{"title":"Watermark in color image","authors":"Ren-Junn Hwang, Chuan-Ho Kao, Rong-Chi Chang","doi":"10.1109/CW.2002.1180883","DOIUrl":"https://doi.org/10.1109/CW.2002.1180883","url":null,"abstract":"There is an increasing number of products to be saved in digital form. In the digital world, we can preserve products forever, but there are also disadvantages such as easy copying. The watermark is an important protection method in digital media. When a media is publicly available or put on a network, it is very easy to copy or be misappropriated. The author can prove ownership by using an open algorithm and security key to extract the watermark. Therefore, a watermark technique must resist attacks and cannot influence image quality. We propose an image watermark technique based on the spatial domain in a color image. We present experimental results which prove that our method can resist certain attacks.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133220866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An e-shopping system with different negotiation model","authors":"Hiroshi Ouchiyama, Takeshi Yamazaki, Runhe Huang","doi":"10.1109/CW.2002.1180895","DOIUrl":"https://doi.org/10.1109/CW.2002.1180895","url":null,"abstract":"This paper proposes an agent based e-shopping system that uses different negotiation models to match different users and generates different negotiation model objects for adaptation of different user preferences. Five different levels from simple to sophisticated of negotiation models are described. How different models are matched to different users is explained and how adaptation of different user preferences is shown in this paper. Finally, an e-shopping system architecture is presented and how the e-shopping system works is demonstrated.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130902179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of a leasing service for CORBA-based applications","authors":"M. Aleksy, R. Gitzel","doi":"10.1109/CW.2002.1180860","DOIUrl":"https://doi.org/10.1109/CW.2002.1180860","url":null,"abstract":"The leasing concept enjoys increasing popularity, in the context of distributed systems - a prime example for this is Jini. In this paper, we present a service that realises the leasing concept for the CORBA environment. We discuss various resource management techniques with regard to CORBA and detail their advantages and disadvantages. The focus of this work, however, is the description of the design and implementation of our CORBA leasing service. Special care was taken to incorporate existing types defined in the CORBA services specification to allow users familiar with other CORBA services to quickly grasp the newly-introduced leasing service.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"2 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114110610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An image copyright protection scheme based on torus automorphism","authors":"Chinchen Chang, J. Hsiao, Chi-Lung Chiang","doi":"10.1109/CW.2002.1180882","DOIUrl":"https://doi.org/10.1109/CW.2002.1180882","url":null,"abstract":"We propose an approach to protect the copyright of image data. Many watermarking techniques have been proposed to guard the copyright of image data, most of which need to embed the watermark in the cover image. Unfortunately, embedding always results in a reduction of image quality. To achieve the goal of copyright protection without reducing image quality, we incorporate the concept of digital signature into our approach. Firstly, we produce a signature in correspondence with the cover image and the watermark. We send this signature to a certification authority or a trusted third party. If anyone pirates our image, we can still retrieve the watermark image with the signature that was stored at the certification authority and prove that the image is ours. The watermark image that we use is a gray-level image.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123998743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A push-type groupware system to facilitate small group collaboration","authors":"Roman Y. Shtykh, Qun Jin","doi":"10.1109/CW.2002.1180901","DOIUrl":"https://doi.org/10.1109/CW.2002.1180901","url":null,"abstract":"In this study, we are trying to develop a general-purpose groupware system for uniform open groups that integrate in itself all main tools necessary for collaboration and cooperation online to achieve common goals at shorter times, ensure fast information transfer and decrease the amount of necessary administration. The system consists of a number of tools that reflect actions of one member at all the nodes of the system, giving awareness for collaboration and increasing its effectiveness. In comparison with other applications that have been designed for knowledge sharing, our system pushes necessary information through the network so that no manual search and download are necessary if one of the group members possesses it. Thus the speed of training, knowledge and information sharing is accelerated and participation of the group members will be increased. By developing the system, we are trying to provide shared workspace for all main platforms as well.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125750647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HMM topology selection for on-line Thai handwriting recognition","authors":"K. Siriboon, A. Jirayusakul, B. Kruatrachue","doi":"10.1109/CW.2002.1180872","DOIUrl":"https://doi.org/10.1109/CW.2002.1180872","url":null,"abstract":"Researchers have extensively applied hidden Markov models (HMM) to handwriting recognition in English, Chinese, and other languages. Most researchers have used left-right topology for handwriting and speech recognition. This research studied the effect of HMM topology on isolated online Thai handwriting recognition. The left-right, fully connected and proposed topologies (left-right-left) were compared. The number of states of a character HMM for each topology was varied from 15 to 35 nodes and the one with the best training observations probability was selected. The feature used was chain code-like with modifications to represent original quadrant position. The recognition results showed that the proposed topology increases the recognition rate compared to the most widely used left-right topology.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129748743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of SVD algorithm on the Trident processor","authors":"M. Soliman, S. Sedukhin","doi":"10.1109/CW.2002.1180865","DOIUrl":"https://doi.org/10.1109/CW.2002.1180865","url":null,"abstract":"Within the current decade, process technology is promising one billion transistors on a single die, operating at frequency of from 6 to 10 GHz. As a direct result of the fundamental trends of increasing transistors density and switching speeds, newer technological and microarchitectural design constrains are introduced. Among them, wire delays will become critical. To take the benefits of the VLSI technology, we proposed Trident processor, which emphasizes on local communication. Like vector architectures, Trident processor extends a scalar core with parallel lanes; each lane contains an execution datapath and a slice of register file. However, Trident processor uses ring and communication registers, which are based on local communication, to store and cyclically shift 1-D data within and across the lanes, respectively. By using parallel datapaths, ring, and communication registers, Trident processor can effectively process not only vector but also matrix data. In this paper, the performance of the Trident processor on singular value decomposition (SVD) algorithm is evaluated. On 500/spl times/600 input matrix, four lanes Trident processor significantly reduces the number of instructions (44 times less), loop overhead (30 times less), and load/store operations (3 times less) comparing with a scalar code. Moreover, Trident processor is scalable and its scalability needs only replicating lanes to process longer vectors or larger matrices (eight lanes can speedup SVD by 2.5 times over four lanes).","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129907823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive function-based artistic shape modeling","authors":"K. Levinski, A. Sourin","doi":"10.1109/CW.2002.1180921","DOIUrl":"https://doi.org/10.1109/CW.2002.1180921","url":null,"abstract":"This paper addresses interactive function-based shape modeling where relatively small formulas are used rather than thousands of polygons. Interactive modification of the function model with concurrent visualization of the respective polygonal mesh provides both interactivity and any required level of detail leading to a photorealistic appearance of the resulting shapes. We have proposed a rendering method capable of handling local shape modifications with any desired precision. We have also proposed methods which let us accelerate the final function evaluation - a common bottleneck for function-based shape modeling. Finally, we describe applications of interactive function-based shape modeling to photorealistic virtual embossing and carving.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive architecture for multi-stream authoring and presentations in distributed networks","authors":"Chung-Ming Huang, Pei-Chuan Liu, Tz-Heng Hsu","doi":"10.1109/CW.2002.1180880","DOIUrl":"https://doi.org/10.1109/CW.2002.1180880","url":null,"abstract":"New global trends in communications technology and liberalization are forcing dramatic changes in our lives. Applications tend to be lightweight and mobile, resulting in greater convenience. We present a new architecture to advance the traditional authoring system towards these trends. In the proposed architecture, the authoring system is capable of editing media content distributed in the networks. It forms a new model of authoring, i.e., the distributed authoring model. The distributed authoring model is described and compared with the traditional authoring model. We introduce quality-on-demand streaming in the architecture for the purpose of distributed authoring. Furthermore, we address the problems of applying multiple source streaming and quality adaptation in the architecture and show our design for resolving these problems. An implementation conforming to this architecture is also described.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131641615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Presenting methods for unraveling the first two regular 4D polytopes (4D simplex and the hypercube)","authors":"A. A. Ramírez, R. Aguila","doi":"10.1109/CW.2002.1180911","DOIUrl":"https://doi.org/10.1109/CW.2002.1180911","url":null,"abstract":"This article presents methods for unraveling the hypercube and the 4D simplex and obtaining the unravelings that corresponds to the hyper-flattening of their boundaries. These regular polytopes can be raveled back using the methods in an inverse way. The transformations to apply include rotations around a plane (characteristic of the 4D space). All these processes can be viewed using a computer animation system.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133454608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}