{"title":"A Rule Based Approach for Skew Correction and Removal of Insignificant Data from Scanned Text Documents of Devanagari Script","authors":"P. Sharma, K. Dhingra, S. Sanyal","doi":"10.1109/SITIS.2007.93","DOIUrl":"https://doi.org/10.1109/SITIS.2007.93","url":null,"abstract":"In this paper we have presented a rule based approach for removing insignificant data and skew from scanned documents of Devanagari script. To develop an OCR system for Devanagari script is not an easy job hence proper preprocessing of these scanned documents requires noise removal and correcting skew from the image. The proposed system is based on rule based methods, morphological operations and connected component labeling. Images used for the experiment are binarised grayscale images. Experiments and results show that presented method is robust for preprocessing scanned images of Devanagari text documents.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123766192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuanfang Liu, Yan Zheng, Guangshun Shi, Qingren Wang
{"title":"Research on Skeletonization of Palmprint Image","authors":"Yuanfang Liu, Yan Zheng, Guangshun Shi, Qingren Wang","doi":"10.1109/SITIS.2007.88","DOIUrl":"https://doi.org/10.1109/SITIS.2007.88","url":null,"abstract":"Skeletonization is an important procedure of automated palmprint identification system based on the characteristic of minutiae. Skeleton acquired by traditional thinning algorithms will produce many spurious minutiae which are caused by spurs and misconnections between ridges. The excessive erosion is also a common problem in thinning algorithm. Moreover, unit skeleton cannot be produced by some of these algorithms. In this paper, we introduce a thinning algorithm, which is based on Rotation Invariant Thinning Algorithm introduced by Ahmed and Ward [1] (A-W). The proposed method can solve the above problems. The experimental result shows some skeletons from local regions of palmprint images and running time of the algorithm, which shows that the proposed algorithm can achieve better performance without reducing efficiency.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126592053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Agent-Based Architecture to Add Security in a Cooperative Information System","authors":"Leslie Huin, D. Boulanger","doi":"10.1109/SITIS.2007.111","DOIUrl":"https://doi.org/10.1109/SITIS.2007.111","url":null,"abstract":"Nowadays, information is considered a strategic, rather than an operational, resource for those organizations needing to share, and access to, heterogeneous and geographically widely-distributed information sources. Solutions proposed in industrial or academic research solve the problems linked to technical and semantic heterogeneity and take into account the principles of autonomy, transparency and evolutivity. However, few of these solutions consider the critical aspect of access control security in these architectures. This paper deals with this security aspect in a cooperative information system and is about the design of a system able to manage and control access security to global information shared among its stakeholders.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133570673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuxin Zhao, Guangjie Liu, Yue-wei Dai, Zhiquan Wang
{"title":"A RST-Resilient Watermarking Scheme Based on Invariant Features","authors":"Yuxin Zhao, Guangjie Liu, Yue-wei Dai, Zhiquan Wang","doi":"10.1109/SITIS.2007.11","DOIUrl":"https://doi.org/10.1109/SITIS.2007.11","url":null,"abstract":"A RST-resilient watermarking scheme based on invariant features are proposed in this paper. The scale-invariant points of wavelet low-frequency sub-image are used to realize resynchronization after RST (Rotation Scale Translation) attacks. An improved HVS model is adopted to embed multiplicative spread spectrum watermark in DWT (Discrete Wavelet Transform) domain, and optimal water- marking detection algorithm is employed to enhance robustness of watermarking. Experiments demonstrate that the proposed scheme can resist both RST and general image processing attacks.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134345070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Necessity of Combining ELN and SACK to Improve TCP Performance over Heterogeneous Networks","authors":"Yaogong Wang, Li Pan, Jianhua Li","doi":"10.1109/SITIS.2007.59","DOIUrl":"https://doi.org/10.1109/SITIS.2007.59","url":null,"abstract":"TCP suffers severe performance degradation over heterogeneous networks due to its inadaptability to the characteristics of the wireless link. Techniques such as explicit loss notification (ELN) and selective acknowledgement (SACK) have been proposed to mitigate such link-related degradations. In this paper, we demonstrate the inadequacy of using ELN or SACK alone and the necessity of combining them. It will be shown that the combination of ELN and SACK is not a simple superposition of two mechanisms, but rather is an organic integration with positive interactions on each other. Simulation results show that, by combining ELN and SACK, TCP achieves considerably higher throughput than using any one mechanism separately.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"22 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134402350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Privacy Preserving Data Mining Model under Distributed Environment","authors":"Feng Li, Jin Ma, Jian-hua Li","doi":"10.1109/SITIS.2007.139","DOIUrl":"https://doi.org/10.1109/SITIS.2007.139","url":null,"abstract":"Privacy preserving becomes an important issue in the development progress of data mining techniques, especially in distributed data mining. Secure multiparty computation methods are proposed to protect the privacy in distributed environment, but shows low performance under massive nodes. This paper presents an adaptive privacy preserving data mining model based on data perturbation method to improve the efficiency while preserving the privacy. Security capability of basic data perturbation is firstly analyzed and an adaptive enhancement method is proposed according to the eigen value decomposition based attacks. A light-weight protocol with homomorphic technique is proposed to perform the perturbation process under distributed environments. The experiment results show that the model has high controllable security and shows more efficiency in large scale distribution environment comparing to secure multiparty related methods.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133281780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fingerprint Matching Using Dual Hilbert Scans","authors":"Li Tian, Liang Chen, S. Kamata","doi":"10.1109/SITIS.2007.75","DOIUrl":"https://doi.org/10.1109/SITIS.2007.75","url":null,"abstract":"A new fingerprint matching algorithm using dual Hilbert scans is presented in this study. We treat the fingerprint matching as point pattern matching problem and Hilbert scans are used in two aspects of the matching problem: one is applied to the similarity measure and the other is used in search space reduction. The similarity measure named Hilbert Scanning Distance (HSD) can be computed fast by converting the 2-D coordinates of 2-D images into 1-D space information using Hilbert scan. On the other hand, the 3-D search space can be converted to a 1-D search space sequence. The proposed method has been tested on FVC2002 database. The experimental results show that our method can implement fingerprint matching robustly and efficiently. The performance evaluation EER (Equal-Error Rate) generally used is very low by our algorithm.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115335165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Policy Security Protecting for Negotiating Trust","authors":"Dong Li, Linpeng Huang","doi":"10.1109/SITIS.2007.138","DOIUrl":"https://doi.org/10.1109/SITIS.2007.138","url":null,"abstract":"The dynamic and cross-organizational aspects of Grid introduce challenging management and policy issues for controlling access to the resources. Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are protected by access control policies which may also be communicated to the other party. In this paper, we propose a policy security protecting solution as a mechanism to help prevent unauthorized information inferences during trust negotiation. Compared to the existing safety model, our policy security protecting solution focuses on the actual information gain during trust negotiation instead of the exchanged messages. Thus, it directly reflects the essence of safety in sensitive information protection. Based on the proposed solution, We show that policy security protecting solution achieve the same protection of sensitive information as existing solutions without imposing additional complications to the interaction between negotiation participants or restricting userspsila autonomy in defining their own policies.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116611327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combating P2P File Pollution with Co-alerting","authors":"Min Zuo, Yinghua Ma, R. Chbeir, Jianhua Li","doi":"10.1109/SITIS.2007.124","DOIUrl":"https://doi.org/10.1109/SITIS.2007.124","url":null,"abstract":"Recently, serious file pollution has been identified in some popular file sharing P2P applications and addressed by several studies. Solving this issue can be done by setting up a model to describe the problem precisely and locate the vital factors aiming to enhance or annihilate file pollution. In this paper, we propose an analytical model for the study of file pollution on P2P file sharing networks and a novel anti-pollution method called \"co-alerting\". Results of a series of simulations based on the established model show that the user grouppsilas slackness attribute has a remarkable influence on the time-dynamic characteristics of a P2P file pollution process. Simulation results also show that our co-alerting approach acts well as an efficient countermeasure against file pollution, because it can reshape the distribution of user grouppsilas slackness degree and make file sharing in P2P systems more resistant to file pollution attempts.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122988476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bhuiyan, B. Nath, Joselíto J. Chua, K. Ramamohanarao
{"title":"Automatic Detection of Vascular Bifurcations and Crossovers from Color Retinal Fundus Images","authors":"A. Bhuiyan, B. Nath, Joselíto J. Chua, K. Ramamohanarao","doi":"10.1109/SITIS.2007.86","DOIUrl":"https://doi.org/10.1109/SITIS.2007.86","url":null,"abstract":"Identifying the vascular bifurcations and crossovers in the retinal image is helpful for predicting many cardiovascular diseases and can be used as biometric features and for image registration. In this paper, we propose an efficient method to detect vascular bifurcations and crossovers based on the vessel geometrical features. We segment the blood vessels from the color retinal RGB image, and apply the morphological thinning operation to find the vessel centerline. Applying a filter on this centreline image we detect the potential bifurcation and crossover points. The geometrical and topological properties of the blood vessels passing through these points are utilized to identify these points as the vessel bifurcations and crossovers. We evaluate our method against manually measured bifurcation and crossover points by an expert, and achieved the detection accuracy of 95.82%.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125976311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}