By Topic

Signal Processing and Multimedia Applications (SIGMAP), Proceedings of the 2010 International Conference on

Date 26-28 July 2010

Filter Results

Displaying Results 1 - 25 of 65
  • [Front cover]

    Page(s): c1
    Save to Project icon | PDF file iconPDF (901 KB)  
    Freely Available from IEEE
  • [Title page]

    Page(s): I
    Save to Project icon | PDF file iconPDF (41 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): II
    Save to Project icon | PDF file iconPDF (22 KB)  
    Freely Available from IEEE
  • Brief contents

    Page(s): III
    Save to Project icon | PDF file iconPDF (25 KB)  
    Freely Available from IEEE
  • Invited speakers

    Page(s): IV
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (28 KB)  

    Provides an abstract for each of the invited presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Organizing and Steering Committees

    Page(s): V
    Save to Project icon | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • Program committee

    Page(s): VI
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (60 KB)  

    Provides a listing of current committee members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selected papers book

    Page(s): VII
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (24 KB)  

    A number of selected papers presented at SIGMAP 2010 will be published by Springer-Verlag in a CCIS Series book. This selection will be done by the Conference Co-chairs and Program Co-chairs, among the papers actually presented at the conference, based on a rigorous review by the ICETE 2010 Program Committee members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Foreword

    Page(s): IX
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (38 KB)  

    We warmly welcome you to SIGMAP 2010 - the International Conference on Signal Processing and Multimedia Applications, which is held, this year, in Piraeus-Athens, Greece, hosted by the University of Piraeus. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Foreword

    Page(s): X
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (26 KB)  

    A successful conference involves more than paper presentations; it is also a meeting place, where ideas about new research projects and other ventures are discussed and debated. Therefore, a social event including a conference diner/banquet has been planned for the evening of July 27 in order to promote this kind of social networking. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contents

    Page(s): XI
    Save to Project icon | PDF file iconPDF (60 KB)  
    Freely Available from IEEE
  • Contents

    Page(s): XII
    Save to Project icon | PDF file iconPDF (57 KB)  
    Freely Available from IEEE
  • Contents

    Page(s): XIII
    Save to Project icon | Request Permissions | PDF file iconPDF (55 KB)  
    Freely Available from IEEE
  • Invited speakers

    Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (10 KB)  

    Provides an abstract for each of the invited presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote speakers

    Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (10 KB)  

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nanonetworks - A new frontier in communications

    Page(s): IS-5
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (554 KB)  

    Nanotechnology is enabling the development of devices in a scale ranging from one to a few one hundred nanometers. Nanonetworks, i.e., the interconnection of nano-scale devices, are expected to expand the capabilities of single nano-machines by allowing them to cooperate and share information. Traditional communication technologies are not directly suitable for nanonetworks mainly due to the size and power consumption of existing transmitters, receivers and additional processing components. All these define a new communication paradigm that demands novel solutions such as nano-transceivers, channel models for the nano-scale, and protocols and architectures for nanonetworks. In this talk, first the state-of-the-art in nano-machines, including architectural aspects, expected features of future nano-machines, and current developments are presented for a better understanding of the nanonetwork scenarios. Moreover, nanonetworks features and components are explained and compared with traditional communication networks. Novel nano-antennas based on nano-materials as well as the terahertz band are investigated for electromagnetic communication in nanonetworks. Furthermore, molecular communication mechanisms are presented for short-range networking based on ion signaling and molecular motors, for medium-range networking based on flagellated bacteria and nanorods, as well as for long-range networking based on pheromones and capillaries. Finally, open research challenges such as the development of network components, molecular communication theory, and new architectures and protocols, which need to be solved in order to pave the way for the development and deployment of nanonetworks within the next couple of decades are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From nature to methods and back to nature

    Page(s): IS-7
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (565 KB)  

    A fundamental challenge in today's arena of complex systems is the design and development of accurate and robust signal processing methods. These methods should be capable to adapt quickly to unexpected changes in the data and operate under minimal model assumptions. Systems in Nature also do signal processing and often do it optimally. Therefore, it makes much sense to understand what Nature does and try to mimic it and do even better. In return, the results of better signal processing methods may lead to new advancements in science and technology and in understanding Nature. In this presentation methods for signal processing that borrow concepts and principles found in Nature are addressed including ant optimization, swarm intelligence and genetic algorithms. However, the emphasis of the presentation is on Monte Carlo-based methods, and in particular, methods related to particle filtering, cost-reference particle filtering, and population Monte Carlo. In the past decade and a half, Monte Carlo-based methods have gained considerable popularity in dealing with nonlinear and/or non-Gaussian systems. The three groups of methods share the feature that they explore spaces of unknowns using particles and weights (costs) assigned to the particles. In most versions of these methods, particles move independently and in accordance with the dynamics of the assumed model of the states. Interactions among particles only occur through the process of resampling rather than through local interactions as is common in physical and biological systems. Such interactions can improve the performance of the methods and can allow for coping with more challenging problems with better efficiency and accuracy. We show how we apply these methods to problems in engineering, economics, and biology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaotic quantum cryptography - The ultimate for network security

    Page(s): IS-9
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (554 KB)  

    As the sophistication of intruders' increases, so does the incidents of information integrity breaches and network attacks. In response, very complex cryptographic processes have started being employed, such as chaos theory and quantum theory, in an effort to create the "holy grail" of cryptographic systems and network security. Quantum theory defines the non-classical qubit, which is the superposition of quantum states having no classical analog. It is also based on the "no cloning" and "no copying" theorem and on the Heisenberg's uncertainty. The quanto-mechanical properties of photons and the quantum mechanics provide a superb platform for communications security and particularly in secure optical communication networks, known as quantum cryptography and quantum networks, respectively. Chaos is based on the particular behavior of certain non-linear functions, which for a minute change of parameters produce a huge and unstable output, known as the "chaotic regime". However, this chaos can be reproducible, which makes it attractive to secure communications. Thus, the combined Chaos and Quantum theories play a synergistic role in the quest for the "holy grail" in communications security. In this talk we explain with simple examples quantum cryptography and protocols, as well as chaos and chaotic processes. We also describe the synergy of chaos and quantum theories as well as the increased efficiency and speed of the quantum key establishment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information securitY - The SCAN - Secure processor with crypto-biometrics capabilities

    Page(s): IS-11
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (554 KB) |  | HTML iconHTML  

    Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property protection. Techniques like obfuscation attempts to transform the code into a form that is harder to reverse engineer. Tamper-proofing causes a program to malfunction when it detects that it has been modified. Software watermarking embeds copyright notice in the software code to allow the owners of the software to assert their intellectual property rights. The software techniques discourage software theft, can trace piracy, prove ownership, but cannot prevent copying itself. Thus, software based security firewalls and encryption is not completely safe from determined hackers. This necessitates the need for information security at the hardware level, where secure processors assume importance. In this talk the SCAN-Secure Processor is presented as a possible solution to these important issues mentioned above. The SCAN-SP is a modified Sparc V8 processor architecture with a new instruction set to handle image compression, encryption, information hiding and biometric authentication. A SCAN based methodology for encryption and decryption of 32 bit instructions and data and a Local-Global graph based methodology for biometric authentication is presented. The modules to support the new instructions are synthesized in reconfigurable logic and the results of FPGA synthesis are presented. The ultimate goal of the presented work is the tradeoffs that exists between speed of execution and security of the processor. Designing a faster processor is not the goal of the presented work, rather exploring the architecture to provide security is of prime importance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia communications

    Page(s): 1
    Save to Project icon | PDF file iconPDF (10 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full paper

    Page(s): 1
    Save to Project icon | PDF file iconPDF (9 KB)  
    Freely Available from IEEE
  • Arithmetic coding for joint source-channel coding

    Page(s): 5 - 15
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (145 KB) |  | HTML iconHTML  

    This paper presents a joint source-channel coding technique involving arithmetic coding. The work is based on an existing maximum a posteriori (MAP) estimation approach in which a forbidden symbol is introduced into the arithmetic coder to improve error-correction performance. Three improvements to the system are presented: the placement of the forbidden symbol is modified to decrease the delay from the introduction of an error to the detection of the error; the arithmetic decoder is modified for quicker detection by the introduction of a look-ahead technique; and the calculation of the MAP metric is modified for faster error detection. Experimental results show an improvement of up to 0.4 dB for soft decoding and 0.6 dB for hard decoding. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Short papers

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (9 KB)  
    Freely Available from IEEE
  • An experimental analysis on iterative block ciphers and their effects on VoIP under different coding schemes

    Page(s): 17 - 25
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (228 KB) |  | HTML iconHTML  

    IP telephony (IPTel) refers to the technology to transport real-time media over an IP network. This technology is considered as the key to providing advanced communication for end users at an affordable price whilst also assuring significant cost savings for the Internet Telephony Service Providers (ITSP). As with adoption of any new technology, utilizing VoIP is not without its risks. Digitizing voice that can be routed through hostile environments such as packet switched networks makes VoIP vulnerable to all of the risks of an IP network including viruses, Denial of Service (DOS) attacks and conversation eavesdropping. This paper focuses on the effects of iterative block ciphers on VoIP traffic in terms of average end-to-end delay and packet loss rates. We have tested the majority of voice codecs as well as all the variable payload sizes they can support. Finally, the simulations have been carried out by using the NS-2 network simulator. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • KASKADA - Multimedia processing platform architecture

    Page(s): 26 - 31
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (219 KB) |  | HTML iconHTML  

    The architecture of Context Analysis of the Camera Data Streams for Alert Defining Applications platform (Polish abbreviation: KASKADA, i.e. waterfall), a part of MAYDAY EURO 2012 project, is provided. A new multilayer processing model for multimedia streams is proposed. The model layers: services, computational tasks and processes are described. The composition of complex services with simple service scenario descriptions is presented. An example scenario and its realization in the environment is provided. The object-oriented domain analysis, component and deployment diagrams with their relations to the model are proposed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.