2012 International Conference on Information Security and Intelligent Control最新文献

筛选
英文 中文
Efficient reversible steganographic embedding by the integration of reduplicated EMD and image interpolation 基于重复EMD和图像插值的有效可逆隐写嵌入
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449736
Chin-Feng Lee, Kai-Chin Chen
{"title":"Efficient reversible steganographic embedding by the integration of reduplicated EMD and image interpolation","authors":"Chin-Feng Lee, Kai-Chin Chen","doi":"10.1109/ISIC.2012.6449736","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449736","url":null,"abstract":"In 2006, Zhang and Wang proposed the Exploiting Modification Direction method (EMD) technique, which has good embedding capacity (about 1.16bpp) and high image quality (about 52dB) in irreversible data hiding field. Later other scholars have continued making improvements on EMD to increase data embedding capacity. However, these methods do not possess reversibility. Therefore, this paper exploits an extension of EMD integrated with image interpolation to make images reversible, and at the same time the high embedding capacity and acceptable image quality are also retained.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131509691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A face tracking method using feature point tracking 一种基于特征点跟踪的人脸跟踪方法
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449743
Guo-Shiang Lin, T. Tsai
{"title":"A face tracking method using feature point tracking","authors":"Guo-Shiang Lin, T. Tsai","doi":"10.1109/ISIC.2012.6449743","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449743","url":null,"abstract":"In the paper, we proposed a face tracking method using feature point tracking. The proposed face tracking method is composed of two parts: face detection and face tracking. To evaluate the proposed method, several videos containing different kinds of face movement are captured by using low-cost webcam. Experimental results show that our proposed method can track facial regions well. In addition, the detection rate of our face tracking is more than 91%. These results demonstrate that our proposed method can achieve face tracking in real-world noisy videos.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134174235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Privacy-preserving multimedia cloud computing via compressive sensing and sparse representation 基于压缩感知和稀疏表示的隐私保护多媒体云计算
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449752
Li-Wei Kang, K. Muchtar, Jyh-Da Wei, Chih-Yang Lin, Duan-Yu Chen, C. Yeh
{"title":"Privacy-preserving multimedia cloud computing via compressive sensing and sparse representation","authors":"Li-Wei Kang, K. Muchtar, Jyh-Da Wei, Chih-Yang Lin, Duan-Yu Chen, C. Yeh","doi":"10.1109/ISIC.2012.6449752","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449752","url":null,"abstract":"Cloud computing is an emerging technology developed for providing various computing and storage services over the Internet. In this paper, we proposed a privacy-preserving cloud-aware scenario for compressive multimedia applications, including multimedia compression, adaptation, editing/manipulation, enhancement, retrieval, and recognition. In the proposed framework, we investigate the applicability of our/existing compressive sensing (CS)-based multimedia compression and securely compressive multimedia “trans-sensing” techniques based on sparse coding for securely delivering compressively sensed multimedia data over a cloud-aware scenario. Moreover, we also investigate the applicability of our/existing sparse coding-based frameworks for several multimedia applications by leveraging the strong capability of a media cloud. More specifically, to consider several fundamental challenges for multimedia cloud computing, such as security and network/device heterogeneities, we investigate the applications of CS and sparse coding techniques in multimedia delivery and applications. As a result, we can build a unified cloud-aware framework for privacy-preserving multimedia applications via sparse coding.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114082059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An enhanced biometric score fusion scheme based on the AdaBoost algorithm 一种基于AdaBoost算法的增强生物特征评分融合方案
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449756
Wei-Yang Lin, Chuan-Jheng Yang
{"title":"An enhanced biometric score fusion scheme based on the AdaBoost algorithm","authors":"Wei-Yang Lin, Chuan-Jheng Yang","doi":"10.1109/ISIC.2012.6449756","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449756","url":null,"abstract":"Information fusion in biometric systems, either multimodal or intramodal fusion, usually provides an improvement in recognition performance. This paper presents a novel score-level fusion scheme called boosted score fusion. The proposed framework is a two-stage design where an existing fusion algorithm is adopted at the first stage. At the second stage, the weights obtained by the AdaBoost algorithm are utilized to boost the performance of the previously fused results. The experimental results demonstrate that the performance of several score-level fusion methods can be improved by using the presented method.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"80 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114037734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel statistical automaton for network cloud traffic classification 一种新的网络云流量分类统计自动机
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449705
Haiqiang Wang, K. Tseng, Jeng-Shyang Pan
{"title":"A novel statistical automaton for network cloud traffic classification","authors":"Haiqiang Wang, K. Tseng, Jeng-Shyang Pan","doi":"10.1109/ISIC.2012.6449705","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449705","url":null,"abstract":"Traffic classification is crucial in many network and cloud applications, they are from QoS enforcement, network monitoring to security and firewalls. In recent years, all the classification with deep packet inspection (DPI) are using the exact matching with the existing policy semantics. However, if the policy semantics is changed, then the DPI classifier is no longer able to be a workable traffic classification. We proposed a new statistical automaton for the traffic classification. The applications are marked by many multiple signatures during a flow training process, and then it classifies the applications when their statistical results are reached. In the experiment, we evaluate the proposed method with 5 applications which proves our idea is feasible for the network and cloud traffic classification.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129020371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ghosting elimination with A∗ seam optimization in image stitching 图像拼接中基于A *缝优化的重影消除
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449744
Jyun-Hong Chen, Cheng-Ming Huang
{"title":"Ghosting elimination with A∗ seam optimization in image stitching","authors":"Jyun-Hong Chen, Cheng-Ming Huang","doi":"10.1109/ISIC.2012.6449744","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449744","url":null,"abstract":"This paper presents an algorithm for eliminating the blurred image regions during image stitching. Since the camera is close to the objects when capturing the images in the indoor environments, stitching the images in the indoor scenes easily generates the blurred ghosting region. Here the reasons of blurred region generations can be categorized into two kinds. First, the slight camera vibration may result in the whole images unclear over a short span of frames. These unclear frames can be filtered out by distinguishing the clearness of the edge images between different scales. The other reason for originating the blurred region is that several image frames contain the same scene from different views. There may exist the inconsistent structures and observations in these different views. The color blending is performed to let the seam between aligned images smooth, however, it also makes these inconsistent region blurred, which is called the ghosting effect. Here, an optimal seam selection algorithm is proposed by utilizing the A* search algorithm to find a segment path away from the inconsistent overlap region and then remove the ghosting effect. The experimental results validate that the proposed algorithm can obtain the mosaic image with good quality and clear resolution.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing image quality in Visual Cryptography with colors 增强彩色视觉密码术中的图像质量
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449718
Chun-Yuan Hsiao, Hao-Ji Wang
{"title":"Enhancing image quality in Visual Cryptography with colors","authors":"Chun-Yuan Hsiao, Hao-Ji Wang","doi":"10.1109/ISIC.2012.6449718","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449718","url":null,"abstract":"The notion of Visual Cryptography was first introduced by Naor and Shamir in 1994 [NS94]. Here “visual” means that the decryption is done by human eyes instead of by any computing devices. To retrieve the ciphertext, simply stack the encrypted images together. In fact, it is more like an image secret sharing scheme than an encryption scheme. Both the secret and the shares are black-and-white pictures, and the shares are drawn on transparent slides to be later stacked together. The shares of the original Naor and Shamir scheme [NS94] are random black-and-white pixels-meaningless images. Chiu [C02] proposed a scheme where shares can be any (meaningful) pictures. Unfortunately, its reconstructed image (stacked share images) is not as clear. To improve the reconstructed image quality, we adopt the color model proposed by De Prisco and De Santis [DD11]. Our input secret image is still black-and-white, but we inject color pixels into the share images. The reconstructed image contains color pixels but looks much more alike to the input black-and-white secret image. The technical difficulty of this work is how and where to inject the color pixels so that both the share and the reconstructed images have high quality.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of embedded remote control system 嵌入式远程控制系统设计
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449703
Wei-Lun Wang
{"title":"Design of embedded remote control system","authors":"Wei-Lun Wang","doi":"10.1109/ISIC.2012.6449703","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449703","url":null,"abstract":"In the recent years, the Global System for Mobile Communications (GSM) based short message service (SMS) and the ARM (advanced RISC machine) processors based embedded systems have been widely used in the industry applications. Based on the ARM embedded system and the GSM modem, an embedded remote control system has been designed in this paper to monitor the remote machine and send automatically the messages to the supervisor. The text message may involve the alphabetic / numeric data and the Chinese word, therefore a conversion function from text message to Unicode and ASCII code is offered in the proposed embedded system. Moreover, the text message of the embedded system can be saved in an USB interface based memory device, therefore, the content of the message can be very easy to update.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A method for fetal assessment using data mining and machine learning 一种使用数据挖掘和机器学习的胎儿评估方法
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449776
W. Copeland, C. Chiang
{"title":"A method for fetal assessment using data mining and machine learning","authors":"W. Copeland, C. Chiang","doi":"10.1109/ISIC.2012.6449776","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449776","url":null,"abstract":"If a woman is pregnant, it is important for both her and her doctor/clinician to be aware if there are problems with the developing fetus. There are currently ways to discover problems using both noninvasive and invasive techniques. The University of Arkansas for Medical Sciences (UAMS) has recently developed a noninvasive system called the Squid Array for Reproductive Assessment (SARA) that can be used to gather fetal heartbeat data. This raw data, however, must then be analyzed by a human being to determine if there is a problem with a given fetus. In this paper, we propose a method to enable a computer to determine if a fetus is in a healthy or unhealthy state by the employment of a technique that will allow for rapid analysis using data mining.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114713124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An extended PCA and LDA for color face recognition 彩色人脸识别的扩展PCA和LDA
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449777
Qiong Kang, Lingling Peng
{"title":"An extended PCA and LDA for color face recognition","authors":"Qiong Kang, Lingling Peng","doi":"10.1109/ISIC.2012.6449777","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449777","url":null,"abstract":"In this paper, we propose a new method for color face recognition. We extract the first, second and third channels of each color image and use PCA and LDA to get a score of each channel, then we use a combine scheme to attain a final score and use this final score to classify test samples. In order to check the performance of our method, we conduct experiments on Georgia Tech (GT) color face database, at the same time, we compare our method with PCA and LDA, and experiment results show that our methods take better performance.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128126709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信