{"title":"Efficient reversible steganographic embedding by the integration of reduplicated EMD and image interpolation","authors":"Chin-Feng Lee, Kai-Chin Chen","doi":"10.1109/ISIC.2012.6449736","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449736","url":null,"abstract":"In 2006, Zhang and Wang proposed the Exploiting Modification Direction method (EMD) technique, which has good embedding capacity (about 1.16bpp) and high image quality (about 52dB) in irreversible data hiding field. Later other scholars have continued making improvements on EMD to increase data embedding capacity. However, these methods do not possess reversibility. Therefore, this paper exploits an extension of EMD integrated with image interpolation to make images reversible, and at the same time the high embedding capacity and acceptable image quality are also retained.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131509691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A face tracking method using feature point tracking","authors":"Guo-Shiang Lin, T. Tsai","doi":"10.1109/ISIC.2012.6449743","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449743","url":null,"abstract":"In the paper, we proposed a face tracking method using feature point tracking. The proposed face tracking method is composed of two parts: face detection and face tracking. To evaluate the proposed method, several videos containing different kinds of face movement are captured by using low-cost webcam. Experimental results show that our proposed method can track facial regions well. In addition, the detection rate of our face tracking is more than 91%. These results demonstrate that our proposed method can achieve face tracking in real-world noisy videos.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134174235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li-Wei Kang, K. Muchtar, Jyh-Da Wei, Chih-Yang Lin, Duan-Yu Chen, C. Yeh
{"title":"Privacy-preserving multimedia cloud computing via compressive sensing and sparse representation","authors":"Li-Wei Kang, K. Muchtar, Jyh-Da Wei, Chih-Yang Lin, Duan-Yu Chen, C. Yeh","doi":"10.1109/ISIC.2012.6449752","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449752","url":null,"abstract":"Cloud computing is an emerging technology developed for providing various computing and storage services over the Internet. In this paper, we proposed a privacy-preserving cloud-aware scenario for compressive multimedia applications, including multimedia compression, adaptation, editing/manipulation, enhancement, retrieval, and recognition. In the proposed framework, we investigate the applicability of our/existing compressive sensing (CS)-based multimedia compression and securely compressive multimedia “trans-sensing” techniques based on sparse coding for securely delivering compressively sensed multimedia data over a cloud-aware scenario. Moreover, we also investigate the applicability of our/existing sparse coding-based frameworks for several multimedia applications by leveraging the strong capability of a media cloud. More specifically, to consider several fundamental challenges for multimedia cloud computing, such as security and network/device heterogeneities, we investigate the applications of CS and sparse coding techniques in multimedia delivery and applications. As a result, we can build a unified cloud-aware framework for privacy-preserving multimedia applications via sparse coding.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114082059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced biometric score fusion scheme based on the AdaBoost algorithm","authors":"Wei-Yang Lin, Chuan-Jheng Yang","doi":"10.1109/ISIC.2012.6449756","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449756","url":null,"abstract":"Information fusion in biometric systems, either multimodal or intramodal fusion, usually provides an improvement in recognition performance. This paper presents a novel score-level fusion scheme called boosted score fusion. The proposed framework is a two-stage design where an existing fusion algorithm is adopted at the first stage. At the second stage, the weights obtained by the AdaBoost algorithm are utilized to boost the performance of the previously fused results. The experimental results demonstrate that the performance of several score-level fusion methods can be improved by using the presented method.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"80 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114037734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel statistical automaton for network cloud traffic classification","authors":"Haiqiang Wang, K. Tseng, Jeng-Shyang Pan","doi":"10.1109/ISIC.2012.6449705","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449705","url":null,"abstract":"Traffic classification is crucial in many network and cloud applications, they are from QoS enforcement, network monitoring to security and firewalls. In recent years, all the classification with deep packet inspection (DPI) are using the exact matching with the existing policy semantics. However, if the policy semantics is changed, then the DPI classifier is no longer able to be a workable traffic classification. We proposed a new statistical automaton for the traffic classification. The applications are marked by many multiple signatures during a flow training process, and then it classifies the applications when their statistical results are reached. In the experiment, we evaluate the proposed method with 5 applications which proves our idea is feasible for the network and cloud traffic classification.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129020371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ghosting elimination with A∗ seam optimization in image stitching","authors":"Jyun-Hong Chen, Cheng-Ming Huang","doi":"10.1109/ISIC.2012.6449744","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449744","url":null,"abstract":"This paper presents an algorithm for eliminating the blurred image regions during image stitching. Since the camera is close to the objects when capturing the images in the indoor environments, stitching the images in the indoor scenes easily generates the blurred ghosting region. Here the reasons of blurred region generations can be categorized into two kinds. First, the slight camera vibration may result in the whole images unclear over a short span of frames. These unclear frames can be filtered out by distinguishing the clearness of the edge images between different scales. The other reason for originating the blurred region is that several image frames contain the same scene from different views. There may exist the inconsistent structures and observations in these different views. The color blending is performed to let the seam between aligned images smooth, however, it also makes these inconsistent region blurred, which is called the ghosting effect. Here, an optimal seam selection algorithm is proposed by utilizing the A* search algorithm to find a segment path away from the inconsistent overlap region and then remove the ghosting effect. The experimental results validate that the proposed algorithm can obtain the mosaic image with good quality and clear resolution.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing image quality in Visual Cryptography with colors","authors":"Chun-Yuan Hsiao, Hao-Ji Wang","doi":"10.1109/ISIC.2012.6449718","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449718","url":null,"abstract":"The notion of Visual Cryptography was first introduced by Naor and Shamir in 1994 [NS94]. Here “visual” means that the decryption is done by human eyes instead of by any computing devices. To retrieve the ciphertext, simply stack the encrypted images together. In fact, it is more like an image secret sharing scheme than an encryption scheme. Both the secret and the shares are black-and-white pictures, and the shares are drawn on transparent slides to be later stacked together. The shares of the original Naor and Shamir scheme [NS94] are random black-and-white pixels-meaningless images. Chiu [C02] proposed a scheme where shares can be any (meaningful) pictures. Unfortunately, its reconstructed image (stacked share images) is not as clear. To improve the reconstructed image quality, we adopt the color model proposed by De Prisco and De Santis [DD11]. Our input secret image is still black-and-white, but we inject color pixels into the share images. The reconstructed image contains color pixels but looks much more alike to the input black-and-white secret image. The technical difficulty of this work is how and where to inject the color pixels so that both the share and the reconstructed images have high quality.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of embedded remote control system","authors":"Wei-Lun Wang","doi":"10.1109/ISIC.2012.6449703","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449703","url":null,"abstract":"In the recent years, the Global System for Mobile Communications (GSM) based short message service (SMS) and the ARM (advanced RISC machine) processors based embedded systems have been widely used in the industry applications. Based on the ARM embedded system and the GSM modem, an embedded remote control system has been designed in this paper to monitor the remote machine and send automatically the messages to the supervisor. The text message may involve the alphabetic / numeric data and the Chinese word, therefore a conversion function from text message to Unicode and ASCII code is offered in the proposed embedded system. Moreover, the text message of the embedded system can be saved in an USB interface based memory device, therefore, the content of the message can be very easy to update.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A method for fetal assessment using data mining and machine learning","authors":"W. Copeland, C. Chiang","doi":"10.1109/ISIC.2012.6449776","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449776","url":null,"abstract":"If a woman is pregnant, it is important for both her and her doctor/clinician to be aware if there are problems with the developing fetus. There are currently ways to discover problems using both noninvasive and invasive techniques. The University of Arkansas for Medical Sciences (UAMS) has recently developed a noninvasive system called the Squid Array for Reproductive Assessment (SARA) that can be used to gather fetal heartbeat data. This raw data, however, must then be analyzed by a human being to determine if there is a problem with a given fetus. In this paper, we propose a method to enable a computer to determine if a fetus is in a healthy or unhealthy state by the employment of a technique that will allow for rapid analysis using data mining.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114713124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An extended PCA and LDA for color face recognition","authors":"Qiong Kang, Lingling Peng","doi":"10.1109/ISIC.2012.6449777","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449777","url":null,"abstract":"In this paper, we propose a new method for color face recognition. We extract the first, second and third channels of each color image and use PCA and LDA to get a score of each channel, then we use a combine scheme to attain a final score and use this final score to classify test samples. In order to check the performance of our method, we conduct experiments on Georgia Tech (GT) color face database, at the same time, we compare our method with PCA and LDA, and experiment results show that our methods take better performance.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128126709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}