# IEEE Signal Processing Letters

## Filter Results

Displaying Results 1 - 23 of 23
• ### [Front cover]

Publication Year: 2012, Page(s): C1
| |PDF (167 KB)
• ### IEEE Signal Processing Letters publication information

Publication Year: 2012, Page(s): C2
| |PDF (127 KB)

Publication Year: 2012, Page(s):321 - 322
| |PDF (168 KB)
• ### A letter or a conference paper? Conundrum resolved

Publication Year: 2012, Page(s): 323
| |PDF (26 KB) | HTML

Publication Year: 2012, Page(s):324 - 327
| |PDF (870 KB) | HTML

In this letter the discrete rate maximization problem is investigated for FBMC/OQAM. The analysis reveals that if there is crosstalk certain bit allocations violate the power constraints. Aiming at ensuring the feasibility along with alleviating the complexity we have devised a novel iterative algorithm, which always converges. Simulation-based results show that the proposed algorithm performs clo... View full abstract»

• ### Video Hashing Algorithm With Weighted Matching Based on Visual Saliency

Publication Year: 2012, Page(s):328 - 331
Cited by:  Papers (10)
| |PDF (1531 KB) | HTML

In this letter, a novel video hashing algorithm is proposed, in which the weighted hash matching is defined in video hashing for the first time. In the proposed algorithm, the video hash is generated based on the ordinal feature derived from the temporally informative representation image (TIRI). At the same time the representative saliency map (RSM) is constructed by the visual saliency maps in v... View full abstract»

• ### Performance Analysis of Two-Way AF Relaying Systems Over Cascaded Nakagami- $m$ Fading Channels

Publication Year: 2012, Page(s):332 - 335
Cited by:  Papers (20)
| |PDF (835 KB) | HTML

In this letter, we investigate the error rate performance of two-way amplify-and-forward (AF) relaying communication system over independently but not necessarily identically distributed (i.n.i.d.) cascaded Nakagami- fading channels. We have derived a closed-form expressions of cumulative distribution function (CDF) and moment generating function (MGF) for considering system. By using these expres... View full abstract»

• ### Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting

Publication Year: 2012, Page(s):336 - 339
Cited by:  Papers (16)
| |PDF (813 KB) | HTML

In this letter, the authors point out that the readjusting phase of edge adaptive image steganography based on LSB matching revisited introduces a pulse distortion to the long exponential tail of the histogram of the absolute difference of the pixel pairs. Making use of this observation, a targeted steganalytic method based on B-Spline fitting is proposed. Experimental results show that the propos... View full abstract»

• ### On the Exploitation of the Redundant Energy in UW-OFDM: LMMSE Versus Sphere Detection

Publication Year: 2012, Page(s):340 - 343
Cited by:  Papers (6)
| |PDF (866 KB) | HTML

Unique word orthogonal frequency division multiplexing (UW-OFDM) inherently introduces a complex number Reed Solomon (RS) code. Originally, the code generator matrix of systematic coded UW-OFDM had been designed rather intuitively by minimizing the mean redundant energy. In this work we justify this approach by applying a cost function that incorporates the overall transceiver chain including a li... View full abstract»

• ### New Transforms Tightly Bounded by DCT and KLT

Publication Year: 2012, Page(s):344 - 347
Cited by:  Papers (10)
| |PDF (1262 KB) | HTML

It is well known that the discrete cosine transform (DCT) and Karhunen-Loève transform (KLT) are two good representatives in image and video coding: the first can be implemented very efficiently while the second offers the best R-D coding performance. In this work, we attempt to design some new transforms with two goals: i) approaching to the KLT's R-D performance and ii) maintaining the i... View full abstract»

• ### Fast Radix-3 Algorithm for the Generalized Discrete Hartley Transform of Type II

Publication Year: 2012, Page(s):348 - 351
Cited by:  Papers (3)
| |PDF (1047 KB) | HTML

We present a new fast radix-3 algorithm for the computation of the length-N generalized discrete Hartley transform of type-II (GDHT-II), where N = 3m, m ≥ 2. Then we apply this algorithm to the direct computation of length-N GDHT-II coefficients when given three adjacent length-N/3 GDHT-II coefficients. The computational complexity of the propos... View full abstract»

• ### Time-Frequency Analysis via Ramanujan Sums

Publication Year: 2012, Page(s):352 - 355
Cited by:  Papers (16)
| |PDF (630 KB) | HTML

Research in signal processing shows that a variety of transforms have been introduced to map the data from the original space into the feature space, in order to efficiently analyze a signal. These techniques differ in their basis functions, that is used for projecting the signal into a higher dimensional space. One of the widely used schemes for quasi-stationary and non-stationary signals is the ... View full abstract»

• ### A Stochastic System for Large Network Growth

Publication Year: 2012, Page(s):356 - 359
| |PDF (751 KB) | HTML

This letter proposes a new model for preferential attachment in dynamic directed networks. This model consists of a linear time-invariant system that uses past observations to predict future attachment rates, and an innovation noise process that induces growth on vertices that previously had no attachments. Analyzing a large citation network in this context, we show that the proposed model fits th... View full abstract»

• ### Modeling of Multipath Environment Using Copulas for Particle Filtering Based GPS Navigation

Publication Year: 2012, Page(s):360 - 363
Cited by:  Papers (2)
| |PDF (1080 KB) | HTML

Today in GPS navigation, an accuracy from 5 to 10 m can be achieved, but performance can be strongly degraded in a multipath environment. Multipath can introduce large errors when measuring the distance between the satellites and the GPS receiver. They are commonly modeled by additive-measurement noise variance jumps affecting GPS measurements if there is a direct path between the satellites and t... View full abstract»

• ### A Block Fixed Point Continuation Algorithm for Block-Sparse Reconstruction

Publication Year: 2012, Page(s):364 - 367
Cited by:  Papers (13)
| |PDF (1137 KB) | HTML

Block-sparse reconstruction, which arises from the reconstruction of block-sparse signals in structured compressed sensing, is generally considered difficult to solve due to the mixed-norm structure. In this letter, we propose an algorithm for reconstructing block-sparse signals, that is an extension of fixed point continuation in block-wise case by incorporating block coordinate descent technique... View full abstract»

• ### A Leakage-Based MMSE Beamforming Design for a MIMO Interference Channel

Publication Year: 2012, Page(s):368 - 371
Cited by:  Papers (40)
| |PDF (851 KB) | HTML

We propose a low complexity design of the linear transmit filters for a MIMO interference channel. This design is based on a minimum mean squared error (MMSE) approach incorporating the signal and the interference leakage for each transmitter. Unlike the previous methods, it allows a closed-form expression of the regularization factor for the MMSE transmit filter. Hence, it requires a lower comput... View full abstract»

• ### Performance of Transmit Antenna Selection Physical Layer Security Schemes

Publication Year: 2012, Page(s):372 - 375
Cited by:  Papers (114)
| |PDF (1184 KB) | HTML

We analyze the physical layer (PHY) security of a communication scheme consisting of a multiple antenna transmitter with a single radio frequency (RF) chain using transmit antenna selection (TAS) and a single antenna receiver, in the presence of a sophisticated multiple antenna eavesdropper. We develop closed-form expressions for the analysis of the secrecy outage probability, and we show that the... View full abstract»

• ### IEEE Signal Processing Letters information for authors

Publication Year: 2012, Page(s):376 - 377
| |PDF (142 KB)
• ### Signal Processing Society Membership Application

Publication Year: 2012, Page(s): 378
| |PDF (807 KB)
• ### Special Issue on Intelligent Video Surveillance for Public Security & Personal Privacy

Publication Year: 2012, Page(s): 379
| |PDF (721 KB)
• ### Special Issue on Privacy and Trust Management in Cloud and Distributed Systems

Publication Year: 2012, Page(s): 380
| |PDF (142 KB)
• ### IEEE Signal Processing Society Information

Publication Year: 2012, Page(s): C3
| |PDF (33 KB)
• ### [Blank page]

Publication Year: 2012, Page(s): C4
| |PDF (5 KB)

## Aims & Scope

The IEEE Signal Processing Letters is a monthly, archival publication designed to provide rapid dissemination of original, cutting-edge ideas and timely, significant contributions in signal, image, speech, language and audio processing.

Full Aims & Scope

## Meet Our Editors

Editor-in-Chief
James E. Fowler
Dept Electrical & Computer Engineering
Associate Director
Distributed Analytics and Security Institute
Mississippi State University
Mississippi State, MS 39762 USA
fowler@ece.msstate.edu