2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)最新文献

筛选
英文 中文
Speaker weight estimation from speech signals using a fusion of the i-vector and NFA frameworks 基于i向量和NFA框架的语音信号的说话人权重估计
A. H. Poorjam, M. H. Bahari, H. Van hamme
{"title":"Speaker weight estimation from speech signals using a fusion of the i-vector and NFA frameworks","authors":"A. H. Poorjam, M. H. Bahari, H. Van hamme","doi":"10.1109/AISP.2015.7123494","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123494","url":null,"abstract":"In this paper, a novel approach for automatic speaker weight estimation from spontaneous telephone speech signals is proposed. In this method, each utterance is modeled using the i-vector framework which is based on the factor analysis on Gaussian Mixture Model (GMM) mean supervectors, and the Non-negative Factor Analysis (NFA) framework which is based on a constrained factor analysis on GMM weights. Then, the available information in both Gaussian means and Gaussian weights is exploited through a feature-level fusion of the i-vectors and the NFA vectors. Finally, a least-squares support vector regression (LS-SVR) is employed to estimate the weight of speakers from given utterances. The proposed approach is evaluated on the telephone speech signals of National Institute of Standards and Technology (NIST) 2008 and 2010 Speaker Recognition Evaluation (SRE) corpora. Experimental results over 2339 utterances show that the correlation coefficients between actual and estimated weights of male and female speakers are 0.56 and 0.49, respectively, which indicate the effectiveness of the proposed method in speaker weight estimation.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126446721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel video watermarking algorithm based on chaotic maps in the transform domain 一种基于变换域混沌映射的视频水印算法
S. Mohammadi
{"title":"A novel video watermarking algorithm based on chaotic maps in the transform domain","authors":"S. Mohammadi","doi":"10.1109/AISP.2015.7123520","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123520","url":null,"abstract":"A novel video watermarking algorithm based on wavelet transform and chaotic maps is here introduced. We apply the two dimensional wavelet transform on I-frames and then insert the chaotic watermark into part of the sub-band coefficients. Since chaotic maps are sensitive to initial values, initial values of the chaotic maps and their chaotic parameters are exploited as secret keys in our algorithm. Results are presented to reveal the usefulness of the algorithm. Comparisons are made with the latest video watermarking schemes.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133423186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An efficient content-based image retrieval with ant colony optimization feature selection schema based on wavelet and color features 一种基于小波和颜色特征的蚁群优化图像检索方法
A. Rashno, S. Sadri, Hossein SadeghianNejad
{"title":"An efficient content-based image retrieval with ant colony optimization feature selection schema based on wavelet and color features","authors":"A. Rashno, S. Sadri, Hossein SadeghianNejad","doi":"10.1109/AISP.2015.7123522","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123522","url":null,"abstract":"A novel content-based image retrieval (CBIR) schema with wavelet and color features followed by ant colony optimization (ACO) feature selection has been proposed in this paper. A new feature extraction schema including texture features from wavelet transformation and color features in RGB and HSV domain is proposed as representative feature vector for images in database. Also, appropriate similarity measure for each feature is presented. Retrieving results are so sensitive to image features used in content-based image retrieval. We address this problem with selection of most relevant features among complete feature set by ant colony optimization based feature selection. To evaluate the performance of our proposed CBIR schema, it has been compared with older proposed systems, results show that the precision and recall of our proposed schema are higher than older ones for the majority of image categories.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116738207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Cloud authentication based on encryption of digital image using edge detection 基于边缘检测的数字图像加密云认证
A. Yassin, A. Hussain, Keyan Abdul-Aziz Mutlaq
{"title":"Cloud authentication based on encryption of digital image using edge detection","authors":"A. Yassin, A. Hussain, Keyan Abdul-Aziz Mutlaq","doi":"10.1109/AISP.2015.7123517","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123517","url":null,"abstract":"The security of cloud computing is the most important concerns that may delay its well-known adoption. Authentication is the central part of cloud security, targeting to gain valid users for accessing to stored data in cloud computing. There are several authentication schemes that based on username/password, but they are considered weak methods of cloud authentication. In the other side, image's digitization becomes highly vulnerable to malicious attacks over cloud computing. Our proposed scheme focuses on two-factor authentication that used image partial encryption to overcome above aforementioned issues and drawbacks of authentication schemes. Additionally, we use a fast partial image encryption scheme using Canny's edge detection with symmetric encryption is done as a second factor. In this scheme, the edge pixels of image are encrypted using the stream cipher as it holds most of the image's data and then we applied this way to authenticate valid users. The results of security analysis and experimental results view that our work supports a good balance between security and performance for image encryption in cloud computing environment.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117045127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Multiple soccer players tracking 多名足球运动员跟踪
Nima Najafzadeh, Mehran Fotouhi, S. Kasaei
{"title":"Multiple soccer players tracking","authors":"Nima Najafzadeh, Mehran Fotouhi, S. Kasaei","doi":"10.1109/AISP.2015.7123503","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123503","url":null,"abstract":"This paper, describes a solution for tracking multiple soccer players, simultaneously, in soccer ground. It adapts Kalman filter for tracking multiple players. Adapting Kalman filter is divided to four main tasks. The first task is defining the state vector for multiple object tracking. The second task is determining a motion model for estimating the position of soccer players in the next frame. The third task is defining an observation method for detecting soccer players in each frame. Finally, the fourth task is tuning the measurement noise covariance and estimating noise covariance. In the third task, a novel observation method for detecting soccer players is proposed. This method divides the player body into three parts and calculates the histogram of each part, separately. Also, an algorithm for updating the reference object patch is introduced in observation method. Each task is discussed in detail and the promising performance of the proposed method for tracking soccer players when run on the Azadi dataset is shown.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127214481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An efficient hardware implementation of few lightweight block cipher 少量轻量级分组密码的高效硬件实现
Ali Nemati, S. Feizi, A. Ahmadi, Saeed Haghiri, M. Ahmadi, S. Alirezaee
{"title":"An efficient hardware implementation of few lightweight block cipher","authors":"Ali Nemati, S. Feizi, A. Ahmadi, Saeed Haghiri, M. Ahmadi, S. Alirezaee","doi":"10.1109/AISP.2015.7123493","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123493","url":null,"abstract":"Radio-frequency identification (RFID) are becoming a part of our everyday life with a wide range of applications such as labeling products and supply chain management and etc. These smart and tiny devices have extremely constrained resources in terms of area, computational abilities, memory, and power. At the same time, security and privacy issues remain as an important problem, thus with the large deployment of low resource devices, increasing need to provide security and privacy among such devices, has arisen. Resource-efficient cryptographic incipient become basic for realizing both security and efficiency in constrained environments and embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a significant role as a building block for security systems. In 2014 Manoj Kumar et al proposed a new Lightweight block cipher named as FeW, which are suitable for extremely constrained environments and embedded systems. In this paper, we simulate and synthesize the FeW block cipher. Implementation results of the FeW cryptography algorithm on a FPGA are presented. The design target is efficiency of area and cost.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127191758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integrated single image super resolution based on sparse representation 基于稀疏表示的集成单幅图像超分辨率
Mehdi Khademloo, M. Rezghi
{"title":"Integrated single image super resolution based on sparse representation","authors":"Mehdi Khademloo, M. Rezghi","doi":"10.1109/AISP.2015.7123523","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123523","url":null,"abstract":"This paper presents a new and efficient approach for single-image super-resolution based on sparse signal recovery. This approach uses a co-occurrence trained dictionary of image patches that obtained from a set of observed low- and high-resolution images. The linear combination of the dictionary patches can recover every patch, then each patch that used on the low-resolution image, can be recovered by the dictionary patches. Since the recovered patch is a linear combination of some patches, the noise of every patch, aggregated in the recovered patch, then we prefer a linear combination which is more sparse rather than other combinations. So the sparse representation of patches can filter the noise in the solution. Recently this approach has been used in single image super-resolution problem. These methods calculate the sparse representation of every patches separately and set it to the recovered high-resolution image. So the complexity of such methods are very high and for suitable solution the parameters of algorithm must be estimated, therefore, this process (recover all patch with an iterative algorithm and parameter estimation for each iterate) is very time consuming. This paper presents an integrated method for recovering a low-resolution image based on sparse representation of patches with one step and recover whole image together.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131640752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Despeckling algorithm for remote sensing synthetic aperture radar images using multi-scale curvelet transform 基于多尺度曲线变换的遥感合成孔径雷达图像去斑算法
M. Kooshesh, G. Akbarizadeh
{"title":"Despeckling algorithm for remote sensing synthetic aperture radar images using multi-scale curvelet transform","authors":"M. Kooshesh, G. Akbarizadeh","doi":"10.1109/AISP.2015.7123533","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123533","url":null,"abstract":"The goal of the present research is to despeckle SAR images, which is critical for segmentation and target recognition in satellite SAR images. When a despeckling algorithm is applied to a SAR image, important information such as the edges, corners, textures, and object parts will degrade. Curvelet transform is a recently proposed form of multi-scale analysis that achieves better performance of wavelet and Gabor transforms in edge and curve detection. This is a geometric transform that is useful for SAR image processing. For unsupervised texture images, segmentation is different and distinct from the textures, so the textures at the boundary noises will disappear. Curvelet transform has produced good results in the detection of curved edges with higher accuracy in finding the orientation than wavelet transforms. The present study uses fast discrete curvelet transform (FDCT) based on wresting and uses unsupervised adaptive threshold learning to develop a new despeckling algorithm for SAR images. In the proposed algorithm, each segment of the SAR image can be learned for selection of its adaptive threshold. Simulation results demonstrate that the proposed algorithm performs better than similar methods.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"38 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134260240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Speech driven lips animation for the Farsi language 语音驱动的波斯语嘴唇动画
Z. Naraghi, M. Jamzad
{"title":"Speech driven lips animation for the Farsi language","authors":"Z. Naraghi, M. Jamzad","doi":"10.1109/AISP.2015.7123525","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123525","url":null,"abstract":"With the growing presence of computers in everyday life, communication improvement between human and machines is inevitable. Talking faces are the faces whose movements are synchronized to speech. They have an effective role in many applications. Lip is the most important part of a talking face. The main goal of this project is implementing a natural and human-like lip movement synthesis system for the Farsi language. For this purpose, a comprehensive audio visual database called SFAVD1 was designed and used. After extracting the sufficient features and designing a parallel Hidden Markov Model, the speech driven lip movement sequence generator system for Farsi input speech was implemented. To remove discontinuities between lip frames produced by the system, a morphing algorithm was used. The proposed system is unique for Farsi, and the evaluations have shown its acceptable quality.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134350289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video logo removal using iterative subsequent matching 视频logo移除使用迭代后续匹配
Maryam Dashti, R. Safabakhsh, Mohammadreza Pourfard, M. Abdollahifard
{"title":"Video logo removal using iterative subsequent matching","authors":"Maryam Dashti, R. Safabakhsh, Mohammadreza Pourfard, M. Abdollahifard","doi":"10.1109/AISP.2015.7123495","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123495","url":null,"abstract":"Video inpainting methods has a large number of applications and some of these algorithms are specialized for specific applications such as logo removal. There are only a few general video inpainting algorithms most of which are very time-consuming. This problem makes these algorithms unsuitable for fast video inpainting. In this paper, a fast simple logo removal algorithm has been proposed which uses frames of each video shot for logo removal and removes logo from video after a few iterations. A more accurate non-casual version of our algorithm is also proposed which uses both the information of previous and next frames. The quality of the inpainted video is also comparable with well-known video inpainting algorithms.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133768069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信