{"title":"A pixel-domain post-processing technique to reduce the blocking artifacts in transform-coded images","authors":"U. S. Mohammed","doi":"10.1109/ISSPIT.2010.5711816","DOIUrl":"https://doi.org/10.1109/ISSPIT.2010.5711816","url":null,"abstract":"The reconstructed images after compression produce annoying blocking artifacts near block boundaries, particularly in low bit-rate image compression, because each block is transformed and quantized independently Detection of blocking artifact has an important role in the design of image coding systems. Increasing the bit rate to obtain better quality images is too costly. In this paper, a novel pixel-domain technique for image blocking artifact detection is presented. The algorithm detects the regions of the image which present visible blocking artifacts. The blocking artifact detection and reduction is presented as a post- processing in the image decoder. The algorithm first detects the direction of artifact through power spectrum estimation of the e pixel absolute difference (PAD) in both horizontal and vertical directions. The power spectrum of the PAD is estimated using the Maximum Entropy method (MEM) which is a nonparametric method to perform accurate power spectrum estimation. The reduction process is applied on the direction of artifacts only to improve the image quality. The key of the reduction process is based on the modified projection operator to give reasonable modifications for the block boundary pixels. The simulation results illustrate the performance of the proposed method for the JPEG decoded images.","PeriodicalId":308189,"journal":{"name":"The 10th IEEE International Symposium on Signal Processing and Information Technology","volume":"17 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122371887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-channel ANC using online secondary-path modeling with noise power scheduling","authors":"T. Jung, J. Seo, Ki-Jin Kim, J. Kim, S. Nam","doi":"10.1109/ISSPIT.2010.5711806","DOIUrl":"https://doi.org/10.1109/ISSPIT.2010.5711806","url":null,"abstract":"In multi-channel active noise control (ANC) systems, online secondary-path modeling (OSPM) using the auxiliary noise signal is often applied. However, the additive noise signal may contribute to the residual output noise. In this paper, the conventional noise power scheduling, utilized for single-channel ANC with OSPM, is further extended to multi-channel ANC. Simulation results demonstrate that the proposed approach yields better ANC performance, compared with conventional multi-channel ANC methods.","PeriodicalId":308189,"journal":{"name":"The 10th IEEE International Symposium on Signal Processing and Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129926012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sadek, A. Al-Hamadi, M. Elmezain, B. Michaelis, Usama Sayed
{"title":"Human activity recognition via temporal moment invariants","authors":"S. Sadek, A. Al-Hamadi, M. Elmezain, B. Michaelis, Usama Sayed","doi":"10.1109/ISSPIT.2010.5711729","DOIUrl":"https://doi.org/10.1109/ISSPIT.2010.5711729","url":null,"abstract":"Temporal invariant shape moments intuitively seem to provide an important visual cue to human activity recognition in video sequences. In this paper, an SVM based method for human activity recognition is introduced. With this method, the feature extraction is carried out based on a small number of computationally-cheap invariant shape moments. When tested on the popular KTH action dataset, the obtained results are promising and compare favorably with that reported in the literature. Furthermore our proposed method achieves real-time performance, and thus can provide latency guarantees to real-time applications and embedded systems.","PeriodicalId":308189,"journal":{"name":"The 10th IEEE International Symposium on Signal Processing and Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124570386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the effect of High Power Amplifier Nonlinearity on MIMO MC-CDMA systems","authors":"M. Dakhli, R. Zayani, R. Bouallègue","doi":"10.1109/ISSPIT.2010.5711775","DOIUrl":"https://doi.org/10.1109/ISSPIT.2010.5711775","url":null,"abstract":"The combination of Multiple-Input Multiple-Output (MIMO) with Multi-Carrier Code Division Multiplexing Access (MC-CDMA) is a promising technique for achieving high performance with very high data rates in 4G broadband wireless communications. Nevertheless, Nonlinearity of High-Power Amplifier (HPA) plays a crucial role in the performance of MIMO MC-CDMA systems. In this paper, we investigate the performance of VBLAST MIMO MC-CDMA system in the presence of nonlinear HPA. In order to illustrate this fact, different receivers, such as ZF, IC-ZF, MMSE IC-MMSE and QR-ML, are considered and mutually compared. Specifically, we assess the impact of HPA nonlinearity on the Bit Error Rate (BER), when the system is operated under Rayleigh fading channel. Numerical results are provided and show the effects of several system parameters, such as type of receivers, number of transmit and receive antennas, number of users and spreading factor length, on system performance.","PeriodicalId":308189,"journal":{"name":"The 10th IEEE International Symposium on Signal Processing and Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127251708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Belief Network for clustering and classification of a continuous data","authors":"M. Salama, A. Hassanien, A. Fahmy","doi":"10.1109/ISSPIT.2010.5711759","DOIUrl":"https://doi.org/10.1109/ISSPIT.2010.5711759","url":null,"abstract":"Deep Belief Network (DBN) is a deep architecture that consists of a stack of Restricted Boltzmann Machines (RBM). The deep architecture has the benefit that each layer learns more complex features than layers before it. DBN and RBM could be used as a feature extraction method also used as neural network with initially learned weights. The approach proposed depends on DBN in clustering and classification of continuous input data without using back propagation in the DBN architecture. DBN should have a better a performance than the traditional neural network due the initialization of the connecting weights rather than just using random weights in NN. Each layer in DBN (RBM) depends on Contrastive Divergence method for input reconstruction which increases the performance of the network.","PeriodicalId":308189,"journal":{"name":"The 10th IEEE International Symposium on Signal Processing and Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129027445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MMSE detector using forward and backward reciprocal-lattice reduction in MIMO systems","authors":"H. Negishi, Wei Hou, T. Fujino","doi":"10.1109/ISSPIT.2010.5711796","DOIUrl":"https://doi.org/10.1109/ISSPIT.2010.5711796","url":null,"abstract":"This paper proposes an MMSE detector using forward and backward reciprocal lattice reduction (LR) in MIMO systems. In the 8×8 MIMO systems, the reciprocal LR aided detection (LRAD) achieves better BER performances about 3dB than the LRAD using the conventional LLL algorithm over BER=10−5. The proposed method furthermore achieves better BER performances about 1dB than the reciprocal LRAD.","PeriodicalId":308189,"journal":{"name":"The 10th IEEE International Symposium on Signal Processing and Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emad El-Sayed, Rehab F. Abdel-Kader, Rabab M. Ramadan
{"title":"Orientation of multiple principal axes shapes using efficient averaging method","authors":"Emad El-Sayed, Rehab F. Abdel-Kader, Rabab M. Ramadan","doi":"10.1109/ISSPIT.2010.5711815","DOIUrl":"https://doi.org/10.1109/ISSPIT.2010.5711815","url":null,"abstract":"In this paper we propose an effective, low computational cost technique to find the orientation of shapes that have several non-equally separated axes of symmetry. In our technique we define a simple method to calculate the average angle of the shape's axes of symmetry. The axes of symmetry of the shape could be detected using any of the well known techniques reported in the literature. In the proposed technique we use the edge points of the shape to have the ability to deal with natural pictures like coins. The internal edges are used in addition to the external boundary edges to increase the orientation detection capabilities of the algorithm. First, the edge map of the image is extracted by applying Canny edge detector [15]. Second, the center of the object is detected by calculating the average of the vertical and horizontal coordinates of the points of the edge map. Third, the total perpendicular absolute distances from the edge map points to the line that passes through the center point with specified angle are calculated. These calculations are repeated with different angles to find the angles of the minimum peaks of the calculated distances. Finally, if the shape has more than one minimum peak we use our averaging method to get the dominant direction angle of the shape or the shape orientation. By using this technique we only use the first moment of inertia and do not have to use any higher orders to reduce the computational cost.","PeriodicalId":308189,"journal":{"name":"The 10th IEEE International Symposium on Signal Processing and Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125280013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework to strengthen password authentication using mobile devices and browser extensions","authors":"P. Shi, Bo Zhu, A. Youssef","doi":"10.1109/ISSPIT.2010.5711728","DOIUrl":"https://doi.org/10.1109/ISSPIT.2010.5711728","url":null,"abstract":"Shoulder-surfing, phishing and keylogging are widely used by attackers to obtain users' sensitive credentials. In this paper, we propose a framework to strengthen password authentication using mobile devices and browser extensions. This approach provides a relatively high resilience against shoulder-surfing, phishing and keylogging attacks while requires no change on the server side. A prototype implementation of the proposed approach and its security analysis are also provided.","PeriodicalId":308189,"journal":{"name":"The 10th IEEE International Symposium on Signal Processing and Information Technology","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of breathing signal using delayless subband adaptive filter with HPF","authors":"Kali Vara Prasad Naraharisetti","doi":"10.1109/ISSPIT.2010.5711770","DOIUrl":"https://doi.org/10.1109/ISSPIT.2010.5711770","url":null,"abstract":"The paper involves implementation of adaptive noise cancellation using a closed loop delayless subband adaptive filter (SAF) with a high pass filter in the primary microphone path. Adaptive algorithms such as Least Mean Squares (LMS) and Normalized Least Mean Squares (NLMS) have many practical applications since they are simple and less complex. These gradient algorithms such as LMS and NLMS suffer from slow convergence. Recursive least squares (RLS) algorithm is computationally very complex algorithm. Therefore, there is a trade off between complexity and convergence speed. This paper utilizes an algorithm named closed loop delayless SAF with which the computational complexity is reduced and convergence performance is improved. Experimental results show that the utilized algorithm works really well in cancelling the low frequency band noise signal from a wideband signal corrupted with the low frequency noise.","PeriodicalId":308189,"journal":{"name":"The 10th IEEE International Symposium on Signal Processing and Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116630279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource allocation in relay-assisted DS/CDMA interference channels: A Stackelberg game approach","authors":"A. Zappone, Eduard Axel Jorswieck","doi":"10.1109/ISSPIT.2010.5711791","DOIUrl":"https://doi.org/10.1109/ISSPIT.2010.5711791","url":null,"abstract":"The issue of resource allocation for MSE minimization in a DS/CDMA amplify-and-forward relay-assisted interference channel is addressed in this paper. The resource allocation process is modeled as a two-level Stackelberg game, with the relay as the leader, and the multiple access users as followers. The best response dynamics for the non-cooperative game played by the followers for a given relay matrix is derived and its convergence proved. Then, computationally simpler equilibria that require very little CSI are proposed, and relay matrix design is carried out. Numerical results confirm the theoretical findings, showing the merits of the proposed resource allocation techniques.","PeriodicalId":308189,"journal":{"name":"The 10th IEEE International Symposium on Signal Processing and Information Technology","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123104378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}