{"title":"Implications of a Novel Family of Stochastic Methods for Function Recovery","authors":"J. Kolibal, Daniel Howard","doi":"10.1109/IIH-MSP.2006.118","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.118","url":null,"abstract":"We illustrate the use of a novel family of stochastic methods for function recovery and illustrate their applicability to several problems involving one and two dimensional data.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115460081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chaotic Signal Design with Selected Parameters","authors":"Baishan Zhao, Yi-Sheng Zhu","doi":"10.1109/IIH-MSP.2006.71","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.71","url":null,"abstract":"Chaotic signal is very important for chaotic communication and chaotic encryption. In his paper a method of producing chaotic signals with arbitrary magnitude and spectrum is presented, which is based on the Lorentz system by introducing some parameters of the system to realize the selected magnitude and spectrum. Furthermore, the validity of this method by theory and simulation is shown. In addition, this kind of generators is easily implemented, and the signal is suitable for protecting the information in communication systems.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127445927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Audio Watermarking Algorithm Based on Quantizing Coefficients","authors":"Zhao Xu, Ke Wang, Xiao-hua Qiao","doi":"10.1109/IIH-MSP.2006.86","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.86","url":null,"abstract":"A kind of digital audio watermarking algorithm based on discrete wavelet transform (DWT) is proposed in the paper. In the paper, we adopt remote sensing image as watermarking image (such as satellite image). In order to enhance the remote sensing image into the audio, watermarking information is dealt with error diffusion method which is one kind of half-toning technique. Using chaos sequence for synchronization code and embedded it into audio with the water-marking, the watermarking thus has the ability of selfsynchronization. The algorithm quantizes the lowestfrequency coefficients of DWT of the audio signals, so that the watermarking can be detected in a blinding way. The experimental results indicate the algorithm is robust to Gauss-yawp, loss compression and more than 12 attacking means by stirmarkaudio attacking software.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A PCA Based Visual DCT Feature Extraction Method for Lip-Reading","authors":"Xiaopeng Hong, H. Yao, Yuqi Wan, Rong Chen","doi":"10.1109/IIH-MSP.2006.35","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.35","url":null,"abstract":"This paper proposes a PCA based method to reduce the dimensionality of DCT coefficients for visual only lip-reading systems. A three-stage pixel based visual front end is adopted. First, DCT or block-based DCT features are extracted. Second, Principal Component Analysis is applied for dimension reduction. Finally, all the feature vectors are normalized into a uniform scale. This work investigates this three-stage method, comparing with PCA and two DCT based approaches whose features are selected manually. In the latter manner, PCA coefficients are selected according to energy while the reduction of DCT coefficients leans to the left components in the left-top corner. Experiments prove that the dimension reduction task based on PCA does improve the recognition accuracy when the final dimension is below a certain value. They also show that DCT and block-based DCT work similarly for lip reading task, outperforming PCA slightly.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126051767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Watermarking Resisting to Geometrical Attacks Based on Histogram","authors":"Zheng Fang, Yao Zhao","doi":"10.1109/IIH-MSP.2006.116","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.116","url":null,"abstract":"At present, most image watermarking scheme can not resist geometrical attacks, which restricts the application of digital watermarking techniques. In this paper, an image watermarking scheme based on histogram is proposed, since the histogram is not sensitive to geometrical transformation. Different groups of the image histogram bars are chosen, and the message is embedded to sum of every group by using Quantization Index Modulation (QIM). In watermark embedding scheme, an exact modification from histogram to image is proposed, and it can guarantee the distortion of image as little as possible. In watermark detection process, the same groups of image histogram bars are selected, and the message is extracted from the sum of each group by using nearest distance rule. Experimental results show the scheme is robust to geometrical attacks as well as compression and filtering.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of AC-PDP Signal Processor for SoC Application","authors":"Song Qiu, Wai-yun Li, Jin-gao Liu, Wenjing Hu","doi":"10.1109/IIH-MSP.2006.81","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.81","url":null,"abstract":"This paper describes the design and implementation of a synthesizable, flexible, alternative current-plasma display panel (AC-PDP) signal processor (APSP) as an intellectual property (IP) core for system-on-a-chip (SoC) application. The APSP adopts the Improved Address and Display Separation (ADS) method we proposed to overcome the dynamic false contour (DFC) problem. The Finite State Machine (FSM) Design of the APSP are discussed in this paper. The Post-Place & Route simulation waveform based on VHDL is also proposed in this paper.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114979267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Linna Zhou, Cui-Qing Liu, X. Ping, Tao Zhang, Yun-He Wang
{"title":"Information Hiding Method in Digital Audio Signal Based on Perfect Codes","authors":"Linna Zhou, Cui-Qing Liu, X. Ping, Tao Zhang, Yun-He Wang","doi":"10.1109/IIH-MSP.2006.123","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.123","url":null,"abstract":"A novel information hiding method in digital audio signal by using the encoding redundancy of perfect codes is presented in this paper. Researches on perfect codes and its syndrome of the codeword show that the syndrome of a codeword depends only on the error, not on the codeword transmitting. A mapping encoding between secret message and codeword error map is built. According to the error map, we can embed secret messages by modifying the codeword of perfect codes. In this paper we propose a particular example of perfect codes that carrying secret messages with its encoding redundancy. Theoretical analysis and experimental results show that this method has good security.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution","authors":"R. Ji, H. Yao, Shaohui Liu, Liang Wang","doi":"10.1109/IIH-MSP.2006.105","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.105","url":null,"abstract":"The least-significant-bit (LSB) substitution which is commonly used in steganography would degrade the quality of host image significantly when embedding high-capacity information. To overcome this drawback, we present an optimal block mapping LSB method based on genetic algorithm, which is out of researchers¿ concern but fundamentally important. Additionally we discuss the rule to select the best block size. The main idea is to minimize the degradation of the stego image by finding a best mapping function between host and secret image blocks at global scope. The experimental result is promising. The advantage of our method over most commonly used LSB strategy is obvious in enhancing PSNR value while having a secluded statistic peculiarity.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130991635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chain Code Distribution-Based Image Retrieval","authors":"Junding Sun, Xiaosheng Wu","doi":"10.1109/IIH-MSP.2006.69","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.69","url":null,"abstract":"The direction chain code has been widely used in image retrieval for its simplicity and low storage requirement. One problem with the chain code is that it lacks of the spatial information of the image content, which limits its use in image retrieval. In this paper, two novel methods, called Chain Code Coherence Vector (CCCV) and Chain Code Distribution Vector (CCDV) are presented, which not only have the advantages of being invariant to the position, rotation and scaling but also contain the spatial information of the image content. In the end, two different distance measures are presented to measure the similarity of shape information embedded in the CCCV and CCDV. Experiment demonstrates the efficiency of our proposed algorithms.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133660818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Design and Implementation of Chinese Name Card Recognition System on Mobile Devices","authors":"Chi Cui","doi":"10.1109/IIH-MSP.2006.51","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.51","url":null,"abstract":"Since name card recognition based on built-in cameras has become popular people now pay more attention to the robustness and effectiveness of the system. In spite of the maturity of OCR some bottlenecks in lower processing level such as spatial correction and segmentation weak its power. Traditional models treating the card image as an orthogonal projection with only affine distortion are too simple and thus perspective correction is needed to enhance the recognition rate.Due to the complexity of the layout of Chinese name cards text segmentation also attaches strong significance to the performance. In this paper a improved name card recognition system would be devised and implemented. Two new algorithms for perspective correction and text segmentation would be proposed respectively.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"42 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113974458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}