{"title":"Research on quality assessment metric based on H.264/AVC bitstream","authors":"Zhiyuan Shi, Pingbo Chen, Chao Feng, Lianfeng Huang, Weijian Xu","doi":"10.1109/ICASID.2012.6325335","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325335","url":null,"abstract":"No-reference(NR) video quality metrics are more practical in real-time applications compared to full-reference(FR) metrics. This contribution proposed a No-reference video quality assessment metric based on H.264/AVC bitstream through extracting features from the H.264/AVC encoded bitstream. After the extraction of the features which are very important for video quality assessment, we use Partial Least Squares Regression(PLSR) to calculate the weights of them. Then a quality prediction model is also proposed. During the experiments, the results show that our NR metric has low computing complexity. Finally, compared to subjective assessment, we find that there is a high correlation between quality prediction and the actual quality of 0.95.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115194046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile augmented reality based on cloud computing","authors":"B. Huang, C. Lin, Chia-han Lee","doi":"10.1109/ICASID.2012.6325354","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325354","url":null,"abstract":"In this paper, we implemented a mobile augmented reality system based on cloud computing. This system uses a mobile device with a camera to capture images of book spines and sends processed features to the cloud. In the cloud, the features are compared with the database and the information of the best matched book would be sent back to the mobile device. The information will then be rendered on the display via augmented reality. In order to reduce the transmission cost, the mobile device is used to perform most of the image processing tasks, such as the preprocessing, resizing, corner detection, and augmented reality rendering. On the other hand, the cloud is used to realize routine but large quantity feature comparisons. Using the cloud as the database also makes the future extension much more easily. For our prototype system, we use an Android smart phone as our mobile device, and Chunghwa Telecoms hicloud as the cloud.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"59 33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122676069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient soft error protection scheme for MPSoC and FPGA-based verification","authors":"Weichen Liu, Wei Zhang, Fubing Mao","doi":"10.1109/ICASID.2012.6325306","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325306","url":null,"abstract":"As transistor density continues to increase with the advent of nanotechnology, reliability issues raised by more frequently appeared soft errors are becoming critical tasks for future embedded multiprocessor systems design. State-of-the-art techniques for soft error protections targeting multiprocessor systems involve either high chip cost and area overhead or much performance degradation and energy consumption, and do not fulfill the increasing requirement of high performance and reliability. In this paper, we present a hardware-software collaborated approach to efficiently manage application execution and overcome reliability threats for Multiprocessor Systems-on-Chip (MPSoC). A hardware-based on-chip sensor network is built for soft error detection, and a software-based recovery mechanism is applied for soft error correction. This strategy only introduces trivial overhead on hardware design and much lower overhead on software control and execution, and hence performance degradation and energy consumption are greatly reduced. The hardware sensor design is verified via FPGA-based implementations, which proves the feasibility of the proposed approach. A SystemC-based cycle-accurate simulator is built to further verify the effectiveness of our technique by comparing with related techniques on several real-world applications.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122457573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Fallahpour, Chang-Hong Lin, Ming-Bo Lin, Chin-Yu Chang
{"title":"Parallel one- and two-dimensional FFTs on GPGPUs","authors":"M. Fallahpour, Chang-Hong Lin, Ming-Bo Lin, Chin-Yu Chang","doi":"10.1109/ICASID.2012.6325347","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325347","url":null,"abstract":"This paper presents a method to map and implement the 1-D FFT on a GPGPU and extends the method to the 2-D FFT. Two approaches are used to maximize the performance. One is to localize data inside the caches of the GPGPU and the other is to properly assign threads and blocks to reach higher performance. The results show that our implementation is 3.62 times faster to perform 32M-point 1-D FFT and 4.89 times faster to perform 2-D FFT with 16k × 8k points, as compared to the FFTW on the 16-core MPI platform.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129217778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust digital watermarking based on chaotic maps","authors":"Niansheng Liu, Donghui Guo","doi":"10.1109/ICASID.2012.6325280","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325280","url":null,"abstract":"Based on chaotic maps, a novel robust watermarking algorithm is presented in this paper. The proposed approach improves the invisibility, robustness and security of traditional watermarking algorithm by using chaotic sequences. Taking advantage of the characteristics of extreme sensitivity to initial conditions, Chebyshev maps are used to generate substantially different watermarks as a key. This technique has been shown to offer an added security advantage over the more traditionally generated watermarks created from pseudorandom sequences, in that only the function seed needs to be stored. Various kinds of images are selected as watermark images in order to prove the fidelity of the proposed scheme. Simulation of the algorithm is performed on different types of images, and the results are compared with existing algorithms. Results show that the proposed scheme is simple and applicable, and can resist many attacks such as JPEG compression, rotation, cropping and noising.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"419 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124205614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single-stage quasi z-source flyback Power Factor Correction converter","authors":"Q. Nha, M. Alam, H. Chiu, Yu-Kang Lo","doi":"10.1109/ICASID.2012.6325299","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325299","url":null,"abstract":"This paper presents a single-stage quasi z-source flyback Power Factor Correction (PFC) AC-DC converter which features high efficiency, unity power factor (PF), and low Total Harmonic Distortion (THD) under wide range input voltage operation. The proposed PFC converter can achieve very low voltage spike on switch by utilizing a common topology, namely quasi z-source topology that has been widely used in many applications. As a result, a low voltage rating Mosfet with low on-resistance Rds(on) can be used to gain a high efficiency. In addition, Continuous Conduction Mode (CCM) operation associated with the variable duty control scheme to regulate the output voltage is also applied to get high PF, low harmonic components in the line current, as well as conduction loss reduction. In this study, the operating principle, circuit analysis, and control method of the proposed PFC converter are provided. Additionally, the design guidelines are also verified by a laboratory prototype with the input voltage of 130-230 V AC, 36 V/180 W output, and 55 kHz switching frequency. Consequently, this topology is suitable for wide input voltage range and low-to-medium power applications where a unity PF, low THD, and high efficiency are required.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of face detection algorithm based on KL-Gaussian Model on DSP","authors":"Hezhi Lin, Kunqing Wu, Xiangping Kong, Lianfeng Huang, Zhiyuan Shi, Siyan Chen","doi":"10.1109/ICASID.2012.6325324","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325324","url":null,"abstract":"Human face detection plays an important role in applications such as secure access, video surveillance. In view of the poor detection rate and low speed of the detection for faces in profile view, pose varied and complex background, this paper proposes the KL-Gaussian Model algorithm in YCbCr color space for face detection, which is designed and implemented on the TMS320DM6437 platform. Furthermore, to develop the DSP platform advantage, the optimization scheme for our designed face detection system is proposed. The result shows that the performance of the system is good with high detection rate and good robustness in the condition that faces with different poses and angles, which is significant to the intelligent development of video surveillance system.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125786550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of computational verb theory to association rule mining","authors":"A. Cai, Tao Yang","doi":"10.1109/ICASID.2012.6325326","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325326","url":null,"abstract":"There are many algorithms for association rule mining, but in practice we usually face raw data that is inappropriate for these algorithms because of lacking a unified preprocessing framework. In this paper, a general framework for dynamic data processing is presented, which is based on computational verb theory (CVT). Linear standard computational verbs are used and computational verb similarities are employed to process raw data, such that the association rules of trends can be found. One example of time series of an Internet shop is studied to show the usefulness of the association rule mining algorithm proposed in this paper.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121922285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The method to increase the estimation accuracy of time differences of arrival at the cost of propagation channel features","authors":"M. Mironov, E. Voroshilin","doi":"10.1109/ICASID.2012.6325331","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325331","url":null,"abstract":"The question of the estimation accuracy increasing of time differences of signal arrival to the spatially receiving points of a terrestrial radio monitoring system is considered. Such system works at a partially uncertainty about the signal parameters. The problem is solved by using the signals reflected from the Earth surface or different reflecting objects whose energies are higher than the direct signal energy. The basic assumptions are: a radio source has a narrow radiation pattern; the main lobe is not directed to the radio monitoring system. The monitoring system receives reflected signals from the area illuminated by the main lobe of the radio source. Direct and reflected signals can be resolved in every receiving point using spatial processing.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123089420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accurate power-loss estimation for continuous-current-conduction-mode synchronous Buck converters","authors":"Chia-Hsing Li, Yu-Kang Lo, H. Chiu, T. Chen","doi":"10.1109/ICASID.2012.6325298","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325298","url":null,"abstract":"This paper presents an accurate power-loss estimation method for continuous-current-conduction-mode synchronous Buck converters. Realistic analysis for switching losses on power MOSFET has been investigated. Considering the thermal characteristic, total power loss on power MOSFETs is calculated to predict the maximum junction temperature. Theoretical analysis and experimental results are shown and compared to verify the validity of the proposed method.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115940496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}