By Topic

2011 Third International Conference on Multimedia Information Networking and Security

4-6 Nov. 2011

Filter Results

Displaying Results 1 - 25 of 155
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (374 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • Greetings from the General Chairs

    Publication Year: 2011, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (161 KB) | HTML iconHTML
    Freely Available from IEEE
  • Greetings from the Technical Programming Committee Chairs

    Publication Year: 2011, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (164 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s):xviii - xxii
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Hardware Design of Fatigue Detection System Based on PERCLOS

    Publication Year: 2011, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    In order to resolve crashed accidents caused by fatigue or drowsiness various fatigue detecting algorithms are investigated. Aiming at the needs of large data, high transfer rate and complex operation, in this paper, we design a fatigue detection algorithm based on PERCLOS, moreover, design AVT Guppy F-080 C camera and 1394 cards as the core hardware system. The system can meet the real-time video... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of Range-Controllable Intelligent Digital Sensor Based on FPGA

    Publication Year: 2011, Page(s):6 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    The aircraft would be under great shock and overload when flying. Affected by these forces, the aircraft show phenomenon of elastic vibration inevitably. In order to test the influence of elastic vibration to the aircraft structure, vibration sensors are generally used to obtain the vibration signals, in order to analyze whether the elastic vibration under a reasonable control range of aircraft. B... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Camshift Tracking Algorithm Based on Silhouette Moving Detection

    Publication Year: 2011, Page(s):11 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3811 KB) | HTML iconHTML

    Camshift is an efficient object tracking algorithm using color probability distribution. But it's easy to be interfered by the similar color objects in the background. So we bring in the motion characteristics extracted by the motion template method, and then make an improved Camshift algorithm. Experiments show that the improved algorithm has more robustness in dealing with color interference and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Softmax Discriminant Classifier

    Publication Year: 2011, Page(s):16 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (474 KB) | HTML iconHTML

    A simple but effective classifier, which is called soft max discriminant classifier or SDC for short, is presented. Based on the soft max discriminant function, SDC assigns the label information to a new testing sample by nonlinear transformation of the distance between the testing sample and training samples. Experimental results on some well-known data sets demonstrate the feasibility and effect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Class of Generalized Morphological Filters

    Publication Year: 2011, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1475 KB) | HTML iconHTML

    Mathematical morphological filter is a class of nonlinear filters. In order to improve the performance of morphological filters, a type of new generalized morphological filters is proposed in this paper. The proposed filters inherit some important properties of the classic morphological filters, such as the translation invariance, incresingness, duality, and so on. Compared with the traditional mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Single Image Super-Resolution via Sparse Representation in Gradient Domain

    Publication Year: 2011, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Image super-resolution (SR) reconstruction is one of the most popular research topics in image processing for decades. This paper presents a novel approach to deal with single image SR problem. We search a mapping between a pair of low-resolution and high-resolution image patch in gradient domain by learning a generic image database and the input image itself. Given low-resolution image, the high-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Color Components' Computing on Different Color Spaces and the Using for Image Segmentation

    Publication Year: 2011, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4824 KB) | HTML iconHTML

    The image segmentation is an important using in the computer image processing, and there are many different processing methods. In this paper, authors proposed a new method: the color components' computing on the different color spaces. Based the method and combine with other image segmentation methods, try to use it and get one result. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image-Based Shadow Removal via Illumination Chromaticity Estimation

    Publication Year: 2011, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    Removing shadows in color images is an important research problem in computer vision. In this paper, we propose a novel shadow removal approach, which effectively removes shadows from textured surfaces, yielding high quality shadow-free images. Our approach aims at calculating scale factors to cancel the effect of shadows. Based on the regional gray edge hypothesis, which assumes the average of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Improved Depth Estimation Algorithm Based on Gradient Feature for Preserving Consistency among Views

    Publication Year: 2011, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB) | HTML iconHTML

    In this paper we introduce a more reliable depth estimation algorithm, which is effective in improving the depth maps. With the commercial development of three-dimensional television (3DTV), the corresponding three-dimensional productions are becoming more popular. Especially, the depth estimation is one of the key technologies of multi-view video (MVV) and free viewpoint video (FVV) systems, but ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective Pretreatment in Identification of Motion-Blur Direction

    Publication Year: 2011, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (639 KB) | HTML iconHTML

    A motion-blur image has special blurred information which can be dealt to estimate its blurred direction. There are several methods to identify the direction such as based on directional derivation and weighted average [1]. The blurred image can't recognized smoothly and timely in the area of industrial machine vision. This paper provides an effective pretreatment method to indentify the motion-bl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Improved Gaussian Mixture Model Based on Motion Estimation

    Publication Year: 2011, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    To avoid the disadvantage of the globally identical learning rate in classical Gaussian Mixture Model (GMM), GMM is improved in this paper. The object movements are predicted by Kalman filter, and the learning rate is changed to a small value in the areas where the objects appear, which ensures the relative invariance of the background and make moving objects become clearer quickly. After the obje... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structure Information and Temporal Ordinal Measure Fused Video Copy Detection

    Publication Year: 2011, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    This paper propose a video copy detection method based on structure information and temporal ordinal measure. Firstly each frame is divided into a grid and calculate the difference of the mean of block brightness, then we treat these values as the structure information of each frame, whereas, along the time series these values are sorted in an ordinal ranking sequence, we put them as the temporal ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduce Pruning Cost to Accelerate Multimedia kNN Search over MBRs Based Index Structures

    Publication Year: 2011, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    MBR (Minimum Bounding Rectangle) has been widely used to represent multimedia data objects for multimedia indexing techniques. In kNN search, MINDIST and MINMAXDIST was the most popular pruning metrics employed by MBR based index structures. However, with the increase of dimensionality, the computation costs of above two metrics are expensive, and the involved distance computations may become the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of Soft Tissue Deformation in Virtual Surgery Based on Physics Engine

    Publication Year: 2011, Page(s):60 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    In this paper, the simulation of soft tissue deformation in real-time virtual surgical systems is introduced and analyzed and physics engine is lead to solve the contradiction between the precision of simulation and real time in computing of soft tissue deformation. A real-time soft tissue deformation module based on the physics engine PhysX is designed in this paper. In this paper, a tetrahedral ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Machine Learning in Adversarial Game Using Flight Chess

    Publication Year: 2011, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    Game playing is a perfect domain of the study of machine learning for its simplicity that allows the researchers to focus on the learning problems themselves and ignore marginal factors. Many learning techniques derived from games have been applied successfully in other learning problems. In this paper, we introduce a Minimax Recurrence Learning algorithm to reinforce the intelligence of a game ag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Super Resolution Technique Based on Wavelet Decomposition Implemented on OMAP3530 Platform

    Publication Year: 2011, Page(s):69 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1166 KB) | HTML iconHTML

    In the real world, there are a variety of applications requiring high resolution (HR) images in remote sensing, medicine, military information acquisition, multimedia, etc. Because of the high cost and physical limitations of the acquisition hardware, the low resolution (LR) images are used frequently. So, super resolution (SR) restoration is an emerged solution permitting to form one or a set of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum Secure Direct Communication Based on Secret Initial States of EPR Pairs

    Publication Year: 2011, Page(s):73 - 76
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    This paper proposes the protocol of Quantum Secure Direct Communization (QSDC) based on the secret initial Bell states which are shared by two legitimate communicators. Then, we analyze the security of the protocol against the intercept-and-resend attack and individual attack. It is unnecessary for the scheme to make odd particles especially which is used for detection of eavesdropping. Instead, i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.