Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology最新文献
{"title":"Feature enhancement with a Reservoir-based Denoising Auto Encoder","authors":"A. Jalalvand, Kris Demuynck, J. Martens","doi":"10.1109/ISSPIT.2013.6781884","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781884","url":null,"abstract":"Recently, automatic speech recognition has advanced significantly by the introduction of deep neural networks for acoustic modeling. However, there is no clear evidence yet that this does not come at the price of less generalization to conditions that were not present during training. On the other hand, acoustic modeling with Reservoir Computing (RC) did not offer improved clean speech recognition but it leads to good robustness against noise and channel distortions. In this paper, the aim is to establish whether adding feature denoising in the front-end can further improve the robustness of an RC-based recognizer, and if so, whether one can devise an RC-based Denoising Auto Encoder that outperforms a traditional denoiser like the ETSI Advanced Front-End. In order to answer these questions, experiments are conducted on the Aurora-2 benchmark.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"62 1","pages":"000227-000232"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84729197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sahni, B. G. Zapirain, K. Berberidis, I. Krikidis
{"title":"IEEE ISSPIT 2013: Message from the TPC chairs","authors":"S. Sahni, B. G. Zapirain, K. Berberidis, I. Krikidis","doi":"10.1109/ISSPIT.2013.6781872","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781872","url":null,"abstract":"We would like to welcome you to the 13th IEEE International Symposium on Signal Processing and Information Technology ISSPIT 2013 in Athens (Greece). This is the 13th in a series of Symposia bridging the areas of Signal Processing and Information Technology.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"14 1","pages":"163"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75056748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing security in wireless e-health systems","authors":"A. Papalambrou, J. Gialelis, D. Serpanos","doi":"10.1109/ISSPIT.2013.6781847","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781847","url":null,"abstract":"In this paper, we identify the security and privacy issues specific to wireless health monitoring devices and describe solutions for protecting wireless communications against side channel attacks and in particular traffic analysis attacks. This process takes place by means of data obfuscation and modifications of communication protocol architectures in order to limit exposed information of system architecture to potential attackers. Initial network simulations of the proposed methods show the feasibility of these methods.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"192 1","pages":"000015-000020"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75532173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of face recognition at a distance by scaling down images","authors":"Yufeng Zheng, Adel Said Elmaghraby","doi":"10.1109/ISSPIT.2013.6781879","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781879","url":null,"abstract":"Face recognition at a distance is one grand challenge for security surveillance. In this paper, the face images at different distances are simulated by varying image scales (resolutions). The performances of three face recognition algorithms (matchers) are tested with variant image scales (simulating different distances) and with two spectral images (modalities). The three selected matchers are face pattern byte, elastic bunch graph matching, and linear discriminant analysis; while the two modalities are visible and thermal images. The performance of a face recognition system can be measured by accuracy (AC) rate and false accept rate (FAR). To enhance the performance of face recognition especially at a distance, score fusion techniques are applied, which combine several scores from multiple matchers and multiple modalities. Our experiments are conducted with the ASUMS face dataset consisting of two spectral images (visible and thermal) from 135 subjects. The experimental results show that the face recognition with small image scales (simulating long distances) have low performance (e.g., AC=91.36%, FAR=8.64% for 20×20-pixel images); and score fusion can greatly improve accuracy (99.34%) meanwhile reduce FAR (0.31%).","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"284 1","pages":"000198-000203"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74540047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konstantinos Fysarakis, C. Manifavas, I. Papaefstathiou, Anastasios Adamopoulos
{"title":"A lightweight anonymity & location privacy service","authors":"Konstantinos Fysarakis, C. Manifavas, I. Papaefstathiou, Anastasios Adamopoulos","doi":"10.1109/ISSPIT.2013.6781866","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781866","url":null,"abstract":"As embedded systems, in their various forms, become ubiquitous, new types of services are offered, aiming to enhance every aspect of the everyday life and allowing users to enjoy pervasive and personalized access to information. Along with the benefits come considerable threats to users' privacy, as these enhanced services operate on private sensitive information, such as the true identity and location of users. This paper proposes a lightweight, distributed anonymity and location privacy service which can be deployed on mobile embedded systems (e.g. smart clothing, smart phones), even heterogeneous in nature, allowing users to form communities which help them hide their identities and exact location. Acting as a proxy the proposed service can sanitize users' requests prior to forwarding them to a location-based service (LBS). The deployment of this type of information sanitization proxy would facilitate the wider adoption of the new generation of enhanced reality applications and services, alleviating the justified concerns regarding users' privacy.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"25 1","pages":"000124-000129"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81618876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Subaperture Secondary Range Compression Algorithm for near space squint SAR","authors":"Yi Sun, Xiaojun Jing, Songlin Sun, Hai Huang","doi":"10.1109/ISSPIT.2013.6781904","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781904","url":null,"abstract":"This paper discusses squint synthetic aperture radar (SAR) imaging in the near space platform and proposes an improved Secondary Range Compression (SRC) Algorithm, Subaperture Secondary Range Compression (SSRC) Algorithm. The key step is to use the subaperture approach in the SRC algorithm. First, the original signals are divided into subapertures in the azimuth direction of the time domain to image independently, and then the sub-bands of the frequency domain are combined to form the final SAR image. The method reduces coupling in the range and azimuth direction of the echo signal under the squint imaging mode, and addresses the problems of squint SAR in near space including overlong synthetic aperture and motion error. Simulation through point targets demonstrates the improvement in azimuth resolution, ISLR and PSLR, which verifies the effectiveness of this proposed SSRC algorithm in near space squint SAR imaging.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"35 1","pages":"000338-000343"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81647417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Papaodysseus, Constantinos Chalatsis, Dimitris Arabadjis, Solomon Zannos, F. Giannopoulos, P. Rousopoulos, E. Kalfa
{"title":"A general, novel methodology for studying the generation of finite precision error in any algorithm","authors":"C. Papaodysseus, Constantinos Chalatsis, Dimitris Arabadjis, Solomon Zannos, F. Giannopoulos, P. Rousopoulos, E. Kalfa","doi":"10.1109/ISSPIT.2013.6781911","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781911","url":null,"abstract":"In this work, a new general approach is introduced for the study of the generation, propagation and accumulation of the quantization error in any algorithm. This methodology employs a number of fundamental propositions demonstrating the way the four operations addition, multiplication, division and subtraction, influence quantization error generation and transmission. Using these, one can obtain knowledge of the exact number of erroneous digits with which all quantities of any algorithm are computed at each step of it. This methodology offers understanding of the actual cause of the generation and propagation of finite precision error in any computational scheme.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"8 1","pages":"000380-000385"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81595200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mode selection rules for device-to-device communication: Design criteria and performance metrics","authors":"K. Mahmood, Günes Karabulut-Kurt","doi":"10.1109/ISSPIT.2013.6781900","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781900","url":null,"abstract":"Device to device (D2D) communications enable mobile devices to directly communicate with each other when they are relatively close to each other. We consider the selection of direct or indirect communication path via the base station for D2D communications. Referring to this as the mode selection problem, in this paper we define mode selection rules based on channel capacity, SNR and distance. We also define associated performance metrics by modeling the mode selection problem as a hypothesis test with Gaussian distribution. Furthermore we provide the analytical expressions for correct detection, false alarm, and missed detection probabilities. Our results of the proposed framework can provide sufficient insight about the expected performances through the used mode selection rule for D2D communications.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"60 1","pages":"000315-000320"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89834445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The analysis of an NMF-based perceptual image hashing scheme","authors":"S. A. H. Tabatabaei, C. Ruland","doi":"10.1109/ISSPIT.2013.6781863","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781863","url":null,"abstract":"This paper analyzes a recently introduced perceptual image hashing scheme. This scheme uses non-negative matrix factorization (NMF) as the feature of the image on the secondary image obtained by the ring partitioning of the original one. The image hash is rotation-invariant with arbitrary degree but it is robust against acceptable content-preserving image modifications. We re-visit the algorithm and show that the algorithm tolerates some serious security flaws. Ignoring specific areas of the image in the feature extraction stage and invariance against individual ring rotation are two existing drawbacks. Practical experiments show the mentioned weaknesses and some solutions will be proposed.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"14 1","pages":"000108-000112"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87582892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric identification based on Transient Evoked Otoacoustic Emission","authors":"Yuxi Liu, D. Hatzinakos","doi":"10.1109/ISSPIT.2013.6781891","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781891","url":null,"abstract":"Biometrics provides a reliable and efficient solution to identity management in many aspects of daily lives, such as application login, access control and transaction security. This paper presents a novel approach to individual identification based on a new biometric modality Transient Evoked Otoacoustic Emission (TEOAE), which is a low level acoustic signal generated by human cochlea and detected in the outer ear canal. We resort to wavelet analysis to derive the time-frequency representation of such non-stationary signal and machine learning techniques: linear discriminant analysis and softmax regression to accomplish pattern recognition. We also introduce a complete framework of the biometric system considering practical application. Experiments on a TEOAE dataset of biometric setting show the merits of the proposed method. With fusion of information from both ears an average identification rate 98.72% is achieved.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"1 1","pages":"000267-000271"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89113643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}