2007 3rd International Workshop on Signal Design and Its Applications in Communications最新文献

筛选
英文 中文
On the Spreading Sequences with Perfect Periodic Crosscorrelation Properties 具有完全周期互相关性质的扩展序列
Lifang Feng, P. Fan, L. Hao
{"title":"On the Spreading Sequences with Perfect Periodic Crosscorrelation Properties","authors":"Lifang Feng, P. Fan, L. Hao","doi":"10.1109/IWSDA.2007.4408407","DOIUrl":"https://doi.org/10.1109/IWSDA.2007.4408407","url":null,"abstract":"To eliminate the multiple access interference of asynchronous direct sequence code division multiple access (DS-CDMA) system, a set of sequences with perfect crosscorrelation functions (CCFs) is desirable, although the corresponding autocorrelation function (ACF) cannot be simultaneously perfect based on the theoretical bounds. In this letter, a general construction of the spreading sequences with perfect periodic CCFs is presented, and the corresponding theoretical limit on the family size, the number of phases, and the sequence length is also investigated.","PeriodicalId":303512,"journal":{"name":"2007 3rd International Workshop on Signal Design and Its Applications in Communications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128322861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Underwater Acoustic Feature Extraction Based on Bidimensional Empirical Mode Decomposition in Shadow Field 基于阴影场二维经验模态分解的水声特征提取
Ge Guangtao, Sang Enfang, Li Zhuofu, Zhu Beibei
{"title":"Underwater Acoustic Feature Extraction Based on Bidimensional Empirical Mode Decomposition in Shadow Field","authors":"Ge Guangtao, Sang Enfang, Li Zhuofu, Zhu Beibei","doi":"10.1109/IWSDA.2007.4408399","DOIUrl":"https://doi.org/10.1109/IWSDA.2007.4408399","url":null,"abstract":"Recent developments in feature extraction based on bidimensional empirical mode decomposition (BEMD) is mainly about the optical image. Here we applied the BEMD to the underwater acoustic image feature extraction. Acoustic shadow fields always disturb feature extraction. To reduce it, we decomposed the underwater acoustic image into several Intrinsic mode functions (IMFs) and a residue. Thus, the Canny edge detector could extract better features from the first IMF. Sometimes, it is necessary to detect the sum of the first two IMFs. Experiments prove that this novel method really enhance the features of objects (physiognomy and texture) in the acoustic shadow field and weaken the edge of the acoustic shadow field.","PeriodicalId":303512,"journal":{"name":"2007 3rd International Workshop on Signal Design and Its Applications in Communications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125820253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Joint Multiple Watermarking and Non-Expansion Visual Cryptography 联合多重水印与非扩展视觉密码
Hao Luo, Zhenfei Zhao, Jeng-Shyang Pan, Zhe-ming Lu
{"title":"Joint Multiple Watermarking and Non-Expansion Visual Cryptography","authors":"Hao Luo, Zhenfei Zhao, Jeng-Shyang Pan, Zhe-ming Lu","doi":"10.1109/IWSDA.2007.4408406","DOIUrl":"https://doi.org/10.1109/IWSDA.2007.4408406","url":null,"abstract":"This paper proposes a scheme to hide two watermarks in visual secret sharing of a gray level image. One watermark is embedded during secret image halftoning, and the other watermark is hidden during the halftone image encryption. A non-expansion visual secret sharing model is used to encrypt the halftone image. In data extraction, only exclusive-OR operation is needed. Experimental results show the effectiveness of our scheme.","PeriodicalId":303512,"journal":{"name":"2007 3rd International Workshop on Signal Design and Its Applications in Communications","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126426854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Poly Phase Zero-Correlation Zone Sequences based on Complete Complementary Codes and DFT matrix 基于完全互补码和DFT矩阵的多相零相关带序列
Chenggao Han, T. Hashimoto, N. Suehiro
{"title":"Poly Phase Zero-Correlation Zone Sequences based on Complete Complementary Codes and DFT matrix","authors":"Chenggao Han, T. Hashimoto, N. Suehiro","doi":"10.1109/IWSDA.2007.4408350","DOIUrl":"https://doi.org/10.1109/IWSDA.2007.4408350","url":null,"abstract":"Recently, numerous constructions of zero correlation zone (ZCZ) sequences have been introduced e.g. based on perfect sequences and complete complementary codes etc.. However, the previous construction method which based on complete complementary code is lacking for merit figures when none of whose elements are zero. In this paper, a new construction method of ZCZ sequences based on complete complementary codes is proposed. By proposed method, the poly phase ZCZ sequences with greater than 1/2 merit figure are constructable.","PeriodicalId":303512,"journal":{"name":"2007 3rd International Workshop on Signal Design and Its Applications in Communications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114548714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adaptive MIMO Successive Interference Cancellation Decision Feedback Equalization RLS algorithm for V-BLAST V-BLAST的自适应MIMO逐次干扰抵消决策反馈均衡RLS算法
Yun Wang, Jinkuan Wang, Zhibin Xie
{"title":"Adaptive MIMO Successive Interference Cancellation Decision Feedback Equalization RLS algorithm for V-BLAST","authors":"Yun Wang, Jinkuan Wang, Zhibin Xie","doi":"10.1109/IWSDA.2007.4408373","DOIUrl":"https://doi.org/10.1109/IWSDA.2007.4408373","url":null,"abstract":"We present a new receiver structure able to deliver high data rates in a multi-input-multi-output (MIMO) frequency selective wireless environment. The new algorithm is obtained by canceling interference from the received symbols successively with the decision feed-forward equalizer (DFE) solution as a well known expression encountered in fast recursive least squares (RLS) adaptive algorithms, and the decision feedback equalizer as a convolution of the decision feed-forward equalizer with the channel. The proposed method is more structured and more stable in finite precision than known algorithms in the literature. The convergence and performance of these algorithms is confirmed through simulation results.","PeriodicalId":303512,"journal":{"name":"2007 3rd International Workshop on Signal Design and Its Applications in Communications","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114564556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Almost Perfect Nonlinear Functions 关于几乎完全非线性函数
2007 3rd International Workshop on Signal Design and Its Applications in Communications Pub Date : 2007-12-26 DOI: 10.1093/ietfec/e91-a.12.3665
C. Carlet
{"title":"On Almost Perfect Nonlinear Functions","authors":"C. Carlet","doi":"10.1093/ietfec/e91-a.12.3665","DOIUrl":"https://doi.org/10.1093/ietfec/e91-a.12.3665","url":null,"abstract":"A function F:F[unk]¿F[unk] is almost perfect nonlinear (APN) if, for every a¿0, b in F[unk], the equation F(x)+ F(x+a)=b has at most two solutions [4]. When used as an S-box in a block cipher, it opposes then an optimum resistance to differential cryptanalysis. The function F is almost bent (AB) if the minimum Hamming distance between all its component functions v·F, v ¿ F[unk]{0}, where \"·\" denotes any inner product in F[unk] and all affine Boolean functions on F[unk] takes the maximal value 2n-1 2(n-1)/2. AB functions exist for n odd only and oppose an optimum resistance to the linear cryptanalysis (see [3]). Every AB function is APN [3], and in the n odd case, any quadratic APN function is AB [2]. The APN and AB properties are preserved by affine equivalence: F~F' if F' = A1[unk] F[unk] A2, where A1, A2 are affine permutations. More generally, they are preserved by CCZ-equivalence [2], that is, affine equivalence of the graphs of F:{(x, F(x)) | x¿F[unk]} and of F'. Until recently, the only known constructions of APN and AB functions were CCZ-equivalent to power functions F(x)=xd over finite fields (F2n being identified with F[unk]).","PeriodicalId":303512,"journal":{"name":"2007 3rd International Workshop on Signal Design and Its Applications in Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126593086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Security Video Watermarking Scheme for Broadcast Monitoring 一种用于广播监控的安全视频水印方案
Li Liu, D. Peng, Xiaoju Li
{"title":"A Security Video Watermarking Scheme for Broadcast Monitoring","authors":"Li Liu, D. Peng, Xiaoju Li","doi":"10.1109/IWSDA.2007.4408336","DOIUrl":"https://doi.org/10.1109/IWSDA.2007.4408336","url":null,"abstract":"Identification and verification of a video clip via its fingerprint find applications in broadcast monitoring, database search and transaction tracking. For broadcast monitoring, we propose a novel robust hashing algorithm for video based on the 3-D wavelet transform (3D-DWT). Then the watermark information and the short fingerprint using the proposed hash algorithm are combined to create the embedding information. On the base of the video hashing, a security video watermarking scheme is proposed for broadcast monitoring. Finally, the security of proposed algorithm is analyzed. Some experimental results, which prove the effectiveness of the algorithms, are presented.","PeriodicalId":303512,"journal":{"name":"2007 3rd International Workshop on Signal Design and Its Applications in Communications","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved A Priori MMSE Spectral Subtraction Method for Speech Enhancement 一种改进的先验MMSE谱减方法用于语音增强
Ning Cheng, Wenju Liu, Bo Xu
{"title":"An Improved A Priori MMSE Spectral Subtraction Method for Speech Enhancement","authors":"Ning Cheng, Wenju Liu, Bo Xu","doi":"10.1109/IWSDA.2007.4408401","DOIUrl":"https://doi.org/10.1109/IWSDA.2007.4408401","url":null,"abstract":"This paper presents a modification of conventional minimum mean squared error (MMSE) spectral subtraction algorithm by introducing an adaptive averaging factor to accurately estimate the a priori SNR. Performance of the modified a priori SNR is evaluated by comparing with conventional spectral subtraction algorithm. Improved results are obtained in terms of speech quality measures for various types of noise when the time-frequency varying averaging factor, proposed in this paper, is adapted in the conventional subtraction rules.","PeriodicalId":303512,"journal":{"name":"2007 3rd International Workshop on Signal Design and Its Applications in Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High Security Frequency/Time Hopping Sequence Generators 高安全性频率/时间跳频序列发生器
Yun-Pyo Hong, Seok-Yong Jin, Hong‐Yeop Song
{"title":"High Security Frequency/Time Hopping Sequence Generators","authors":"Yun-Pyo Hong, Seok-Yong Jin, Hong‐Yeop Song","doi":"10.1109/IWSDA.2007.4408415","DOIUrl":"https://doi.org/10.1109/IWSDA.2007.4408415","url":null,"abstract":"We consider the pk -ary frequency/time hopping (FH/TH) sequence generator composed of a combinatorial function generator and k registers. We consider possible attacks on the FH/TH sequence generator and characterize the generator with desired cryptographic properties to resist these possible attacks on a case by case basis.","PeriodicalId":303512,"journal":{"name":"2007 3rd International Workshop on Signal Design and Its Applications in Communications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131608306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Simple Channel Estimate Method Of AS-TR-STBC System over Multipath Fading Channels 多径衰落信道下AS-TR-STBC系统的一种简单信道估计方法
Jianglin Zhang, Jingfang Sun, Ping Yang
{"title":"A Simple Channel Estimate Method Of AS-TR-STBC System over Multipath Fading Channels","authors":"Jianglin Zhang, Jingfang Sun, Ping Yang","doi":"10.1109/IWSDA.2007.4408387","DOIUrl":"https://doi.org/10.1109/IWSDA.2007.4408387","url":null,"abstract":"This paper proposes a time-reversal (TR) STBC channel estimate method based on antenna selection over MIMO system fading channels. This scheme relies on choosing the best two antenna from all four possible antenna. Then a MIMO channel estimate method is proposed, which is based on AS-TR-STBC. This estimate is a novel method combining antenna selection and time-reversal STBC for multipath fading channels .Simulation show the proposed scheme outperforms all other schemes if the power for the useful antenna is reasonably considered.","PeriodicalId":303512,"journal":{"name":"2007 3rd International Workshop on Signal Design and Its Applications in Communications","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130329953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信