Anti-counterfeiting, Security, and Identification最新文献

筛选
英文 中文
Research on quality assessment metric based on H.264/AVC bitstream 基于H.264/AVC码流的质量评价指标研究
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325335
Zhiyuan Shi, Pingbo Chen, Chao Feng, Lianfeng Huang, Weijian Xu
{"title":"Research on quality assessment metric based on H.264/AVC bitstream","authors":"Zhiyuan Shi, Pingbo Chen, Chao Feng, Lianfeng Huang, Weijian Xu","doi":"10.1109/ICASID.2012.6325335","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325335","url":null,"abstract":"No-reference(NR) video quality metrics are more practical in real-time applications compared to full-reference(FR) metrics. This contribution proposed a No-reference video quality assessment metric based on H.264/AVC bitstream through extracting features from the H.264/AVC encoded bitstream. After the extraction of the features which are very important for video quality assessment, we use Partial Least Squares Regression(PLSR) to calculate the weights of them. Then a quality prediction model is also proposed. During the experiments, the results show that our NR metric has low computing complexity. Finally, compared to subjective assessment, we find that there is a high correlation between quality prediction and the actual quality of 0.95.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115194046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mobile augmented reality based on cloud computing 基于云计算的移动增强现实
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325354
B. Huang, C. Lin, Chia-han Lee
{"title":"Mobile augmented reality based on cloud computing","authors":"B. Huang, C. Lin, Chia-han Lee","doi":"10.1109/ICASID.2012.6325354","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325354","url":null,"abstract":"In this paper, we implemented a mobile augmented reality system based on cloud computing. This system uses a mobile device with a camera to capture images of book spines and sends processed features to the cloud. In the cloud, the features are compared with the database and the information of the best matched book would be sent back to the mobile device. The information will then be rendered on the display via augmented reality. In order to reduce the transmission cost, the mobile device is used to perform most of the image processing tasks, such as the preprocessing, resizing, corner detection, and augmented reality rendering. On the other hand, the cloud is used to realize routine but large quantity feature comparisons. Using the cloud as the database also makes the future extension much more easily. For our prototype system, we use an Android smart phone as our mobile device, and Chunghwa Telecoms hicloud as the cloud.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"59 33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122676069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
An efficient soft error protection scheme for MPSoC and FPGA-based verification 一种有效的基于MPSoC和fpga验证的软错误保护方案
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325306
Weichen Liu, Wei Zhang, Fubing Mao
{"title":"An efficient soft error protection scheme for MPSoC and FPGA-based verification","authors":"Weichen Liu, Wei Zhang, Fubing Mao","doi":"10.1109/ICASID.2012.6325306","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325306","url":null,"abstract":"As transistor density continues to increase with the advent of nanotechnology, reliability issues raised by more frequently appeared soft errors are becoming critical tasks for future embedded multiprocessor systems design. State-of-the-art techniques for soft error protections targeting multiprocessor systems involve either high chip cost and area overhead or much performance degradation and energy consumption, and do not fulfill the increasing requirement of high performance and reliability. In this paper, we present a hardware-software collaborated approach to efficiently manage application execution and overcome reliability threats for Multiprocessor Systems-on-Chip (MPSoC). A hardware-based on-chip sensor network is built for soft error detection, and a software-based recovery mechanism is applied for soft error correction. This strategy only introduces trivial overhead on hardware design and much lower overhead on software control and execution, and hence performance degradation and energy consumption are greatly reduced. The hardware sensor design is verified via FPGA-based implementations, which proves the feasibility of the proposed approach. A SystemC-based cycle-accurate simulator is built to further verify the effectiveness of our technique by comparing with related techniques on several real-world applications.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122457573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parallel one- and two-dimensional FFTs on GPGPUs gpgpu上的并行一维和二维fft
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325347
M. Fallahpour, Chang-Hong Lin, Ming-Bo Lin, Chin-Yu Chang
{"title":"Parallel one- and two-dimensional FFTs on GPGPUs","authors":"M. Fallahpour, Chang-Hong Lin, Ming-Bo Lin, Chin-Yu Chang","doi":"10.1109/ICASID.2012.6325347","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325347","url":null,"abstract":"This paper presents a method to map and implement the 1-D FFT on a GPGPU and extends the method to the 2-D FFT. Two approaches are used to maximize the performance. One is to localize data inside the caches of the GPGPU and the other is to properly assign threads and blocks to reach higher performance. The results show that our implementation is 3.62 times faster to perform 32M-point 1-D FFT and 4.89 times faster to perform 2-D FFT with 16k × 8k points, as compared to the FFTW on the 16-core MPI platform.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129217778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust digital watermarking based on chaotic maps 基于混沌映射的鲁棒数字水印
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325280
Niansheng Liu, Donghui Guo
{"title":"Robust digital watermarking based on chaotic maps","authors":"Niansheng Liu, Donghui Guo","doi":"10.1109/ICASID.2012.6325280","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325280","url":null,"abstract":"Based on chaotic maps, a novel robust watermarking algorithm is presented in this paper. The proposed approach improves the invisibility, robustness and security of traditional watermarking algorithm by using chaotic sequences. Taking advantage of the characteristics of extreme sensitivity to initial conditions, Chebyshev maps are used to generate substantially different watermarks as a key. This technique has been shown to offer an added security advantage over the more traditionally generated watermarks created from pseudorandom sequences, in that only the function seed needs to be stored. Various kinds of images are selected as watermark images in order to prove the fidelity of the proposed scheme. Simulation of the algorithm is performed on different types of images, and the results are compared with existing algorithms. Results show that the proposed scheme is simple and applicable, and can resist many attacks such as JPEG compression, rotation, cropping and noising.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"419 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124205614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Single-stage quasi z-source flyback Power Factor Correction converter 单级准z源反激功率因数校正变换器
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325299
Q. Nha, M. Alam, H. Chiu, Yu-Kang Lo
{"title":"Single-stage quasi z-source flyback Power Factor Correction converter","authors":"Q. Nha, M. Alam, H. Chiu, Yu-Kang Lo","doi":"10.1109/ICASID.2012.6325299","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325299","url":null,"abstract":"This paper presents a single-stage quasi z-source flyback Power Factor Correction (PFC) AC-DC converter which features high efficiency, unity power factor (PF), and low Total Harmonic Distortion (THD) under wide range input voltage operation. The proposed PFC converter can achieve very low voltage spike on switch by utilizing a common topology, namely quasi z-source topology that has been widely used in many applications. As a result, a low voltage rating Mosfet with low on-resistance Rds(on) can be used to gain a high efficiency. In addition, Continuous Conduction Mode (CCM) operation associated with the variable duty control scheme to regulate the output voltage is also applied to get high PF, low harmonic components in the line current, as well as conduction loss reduction. In this study, the operating principle, circuit analysis, and control method of the proposed PFC converter are provided. Additionally, the design guidelines are also verified by a laboratory prototype with the input voltage of 130-230 V AC, 36 V/180 W output, and 55 kHz switching frequency. Consequently, this topology is suitable for wide input voltage range and low-to-medium power applications where a unity PF, low THD, and high efficiency are required.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of face detection algorithm based on KL-Gaussian Model on DSP 基于kl -高斯模型的人脸检测算法在DSP上的实现
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325324
Hezhi Lin, Kunqing Wu, Xiangping Kong, Lianfeng Huang, Zhiyuan Shi, Siyan Chen
{"title":"Implementation of face detection algorithm based on KL-Gaussian Model on DSP","authors":"Hezhi Lin, Kunqing Wu, Xiangping Kong, Lianfeng Huang, Zhiyuan Shi, Siyan Chen","doi":"10.1109/ICASID.2012.6325324","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325324","url":null,"abstract":"Human face detection plays an important role in applications such as secure access, video surveillance. In view of the poor detection rate and low speed of the detection for faces in profile view, pose varied and complex background, this paper proposes the KL-Gaussian Model algorithm in YCbCr color space for face detection, which is designed and implemented on the TMS320DM6437 platform. Furthermore, to develop the DSP platform advantage, the optimization scheme for our designed face detection system is proposed. The result shows that the performance of the system is good with high detection rate and good robustness in the condition that faces with different poses and angles, which is significant to the intelligent development of video surveillance system.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125786550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of computational verb theory to association rule mining 计算动词理论在关联规则挖掘中的应用
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325326
A. Cai, Tao Yang
{"title":"Application of computational verb theory to association rule mining","authors":"A. Cai, Tao Yang","doi":"10.1109/ICASID.2012.6325326","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325326","url":null,"abstract":"There are many algorithms for association rule mining, but in practice we usually face raw data that is inappropriate for these algorithms because of lacking a unified preprocessing framework. In this paper, a general framework for dynamic data processing is presented, which is based on computational verb theory (CVT). Linear standard computational verbs are used and computational verb similarities are employed to process raw data, such that the association rules of trends can be found. One example of time series of an Internet shop is studied to show the usefulness of the association rule mining algorithm proposed in this paper.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121922285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The method to increase the estimation accuracy of time differences of arrival at the cost of propagation channel features 该方法以传播信道特征为代价,提高了到达时间差的估计精度
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325331
M. Mironov, E. Voroshilin
{"title":"The method to increase the estimation accuracy of time differences of arrival at the cost of propagation channel features","authors":"M. Mironov, E. Voroshilin","doi":"10.1109/ICASID.2012.6325331","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325331","url":null,"abstract":"The question of the estimation accuracy increasing of time differences of signal arrival to the spatially receiving points of a terrestrial radio monitoring system is considered. Such system works at a partially uncertainty about the signal parameters. The problem is solved by using the signals reflected from the Earth surface or different reflecting objects whose energies are higher than the direct signal energy. The basic assumptions are: a radio source has a narrow radiation pattern; the main lobe is not directed to the radio monitoring system. The monitoring system receives reflected signals from the area illuminated by the main lobe of the radio source. Direct and reflected signals can be resolved in every receiving point using spatial processing.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123089420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accurate power-loss estimation for continuous-current-conduction-mode synchronous Buck converters 连续电流传导模式同步降压变换器的精确功率损耗估计
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325298
Chia-Hsing Li, Yu-Kang Lo, H. Chiu, T. Chen
{"title":"Accurate power-loss estimation for continuous-current-conduction-mode synchronous Buck converters","authors":"Chia-Hsing Li, Yu-Kang Lo, H. Chiu, T. Chen","doi":"10.1109/ICASID.2012.6325298","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325298","url":null,"abstract":"This paper presents an accurate power-loss estimation method for continuous-current-conduction-mode synchronous Buck converters. Realistic analysis for switching losses on power MOSFET has been investigated. Considering the thermal characteristic, total power loss on power MOSFETs is calculated to predict the maximum junction temperature. Theoretical analysis and experimental results are shown and compared to verify the validity of the proposed method.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115940496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信