By Topic

Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on

Date 16-18 Oct. 2013

Filter Results

Displaying Results 1 - 25 of 171
  • [Front cover]

    Publication Year: 2013 , Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (1314 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (205 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (364 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): v - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (179 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2013 , Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (197 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2013 , Page(s): xix - xx
    Save to Project icon | Request Permissions | PDF file iconPDF (203 KB)  
    Freely Available from IEEE
  • Program Committee and Reviewers

    Publication Year: 2013 , Page(s): xxi - xxv
    Save to Project icon | Request Permissions | PDF file iconPDF (274 KB)  
    Freely Available from IEEE
  • Editors

    Publication Year: 2013 , Page(s): xxvi
    Save to Project icon | Request Permissions | PDF file iconPDF (133 KB)  
    Freely Available from IEEE
  • Design of High Gain Planar Dipole Array Antenna for WLAN Application

    Publication Year: 2013 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (807 KB) |  | HTML iconHTML  

    This paper presents a new design of planar dipole array antenna (PDAA). Radiated patches are etched on the metallic layer of a double-sided printed circuit board (FR4) to form the PDAA. The two symmetric flags with trapezoid patch are designed on both side of the print circuit board to form the basic dipole element. IE3D software is used to design PDAA. Better parameters are selected to manufacture the proposed array antenna. The fabricated 4×8-element planar dipole array antenna can be operated at 5.2/5.8 GHz successfully. With suitable size parameters of the dipole element, PDAA is fabricated. From the measured results, the wide bandwidth about 1.97GHz is obtained. The peak gain of the fabricated PDAA with reflector is 15.55dBi at 5.2GHz and 17.53dBi at 5.8GHz. This high gain planar dipole array antenna can be used in WLAN frequency band. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction-Based Reversible Data Hiding for Medical Images with Genetic Algorithms

    Publication Year: 2013 , Page(s): 5 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    Reversible data hiding is a newly developed topic in watermarking researches. At the encoder, it relies on slightly modifying the characteristics of original images for embedding secret information. At the decoder, original image and secret information can be separated from marked image with slight amount of overhead. In this paper, we propose the scheme by predicting the difference between output and input images for making reversible data hiding possible. By carefully selecting prediction coefficients, which are optimized by genetic algorithm, the output image quality can be preserved, while the enhanced amount of embedding capacity can be observed. We apply the algorithm to medical images for protecting patients' cases from possible human errors incurred. With the training of genetic algorithm, simulation results with our algorithm have demonstrated the enhanced embedding capacity, while keeping the output image quality. Optimized prediction coefficients with genetic algorithm lead to better performances with our scheme. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiments on Genetic Programming Based Image Artefact Detection

    Publication Year: 2013 , Page(s): 9 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (325 KB) |  | HTML iconHTML  

    One of the interesting image processing applications is to detect and/or restore a damaged image. Because image damage would vary in different ways, a straightforward method is to use a program to represent the damage. Then, the type of artefact can be searched by applying programs to the original image and comparing with the target image. The run-time environment of a program is the structure of the execution resources. In this paper, we define a cellular automaton based structure as the run-time environment and use genetic programming (GP) to find the proper program for the given image artefacts. The results show that an effective GP engine requires careful configuration. The important lesson learned from the experiments is also discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction-Based Reversible Data Hiding with Content Characteristics

    Publication Year: 2013 , Page(s): 13 - 16
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (867 KB) |  | HTML iconHTML  

    Reversible data hiding is one of the popular topics in watermarking researches, and it belongs to the branch of digital rights management (DRM) applications. Similar to conventional watermarking techniques, for reversible data hiding, at the encoder, secret information can be embedded into original images, and the marked image can be obtained. Different from conventional watermarking, due to the term 'reversible', it implies that at the decoder, both the original image and embedded secret should be perfectly separated from marked image. It requires keeping the reversibility of proposed algorithm, while looking for good image quality and large amount of secret for embedding. With the prediction-based algorithm, output image can be predicted, and differences between original and predicted images can be altered to make reversible data hiding possible. We also utilize inherent characteristics of original images for reaching better performances. Simulation results reveal that with our algorithm, comparable or better performances can be observed due to the characteristics from different images. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of Theme Park Queuing System by Using Arena

    Publication Year: 2013 , Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (549 KB) |  | HTML iconHTML  

    Queuing in theme parks is a significant factor decreasing customer satisfaction. Visitors spend much time standing and waiting for the rides. If the visitors can register in a virtual queue for the rides while engaging some other activities, the wasted time will be reduced and the customer satisfaction level increases. This study is first to design a queuing system for theme parks that visitors can register for favorite rides into virtual queues. A simulation tool Arena is used for assessing the improvement and satisfaction level. Further implementation of applying near field communication (NFC) technology and wireless communication will be carried out in the future study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lossless Data Hiding with Quadtree Decomposition

    Publication Year: 2013 , Page(s): 21 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1118 KB) |  | HTML iconHTML  

    In this paper, we present the loss less data hiding algorithm based on the concept of quad tree decomposition. With the slight changes of original images, by altering the shape of histogram, or by modifying the difference value between two consecutive pixels, loss less data hiding can be achieved at the encoder. Correspondingly, at the receiver, both the original image and the embedded data should be perfectly recovered. In this paper, we focus on utilizing inherent characteristics of original image based on quad tree decomposition, where smooth regions are partitioned with larger square blocks, and active regions are composed of smaller square blocks. With the different characteristics, different amounts can be embedded into blocks with different sizes in quad tree decomposition, in order to look for better quality of marked images both subjectively and objectively. Simulation results with proposed loss less data hiding algorithm based on quad tree decomposition have pointed out the better performances over relating schemes in literature. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Wavelet-Based Image Watermarking Scheme for Stereoscopic Video Frames

    Publication Year: 2013 , Page(s): 25 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1473 KB) |  | HTML iconHTML  

    In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. On the other hand, a pirate can only clip half of a frame to remove watermarks. In the circumstances, it should be taken into consideration to resist collusion attacks and clip attacks while developing a watermarking scheme for stereoscopic videos. Thus, the proposed watermarking method embed two watermarks into the two images of a stereoscopic video frame, respectively. To resist collusion attacks, the proposed scheme identify similar portions of the two images containing in a stereoscopic video frame. Then, identical modification will be applied on the same positions of the similar portions. As shown in experimental results, test images with watermarks embedded are still have high quality. Although two watermarks may overlap with each other after the proposed scheme, they still have high embedding effectiveness. Moreover, watermark embedding method adopted in the proposed watermarking scheme has been well-studied. It has been indicated that the embedded watermarks are still detectable after common image processing operations. Thus, the proposed scheme is suitable for copyright protection of stereoscopic videos. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Multi-thresholding Image Denoising Method

    Publication Year: 2013 , Page(s): 29 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (631 KB) |  | HTML iconHTML  

    In this paper, a new adaptive multi-thretholding image denoising method based on the decomposition order is presented, which is built upon the ideas of Embedded Zero tree Wavelet (EZW) encoder and separate character of signals and noises. This method is not increase in operation amounts but excellent in image denoising results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dual Watermarking for Image Tamper Detection and Self-Recovery

    Publication Year: 2013 , Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    Digital image processing technology presents new challenges for the security of the image information, which makes image authentication as a problem to be addressed. Digital watermarking plays an important role in multimedia information security. This paper proposed a dual watermarking method to do tamper location and self-recovery, which utilizes self-embedding technology to hide eigenface into the low frequence sub band LL to restore the tamper region. Experimental results show the availability of the proposed algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thermal Analysis of Power MMICs Based on Computerization

    Publication Year: 2013 , Page(s): 37 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (384 KB) |  | HTML iconHTML  

    A novel modeling approach and a computerized analysis were introduced to perform analysis for MMIC FET's, aiming at understanding the heat conduction process of the MMICs and providing thermal information for MMIC design. Experiments show the efficiency and effectiveness of the proposed method. The computer's result accuracy can be achieved as 85 percents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-Stage Verification Based on Watermarking for Electronic Passport

    Publication Year: 2013 , Page(s): 41 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (320 KB) |  | HTML iconHTML  

    This paper provides a novel two-stage verification scheme based on watermarking for electronic passport. The watermarking includes the multimodal biometric feature of the passport owner and the parity check codes of multimodal feature. The first part is taken as the template to do field certification which confirms whether the person is the true passport holder. The parity check codes verify the integrity of the passport. ORL face database and PolyU palm print database are selected as the experimental subjects. Experimental results show the availability and anslysis the impact of different embedding capacity for the multimodal biometric recognition. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel Up-Sampling Based Watermarking Multiple Description Coding Frame

    Publication Year: 2013 , Page(s): 45 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (615 KB) |  | HTML iconHTML  

    A novel watermarking scheme is proposed for up-sampling based multiple description coding frame in this paper. Secret information is embedded in the DWT image. Up-sampling algorithm is applied on transformed image to introduce some redundancy between different channels. Good performance of the new frame to against noise and to resist the compression attacks is shown in the experimental results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fall Detection System Based on Human Body Silhouette

    Publication Year: 2013 , Page(s): 49 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (763 KB) |  | HTML iconHTML  

    Elderly care system is one among the most popular research topics in biomedical health-care system design as aging has emerged in different countries. We present a biologically-motivated system to detect unexpected falls in real-time video sequences. The system employs event-based temporal difference image between video sequences as input and extracts static features like aspect ratio and inclination angle of the human body silhouette in unobserved video, which is adopted to improve privacy protection. This method has less computation than those methods using motion dynamic features. Meantime, since time difference is an important factor to distinguish fall incident and lying down event, the critical time difference is obtained from the experiments and verified by statistical results. With the K-Nearest Neighbor (KNN) classifier and the critical time difference, this system presents an accurate approach to detect fall incidents. 86.11% average recognition rate is achieved in the experiment. Compared with other methods of motion dynamic features categorization, our proposed system shows great computational savings, and it is an ideal candidate for hardware implementation with event-based circuits. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Creative 3D Game Platform Interacted with Laser Beam

    Publication Year: 2013 , Page(s): 53 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (287 KB) |  | HTML iconHTML  

    In this study, a 3D display and interactive laser technology are integrated to develop an interface system with virtual touch and to build up a laser interactive 3D game platform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Wearable Bio-potential Monitor System with Capacitive Coupling Electrode

    Publication Year: 2013 , Page(s): 56 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (394 KB) |  | HTML iconHTML  

    Electrocardiography (ECG) is a kind of electrical activities of the heart measured along the skin, and is also an important tool to diagnosis heart decease. In clinical, the conventional ECG electrode is generally used for measuring ECG signal. However, it requires skin preparation and conductive gels to reduce the impedance of the skin-electrode interface. These preparation procedures easily cause the inconvenience and discomfort for the user. Moreover, it also easily encounters the problem of conductive gels drying for long-term ECG measurement. In this study, a capacitive coupling electrode was proposed to measure ECG without contacting the patient body of the user directly. By using the proposed capacitive coupling electrode, ECG can be measured without any preparation and conductive gels. Finally, the electrical characteristic was validated, and ECG measurement was also tested in this study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Model-Based Prosody Coder for Mandarin Speech

    Publication Year: 2013 , Page(s): 60 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    In this paper, a novel parametric prosody coding approach for Mandarin speech is proposed. It employs a hierarchical prosodic model (HPM) as a prosody generating model in the encoder to analyze the speech prosody of the input utterance to obtain a parametric representation of four prosodic-acoustic features of syllable pitch contour, syllable duration, syllable energy level, and syllable-juncture pause duration for encoding. In the decoder, the four prosodic-acoustic features are reconstructed by a synthesis operation using the decoded HPM parameters. The reconstructed prosodic features are lastly used in an HMM-based speech synthesizer to help to generate the reconstructed speech. Experimental results show that the reconstructed speech has good quality at low data rates of 114.9 bits/s for a speaker-dependent task. An informal listening test confirmed decoded speeches sounded very fluently. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.