{"title":"Motion estimation of depth map based on perceptual attention region","authors":"Pei-Jun Lee, Chun-Yuan Cheng","doi":"10.1109/ISIC.2012.6449742","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449742","url":null,"abstract":"This paper proposes a new solution to improve the coding efficiency of depth map in 2D plus depth map of 3D video coding. The proposed algorithm is achieved to reduce coding time on using H.264 encoding for both color image and depth map and to enhance the encoding quality for 2D MV sharing to depth encoding. The method uses 3D perceptual attention regions to determine re-motion estimation MBs in depth map. Moreover, to reduce the coding time for the remotion estimation, the proposed algorithm achives a fast mode decision MBs by motion activity to select coding mode. Experimental results show that the entire encoding time is reduced by about 41.09% compared with the exhaustive full mode decision approach, and the SSIM is increased by about 0.0764 and the PSNR is increased by about 6.7685dB compared with the MV sharing approach.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123095714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust H∞ switching control for uncertain discrete switched time-delay systems","authors":"C. Lien, K. Yu, Hao‐Chin Chang","doi":"10.1109/ISIC.2012.6449767","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449767","url":null,"abstract":"In this paper, some delay-dependent LMI stabilization criteria are proposed to design H∞ switching control and switching signal for discrete switched system with interval time-varying delay. Some nonnegative inequalities are used to improve the conservativeness of the proposed results. Finally, a numerical example is illustrated to show the main proposed result.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127991252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy-based target tracking on “Vehicular Grid Sensor Networks”","authors":"Yih-Fuh Wang, Chan Wu","doi":"10.1109/ISIC.2012.6449724","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449724","url":null,"abstract":"In Vehicular Grid Sensor Network (VGSN), because the operation of individual vehicles and mobile speed and direction, contact between them fragile and unstable. It has multicast links suddenly fail to overcome the problems, so that the message flows to each node, and increase the volume of traffic control. In this paper, we propose a fuzzy-based target tracking scheme that will re-route the link path when the link becomes weak so as to maintain the vehicle-to-vehicle connections to make the whole VSN more stable. In addition, due to the arbitrary speeds of vehicles, the sensors installed in different vehicles may have different reaction times. We also take into account a suitable alarm range as the moving speed changes, although this action increases the control overhead. Despite this reduction in average latency, this intelligent approach enables higher survivability and more effective on re-routing.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124385283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient delegation protocol in mobile RFID networks","authors":"Jia-Ning Luo, Ming-Hour Yang","doi":"10.1109/ISIC.2012.6449731","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449731","url":null,"abstract":"In this paper, we propose a new protocol to allow delegation transfer between offline mobile readers in the mobile RFID (Radio Frequency Identification) environment. A mobile reader can grant the access rights of a specific tag from another reader. Besides, our protocol is efficient and secure against most current network threats, such as replay attacks, Man-in-the-Middle (MITM) attacks, denial of service (DoS) attacks caused by asynchronous update, guessing attacks, and counterfeit tags. It also guarantees forward/backward secrecy, data privacy, and location privacy.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"26 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130753922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face recognition based on collaborative image similarity assessment","authors":"Deng-Yuan Huang, T. Lin, Wu-Chih Hu, Mu-Song Chen","doi":"10.1109/ISIC.2012.6449754","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449754","url":null,"abstract":"In this paper, we propose an innovative approach for face recognition based on collaborative image similarity assessment (CISA). In the proposed method, the test sample is first represented by a linear combination of all the training samples for each face class. The classification task is then conducted using the similarity measures including structure similarity index measure (SSIM), root mean square (RMS), and similarity assessment value (SAV). Since CISA is only one phase, it is computationally efficient when comparing with the method of two-phase test sample sparse representation (TPTSR). To verify the performance of face classification, two popular face databases of the ORL and FERET are used. Results show that CISA is comparable with TPTSR on the classification rates for ORL database. However, CISA greatly outperforms TPTSR on the evaluation of the FERET database. Moreover, only 276.4ms on an average is required for CISA in the classification of each test sample but it needs 800.8ms for TPTSR.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132224256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online transductive support vector machines for classification","authors":"Mu-Song Chen, Tze-Yee Ho, D. Huang","doi":"10.1109/ISIC.2012.6449755","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449755","url":null,"abstract":"Transductive support vector machine (TSVM) is one kind of transductive inference process, which combines labeled samples with unlabelled samples to derive the decision rules for classification tasks. Compared with the classical SVM, the transductive SVM is more robust and can achieve better performance. However, there are some disadvantages still being explored. One of the vital drawbacks is its computational costs. Usually, the SVM and TSVM models need to be retrained from scratch for parameter variations whenever any new samples become available. This problem has hindered the use of transduction learning in many real world applications. To resolve these problems, the online transductive support vector machine (OTSVM) is present to improve the generalization performance of the TSVM model. The OTSVM integrates the incremental learning/decremental unlearning to learn new incoming unlabeled samples one by one and modifies its model parameters at the same time. In addition to this, the OTSVM also dynamically adjusts the labels of unmatched samples. Simulation results illustrate that the OTSVM can improve classification performance and increase its computational efficiency.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133047378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Hue, G. N. Luyen, N. D. Kha, S. Wohlgemuth, I. Echizen, D. Thuc, T. B. D. Thuy
{"title":"An Efficient Fine-grained Access Control mechanism for database outsourcing service","authors":"T. Hue, G. N. Luyen, N. D. Kha, S. Wohlgemuth, I. Echizen, D. Thuc, T. B. D. Thuy","doi":"10.1109/ISIC.2012.6449709","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449709","url":null,"abstract":"In database outsourcing service, the data owners store their databases at the servers which belong to potentially untrusted service providers. It is necessary to protect outsourced data from unauthorized access. However, by using existing access control mechanisms, data owners are incapable of controlling access to individual sensitive attributes of their data. In this paper, we propose an Efficient Fine-grained Access Control mechanism, named EFGAC, which can restrict access to the more sensitive columns of the shared relation. EFGAC can handle most of dynamic updates on users or dataset or access rights efficiently without the need of the systematic reconstruction or database re-keying. Experimental results show that EFGAC can save a worthy amount of key derivation time of users and reduce the number of keys held by each user in the system. Especially, we suggest strategies which are useful for the data owner in deciding the necessary number of keys in both static and dynamic cases of outsourcing.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117156631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design of P2P-based VoD system with VCR functionality","authors":"Ching-Lung Chang, Sih-Ping Huang","doi":"10.1109/ISIC.2012.6449728","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449728","url":null,"abstract":"Peer-to-Peer (P2P) network structure is widely employed for video streaming applications due to its high stability, flexible extensibility and ability to share data stream loading among different peer nodes. This paper proposes an interleaved video frame distribution (IVFD) scheme to resourcefully support full VCR functionalities in P2P environment without searching new source. Instead of acquiring video stream data from a single parent peer, each client peer in the IVFD scheme can simultaneously acquire interleaved video data from multiple parent peers. When a client peer carries out arbitrary VCR operations, such as jumps, fast forward/rewind, those parent peers will be able to provide un-continued video stream data for the client peer. As a result, no video source searching is necessary. Simulation results reveal an excellent load distribution performance and a closed to zero response latency for VCR operations.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"225 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120928524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on address shortage in a tree based ZigBee network","authors":"Y. Lv","doi":"10.1109/ISIC.2012.6449710","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449710","url":null,"abstract":"This paper reports the development of a mobile health profile which dedicates to mobile applications. Since mobile sensors have to be carried by patients, the mobile health profile must facilitate mobility. In this investigation, a ZigBee fixed-mobile network (ZFMN) is defined and developed to supplement the Zigbee Health Care Profile for patient monitoring. The mobility study of ZigBee is performed using a random waypoint ΟΡΝΈΤ simulation model In a ZFMN, the critical issue of address shortage is identified and discussed. It is analyzed that the problematic address shortage in a ZFMN may generate a huge amount of orphaned end devices and thus the packet drop percentage may potentially rise to 70%, rendering the network unable to function properly. Without introducing additional governing schemes, it is evaluated that the communication of the entire ZigBee network may paralyze. Further vigorous test are performed (by OPNET) on the communication capability of ZFMN when devices are randomly moving and sending data in Is. It is vital to point out that under the adverse condition of address shortage, the performance of a ZFMN is still encouraging as long as the packet drop percentage has been kept below 3% before running out of address.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124380058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A high coherent utility fuzzy itemsets mining algorithm","authors":"Chun-Hao Chen, Ai-Fang Li, Yeong-Chyi Lee","doi":"10.1109/ISIC.2012.6449720","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449720","url":null,"abstract":"In this paper, we propose an algorithm for mining high coherent utility fuzzy itemsets (HCUFI) from quantitative transactions with the properties of propositional logic. It first transforms quantitative transactions into fuzzy sets. Then, utility of each fuzzy itemsets is then calculated according to the given external utility table. If the value is large than or equals to the minimum utility ratio, it will be considered as a High Utility Fuzzy Itemset (HUFI). Finally, contingency tables are calculated and used for checking those HUFI satisfy specific four criteria or not. If yes, it is a High Coherent Utility Fuzzy Itemsets (HCUFI). Experiments on the foodmart dataset are also made to show the effectiveness of the proposed algorithm.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}