{"title":"Integration of Points of Interest and Regions of Interest","authors":"Qi Li, Y. Gong, Y. Lu","doi":"10.1109/ChinaSIP.2014.6889266","DOIUrl":"https://doi.org/10.1109/ChinaSIP.2014.6889266","url":null,"abstract":"Images consist of different low-level features, such as Points of Interest (POIs) and Regions of Interest (ROIs). A distinction between POIs and ROIs is that the latter ones have intrinsic scale information while the former ones may not have. In this paper, we propose a scheme to integrate these two kinds of image features. The proposed scheme optimizes feature distribution so that the optimized features become more compact. The scheme also assigns scale information to a POI via a stable association between the POI and a certain “nearest” ROI. We test the proposed integration scheme in terms of the repeatability across various imaging transformations. The experimental results demonstrate the effectiveness of the integration scheme.","PeriodicalId":248977,"journal":{"name":"2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128198269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving privacy for video surveillance via visual cryptography","authors":"Xiaochun Cao, Na Liu, Ling Du, C. Li","doi":"10.1109/ChinaSIP.2014.6889315","DOIUrl":"https://doi.org/10.1109/ChinaSIP.2014.6889315","url":null,"abstract":"The video surveillance widely installed in public areas poses a significant threat to the privacy. This paper proposes a new privacy preserving method via the Generalized Random-Grid based Visual Cryptography Scheme (GRG-based VCS). We first separate the foreground from the background for each video frame. These foreground pixels contain the most important information that needs to be protected. Every foreground area is encrypted into two shares based on GRG-based VCS. One share is taken as the foreground, and the other one is embedded into another frame with random selection. The content of foreground can only be recovered when these two shares are got together. The performance evaluation on several surveillance scenarios demonstrates that our proposed method can effectively protect sensitive privacy information in surveillance videos.","PeriodicalId":248977,"journal":{"name":"2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132042031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reverberation robust two-microphone Target Signal Detection algorithm with coherent interference","authors":"Xiaofei Wang, Yanmeng Guo, Q. Fu, Yonghong Yan","doi":"10.1109/ChinaSIP.2014.6889239","DOIUrl":"https://doi.org/10.1109/ChinaSIP.2014.6889239","url":null,"abstract":"In this paper, a reverberation robust Target Signal Detection (TSD) algorithm using two microphones is proposed. Most of traditional TSD algorithms are based on the assumption of free sound field and close-talking scene incorporate with multichannel system. They lack in achieving robustness in reverberant and noisy environment. The proposed TSD algorithm is based on Beam-to-Reference Ratio (BRR), and a novel estimator, Direct-to-Reverberate Ratio (DRR), is introduced to enlarge the basic assumption to reverberant and distant-talking scene. Spatial correlation information between microphones is used to estimate the DRR to revise threshold on each Time-Frequency (T-F) block and to form full-band likelihood using soft-decision information. Experimental results show that the proposed method performs robust in different reverberant environments with coherent interferences when target signal is from priori known direction-of-arrivals (DOA) in distant-talking scene.","PeriodicalId":248977,"journal":{"name":"2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132101109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving dictionary learning using the Itakura-Saito divergence","authors":"Zhenni Li, Shuxue Ding, Yujie Li, Zunyi Tang, Wuhui Chen","doi":"10.1109/ChinaSIP.2014.6889341","DOIUrl":"https://doi.org/10.1109/ChinaSIP.2014.6889341","url":null,"abstract":"This paper presents an improved and efficient algorithm for overcomplete, nonnegative dictionary learning for nonnegative sparse representation (NNSR) of signals. We adopt the Itakura-Saito (IS) divergence as the error measure, which is quite different from the conventional dictionary learning methods using the Euclidean (EUC) distance as the error measure. In addition, for enforcing the sparseness of coefficient matrix, we impose ℓ1-norm minimization as the sparsity constraint. Numerical experiments on recovery of a dictionary show that the proposed dictionary learning algorithm performs better than other currently available algorithms which use Euclidean distance as the error measure.","PeriodicalId":248977,"journal":{"name":"2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130999099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Uniform rotational motion compensation for inverse synthetic aperture radar targets from image domain","authors":"Zhiwei Xu, Lei Zhang, M. Xing, Gang Xu","doi":"10.1109/ChinaSIP.2014.6889224","DOIUrl":"https://doi.org/10.1109/ChinaSIP.2014.6889224","url":null,"abstract":"Since high-resolution inverse synthetic radar (ISAR) images are significant in the analysis of moving targets, this paper, for the first time, proposes a novel method to compensate the uniform rotational motion by estimating the effective rotational velocity (ERV) in image domain. Specifically, we extract high-energy scatterers of sequent ISAR images by scale invariant feature transform (SIFT) in order to link them with the related ERV in the imaging panel. Then we adopt registering approach based on minimum Euclidian distance and Gaussian probabilistic density function to select scatterers with the mostly similar rotational aspect. After that, we estimate the ERV in a searching manner, and then employ it in the cancellation of quadratic-order phase items in the cross-range cells of the image. This method is validated quick and efficient by both simulated and real signal experiments.","PeriodicalId":248977,"journal":{"name":"2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122250243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A brief review on reversible data hiding: Current techniques and future prospects","authors":"Xiaolong Li, Weiming Zhang, Bo Ou, Bin Yang","doi":"10.1109/ChinaSIP.2014.6889278","DOIUrl":"https://doi.org/10.1109/ChinaSIP.2014.6889278","url":null,"abstract":"Reversible data hiding (RDH), in which the original cover medium can be exactly extracted from the marked content, has attracted considerable interests from the information hiding community. In this paper, current RDH techniques are first reviewed by introducing the following five types of schemes: early lossless-compression-based schemes, expansion-based schemes, recent lossless-compression-based schemes, content-adaptive schemes, integer-transform-based schemes. Then, by proposing some unsolved problems, the future prospects of RDH are also discussed.","PeriodicalId":248977,"journal":{"name":"2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)","volume":"122 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120893531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Individual control of narrowband noise with disturbance","authors":"Chung-Ying Ho, S. Kuo, Cheng-Yuan Chang","doi":"10.1109/ChinaSIP.2014.6889202","DOIUrl":"https://doi.org/10.1109/ChinaSIP.2014.6889202","url":null,"abstract":"The disturbance picked up by error sensors may degrade the performance of narrowband active noise cancellation (NANC) systems, resulting in slow convergence of algorithm and low noise reduction. This paper proposes modified algorithms to enhance the transient and steady-state performance. A delayless filter bank is designed to separate the residual noise into parallel channels to update the corresponding adaptive filters using individual error signals. The improved performance is verified by computer simulations.","PeriodicalId":248977,"journal":{"name":"2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125015833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Competitive performance of multiple spectrum access strategies coexisting in heterogeneous cognitive radio networks","authors":"Chengyu Xiong, Xiaohua Li","doi":"10.1109/ChinaSIP.2014.6889328","DOIUrl":"https://doi.org/10.1109/ChinaSIP.2014.6889328","url":null,"abstract":"This paper develops a computationally efficient method to evaluate the competitive performance of multiple spectrum access strategies when they coexist and compete with each other in a heterogeneous cognitive radio network (CRN).We use a Markov Model Bank (MMB) to model the operations of the heterogeneous CRN. Various spectrum sensing errors, spectrum sensing strategies, and spectrum access strategies can be conveniently modeled. In particular, three typical spectrum access strategies are analyzed. Throughput expressions for each CRN user can be derived even when different strategies are adopted by different users. Simulation shows the critical fairness challenge among the CRN users when different strategies compete in the heterogeneous CRN.","PeriodicalId":248977,"journal":{"name":"2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125211710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolutionary model selection for identification of nonlinear parametric systems","authors":"Jinyao Yan, J. Deller, Meng Yao, E. Goodman","doi":"10.1109/ChinaSIP.2014.6889333","DOIUrl":"https://doi.org/10.1109/ChinaSIP.2014.6889333","url":null,"abstract":"At ChinaSIP 2013, Yan et al. presented a new method for identification of system models that are linear in parametric structure, but arbitrarily nonlinear in signal operations. The strategy blends traditional system identification methods with three modeling strategies that are not commonly employed in signal processing: linear-time-invariant-in-parameters models, set-based parameter identification, and evolutionary selection of the model structure. This paper reports recent advances in the theoretical foundation of the methods, then focuses on the operation and performance of the approach, particularly the evolutionary model determination. This work opens the door to the use of a broadly generalized class of models with applicability to many contemporary signal processing problems.","PeriodicalId":248977,"journal":{"name":"2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122717986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao Jin, Rangding Wang, Diqun Yan, Pengfei Ma, Kaiyun Yang
{"title":"A novel detection scheme for MP3Stego with low payload","authors":"Chao Jin, Rangding Wang, Diqun Yan, Pengfei Ma, Kaiyun Yang","doi":"10.1109/ChinaSIP.2014.6889314","DOIUrl":"https://doi.org/10.1109/ChinaSIP.2014.6889314","url":null,"abstract":"MP3Stego is a typical steganographic tool of MP3 audios. Though many researchers have been making every effort on attacking it, the performance of their approaches could be improved especially at the low embedding rate. In this paper, we have proposed a scheme for detecting low embedding rate of MP3Stego. Based on investigating the embedding principle of MP3Stego and observing the alteration of quantized MDCT coefficients (QMDCTs), the one-step transition probabilities of the difference of quantized MDCT coefficients were extracted. Finally, SVM was used for constructing a classification model according to the extracted features. Experimental results show that our scheme can effectively detect the MP3Stego steganography with low payload.","PeriodicalId":248977,"journal":{"name":"2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)","volume":"93 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}