their energy performance.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123288773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trajectory extraction for abnormal behavior detection in public area","authors":"Jae-Jung Lee, Gyujin Kim, Moonhyun Kim","doi":"10.1109/CEWIT.2012.6606979","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606979","url":null,"abstract":"Surveillance system to improve safety and security is a major demand for the management and control of public area. Crowd management and control system requires a situation recognition technique which can predict accidents and provide alarms to the monitoring personnel. In this paper, we propose an abnormal behavior detection technique by using trajectory extraction of moving objects in video. Abnormal behavior includes running persons. The proposed abnormal behavior detection system separates background and foreground using Gaussian mixture model. And then, foreground image is used to generate the trajectories of moving objects using a Kanade-Lucas-Tomasi algorithm of the optical flow method. In addition, noise removal step is added to improve the accuracy of the created trajectory. From the trajectory of moving objects information, such as length, pixel, coordinate and moving degree is extracted. As the result of the estimation of abnormal behavior, objects' behavior is configured and analyzed based on a priori specified scenarios, such as running persons. In the results, proposed system is able to detect the abnormal behavior in public area.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127086951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xianshu Jin, P. Deshpande, Ilchul Yoon, S. Yang, Sunyoung Han
{"title":"An approach for QoE-based media sharing in DLNA home network","authors":"Xianshu Jin, P. Deshpande, Ilchul Yoon, S. Yang, Sunyoung Han","doi":"10.1109/CEWIT.2012.6606982","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606982","url":null,"abstract":"Over the last decades, various kinds of Internet enabled devices have been developed. DLNA (Digital Living Network Alliance) has provided standard guidelines to improve the interoperability of DLNA-capable devices and to enhance the usability of digital contents through DLNA Certified devices. However, for several reasons, the transmission for media sharing between DLNA devices is still not seamless and users still experience low quality services, even between DLNA certified devices. In this paper, we address this problem from the respective of QoE (Quality of Experience) and present a system designed to keep user's service quality with reduced network resource consumption in terms of network bandwidth usage. As the key component in the system we propose Media Server that keeps media files encoded different qualities and delivers media files to multiple DLNA client devices, considering available bandwidth in a network. At each device request, the server chooses the media file that is the most appropriate for the devices with respect to the network status at the time of the request. Media files are classified into 5 different levels where each level has different bit rate. Before transmission, Media Server checks for the network status and selects the best video level that can be delivered to the client device with the best quality. We present the usefulness of our approach with results obtained from experimental studies to deliver video services seamlessly to meet users' quality requirements. Our results show that the proposed approach can also make better utilization of the limited home-network resources.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electrical sterilization of juice by discharged HV impulse waveform","authors":"Hee-Kyu Lee","doi":"10.3844/AJASSP.2006.2076.2078","DOIUrl":"https://doi.org/10.3844/AJASSP.2006.2076.2078","url":null,"abstract":"In the sterilization system by using HV impulse waveform apple juice was sterilized with HV discharged oscillatory decay waveform. The optimal condition of impulse waveform for electrical sterilization has presented the excellent condition at 40kV/cm, 4mH. The characteristic of this waveform shows oscillatory decay waveform with multiple pulses. And this impulse waveform was more effective to kill Saccharomyces cervisiae than exponential decay waveform. Saccharomyces cervisiae to become musty and sour for apple juice was used as the sample. Especially, Vitamin C content of electrical sterilized apple juice was close to that of fresh apple juice, but was much higher than that of heat treated apple juice. Heat treated apple juice lost 80% of flavor components, whereas electrical sterilized apple juice lost only 10%. This apple juice has good effect of electrical sterilization because of higher conductivity than water. Therefore this experiment can be treated sterilization without loss of vitamin C and original taste or perfume to apple juice. As a result, it is found that apple juice can be sterilized on 40kV/cm, 4mH by using our designed HV impulse sterilizer.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115592678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective rate maximization in large MIMO multiuser system","authors":"Ilgyu Choi, Chungyong Lee","doi":"10.1109/CEWIT.2012.6606978","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606978","url":null,"abstract":"Large MIMO system can achieve high data rate with simple linear transceiver. However, for this advantage, long time is required to estimate channel state information (CSI) at base station (BS). When estimation time is not negligible in coherence time, there exists tradeoff between estimation and data transmission. With long estimation time, data rate increases, but data transmission time decreases. Otherwise, with short estimation time, data rate decreases, but data transmission time increases. Therefore, maximizing not data rate itself but effective rate is required in large MIMO system. We mathematize an effective rate problem in a reasonable large MIMO system, and prove its concavity and find the optimal tradeoff point.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129424604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}