2006 International Conference on Intelligent Information Hiding and Multimedia最新文献

筛选
英文 中文
Implications of a Novel Family of Stochastic Methods for Function Recovery 一组新的功能恢复随机方法的意义
2006 International Conference on Intelligent Information Hiding and Multimedia Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.118
J. Kolibal, Daniel Howard
{"title":"Implications of a Novel Family of Stochastic Methods for Function Recovery","authors":"J. Kolibal, Daniel Howard","doi":"10.1109/IIH-MSP.2006.118","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.118","url":null,"abstract":"We illustrate the use of a novel family of stochastic methods for function recovery and illustrate their applicability to several problems involving one and two dimensional data.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115460081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Chaotic Signal Design with Selected Parameters 选择参数的混沌信号设计
2006 International Conference on Intelligent Information Hiding and Multimedia Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.71
Baishan Zhao, Yi-Sheng Zhu
{"title":"Chaotic Signal Design with Selected Parameters","authors":"Baishan Zhao, Yi-Sheng Zhu","doi":"10.1109/IIH-MSP.2006.71","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.71","url":null,"abstract":"Chaotic signal is very important for chaotic communication and chaotic encryption. In his paper a method of producing chaotic signals with arbitrary magnitude and spectrum is presented, which is based on the Lorentz system by introducing some parameters of the system to realize the selected magnitude and spectrum. Furthermore, the validity of this method by theory and simulation is shown. In addition, this kind of generators is easily implemented, and the signal is suitable for protecting the information in communication systems.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127445927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Digital Audio Watermarking Algorithm Based on Quantizing Coefficients 基于量化系数的数字音频水印算法
2006 International Conference on Intelligent Information Hiding and Multimedia Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.86
Zhao Xu, Ke Wang, Xiao-hua Qiao
{"title":"Digital Audio Watermarking Algorithm Based on Quantizing Coefficients","authors":"Zhao Xu, Ke Wang, Xiao-hua Qiao","doi":"10.1109/IIH-MSP.2006.86","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.86","url":null,"abstract":"A kind of digital audio watermarking algorithm based on discrete wavelet transform (DWT) is proposed in the paper. In the paper, we adopt remote sensing image as watermarking image (such as satellite image). In order to enhance the remote sensing image into the audio, watermarking information is dealt with error diffusion method which is one kind of half-toning technique. Using chaos sequence for synchronization code and embedded it into audio with the water-marking, the watermarking thus has the ability of selfsynchronization. The algorithm quantizes the lowestfrequency coefficients of DWT of the audio signals, so that the watermarking can be detected in a blinding way. The experimental results indicate the algorithm is robust to Gauss-yawp, loss compression and more than 12 attacking means by stirmarkaudio attacking software.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A PCA Based Visual DCT Feature Extraction Method for Lip-Reading 基于PCA的唇读视觉DCT特征提取方法
2006 International Conference on Intelligent Information Hiding and Multimedia Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.35
Xiaopeng Hong, H. Yao, Yuqi Wan, Rong Chen
{"title":"A PCA Based Visual DCT Feature Extraction Method for Lip-Reading","authors":"Xiaopeng Hong, H. Yao, Yuqi Wan, Rong Chen","doi":"10.1109/IIH-MSP.2006.35","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.35","url":null,"abstract":"This paper proposes a PCA based method to reduce the dimensionality of DCT coefficients for visual only lip-reading systems. A three-stage pixel based visual front end is adopted. First, DCT or block-based DCT features are extracted. Second, Principal Component Analysis is applied for dimension reduction. Finally, all the feature vectors are normalized into a uniform scale. This work investigates this three-stage method, comparing with PCA and two DCT based approaches whose features are selected manually. In the latter manner, PCA coefficients are selected according to energy while the reduction of DCT coefficients leans to the left components in the left-top corner. Experiments prove that the dimension reduction task based on PCA does improve the recognition accuracy when the final dimension is below a certain value. They also show that DCT and block-based DCT work similarly for lip reading task, outperforming PCA slightly.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126051767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Image Watermarking Resisting to Geometrical Attacks Based on Histogram 基于直方图的抗几何攻击图像水印
2006 International Conference on Intelligent Information Hiding and Multimedia Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.116
Zheng Fang, Yao Zhao
{"title":"Image Watermarking Resisting to Geometrical Attacks Based on Histogram","authors":"Zheng Fang, Yao Zhao","doi":"10.1109/IIH-MSP.2006.116","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.116","url":null,"abstract":"At present, most image watermarking scheme can not resist geometrical attacks, which restricts the application of digital watermarking techniques. In this paper, an image watermarking scheme based on histogram is proposed, since the histogram is not sensitive to geometrical transformation. Different groups of the image histogram bars are chosen, and the message is embedded to sum of every group by using Quantization Index Modulation (QIM). In watermark embedding scheme, an exact modification from histogram to image is proposed, and it can guarantee the distortion of image as little as possible. In watermark detection process, the same groups of image histogram bars are selected, and the message is extracted from the sum of each group by using nearest distance rule. Experimental results show the scheme is robust to geometrical attacks as well as compression and filtering.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Design of AC-PDP Signal Processor for SoC Application SoC用AC-PDP信号处理器的设计
2006 International Conference on Intelligent Information Hiding and Multimedia Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.81
Song Qiu, Wai-yun Li, Jin-gao Liu, Wenjing Hu
{"title":"Design of AC-PDP Signal Processor for SoC Application","authors":"Song Qiu, Wai-yun Li, Jin-gao Liu, Wenjing Hu","doi":"10.1109/IIH-MSP.2006.81","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.81","url":null,"abstract":"This paper describes the design and implementation of a synthesizable, flexible, alternative current-plasma display panel (AC-PDP) signal processor (APSP) as an intellectual property (IP) core for system-on-a-chip (SoC) application. The APSP adopts the Improved Address and Display Separation (ADS) method we proposed to overcome the dynamic false contour (DFC) problem. The Finite State Machine (FSM) Design of the APSP are discussed in this paper. The Post-Place & Route simulation waveform based on VHDL is also proposed in this paper.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114979267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Hiding Method in Digital Audio Signal Based on Perfect Codes 基于完美码的数字音频信号信息隐藏方法
2006 International Conference on Intelligent Information Hiding and Multimedia Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.123
Linna Zhou, Cui-Qing Liu, X. Ping, Tao Zhang, Yun-He Wang
{"title":"Information Hiding Method in Digital Audio Signal Based on Perfect Codes","authors":"Linna Zhou, Cui-Qing Liu, X. Ping, Tao Zhang, Yun-He Wang","doi":"10.1109/IIH-MSP.2006.123","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.123","url":null,"abstract":"A novel information hiding method in digital audio signal by using the encoding redundancy of perfect codes is presented in this paper. Researches on perfect codes and its syndrome of the codeword show that the syndrome of a codeword depends only on the error, not on the codeword transmitting. A mapping encoding between secret message and codeword error map is built. According to the error map, we can embed secret messages by modifying the codeword of perfect codes. In this paper we propose a particular example of perfect codes that carrying secret messages with its encoding redundancy. Theoretical analysis and experimental results show that this method has good security.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution 基于遗传算法的LSB置换最优块映射方法
2006 International Conference on Intelligent Information Hiding and Multimedia Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.105
R. Ji, H. Yao, Shaohui Liu, Liang Wang
{"title":"Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution","authors":"R. Ji, H. Yao, Shaohui Liu, Liang Wang","doi":"10.1109/IIH-MSP.2006.105","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.105","url":null,"abstract":"The least-significant-bit (LSB) substitution which is commonly used in steganography would degrade the quality of host image significantly when embedding high-capacity information. To overcome this drawback, we present an optimal block mapping LSB method based on genetic algorithm, which is out of researchers¿ concern but fundamentally important. Additionally we discuss the rule to select the best block size. The main idea is to minimize the degradation of the stego image by finding a best mapping function between host and secret image blocks at global scope. The experimental result is promising. The advantage of our method over most commonly used LSB strategy is obvious in enhancing PSNR value while having a secluded statistic peculiarity.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130991635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Chain Code Distribution-Based Image Retrieval 基于链码分布的图像检索
2006 International Conference on Intelligent Information Hiding and Multimedia Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.69
Junding Sun, Xiaosheng Wu
{"title":"Chain Code Distribution-Based Image Retrieval","authors":"Junding Sun, Xiaosheng Wu","doi":"10.1109/IIH-MSP.2006.69","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.69","url":null,"abstract":"The direction chain code has been widely used in image retrieval for its simplicity and low storage requirement. One problem with the chain code is that it lacks of the spatial information of the image content, which limits its use in image retrieval. In this paper, two novel methods, called Chain Code Coherence Vector (CCCV) and Chain Code Distribution Vector (CCDV) are presented, which not only have the advantages of being invariant to the position, rotation and scaling but also contain the spatial information of the image content. In the end, two different distance measures are presented to measure the similarity of shape information embedded in the CCCV and CCDV. Experiment demonstrates the efficiency of our proposed algorithms.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133660818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An Improved Design and Implementation of Chinese Name Card Recognition System on Mobile Devices 移动设备上中文名片识别系统的改进设计与实现
2006 International Conference on Intelligent Information Hiding and Multimedia Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.51
Chi Cui
{"title":"An Improved Design and Implementation of Chinese Name Card Recognition System on Mobile Devices","authors":"Chi Cui","doi":"10.1109/IIH-MSP.2006.51","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.51","url":null,"abstract":"Since name card recognition based on built-in cameras has become popular people now pay more attention to the robustness and effectiveness of the system. In spite of the maturity of OCR some bottlenecks in lower processing level such as spatial correction and segmentation weak its power. Traditional models treating the card image as an orthogonal projection with only affine distortion are too simple and thus perspective correction is needed to enhance the recognition rate.Due to the complexity of the layout of Chinese name cards text segmentation also attaches strong significance to the performance. In this paper a improved name card recognition system would be devised and implemented. Two new algorithms for perspective correction and text segmentation would be proposed respectively.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"42 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113974458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信