By Topic

IEEE Signal Processing Letters

Issue 6 • Date June 2012

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Letters publication information

    Publication Year: 2012, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):321 - 322
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • A letter or a conference paper? Conundrum resolved

    Publication Year: 2012, Page(s): 323
    Request permission for commercial reuse | PDF file iconPDF (26 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Discrete Bit Loading Algorithm for FBMC/OQAM

    Publication Year: 2012, Page(s):324 - 327
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (870 KB) | HTML iconHTML

    In this letter the discrete rate maximization problem is investigated for FBMC/OQAM. The analysis reveals that if there is crosstalk certain bit allocations violate the power constraints. Aiming at ensuring the feasibility along with alleviating the complexity we have devised a novel iterative algorithm, which always converges. Simulation-based results show that the proposed algorithm performs clo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video Hashing Algorithm With Weighted Matching Based on Visual Saliency

    Publication Year: 2012, Page(s):328 - 331
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1531 KB) | HTML iconHTML

    In this letter, a novel video hashing algorithm is proposed, in which the weighted hash matching is defined in video hashing for the first time. In the proposed algorithm, the video hash is generated based on the ordinal feature derived from the temporally informative representation image (TIRI). At the same time the representative saliency map (RSM) is constructed by the visual saliency maps in v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Two-Way AF Relaying Systems Over Cascaded Nakagami- m Fading Channels

    Publication Year: 2012, Page(s):332 - 335
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (835 KB) | HTML iconHTML

    In this letter, we investigate the error rate performance of two-way amplify-and-forward (AF) relaying communication system over independently but not necessarily identically distributed (i.n.i.d.) cascaded Nakagami- fading channels. We have derived a closed-form expressions of cumulative distribution function (CDF) and moment generating function (MGF) for considering system. By using these expres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting

    Publication Year: 2012, Page(s):336 - 339
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (813 KB) | HTML iconHTML

    In this letter, the authors point out that the readjusting phase of edge adaptive image steganography based on LSB matching revisited introduces a pulse distortion to the long exponential tail of the histogram of the absolute difference of the pixel pairs. Making use of this observation, a targeted steganalytic method based on B-Spline fitting is proposed. Experimental results show that the propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Exploitation of the Redundant Energy in UW-OFDM: LMMSE Versus Sphere Detection

    Publication Year: 2012, Page(s):340 - 343
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (866 KB) | HTML iconHTML

    Unique word orthogonal frequency division multiplexing (UW-OFDM) inherently introduces a complex number Reed Solomon (RS) code. Originally, the code generator matrix of systematic coded UW-OFDM had been designed rather intuitively by minimizing the mean redundant energy. In this work we justify this approach by applying a cost function that incorporates the overall transceiver chain including a li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Transforms Tightly Bounded by DCT and KLT

    Publication Year: 2012, Page(s):344 - 347
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1262 KB) | HTML iconHTML

    It is well known that the discrete cosine transform (DCT) and Karhunen-Loève transform (KLT) are two good representatives in image and video coding: the first can be implemented very efficiently while the second offers the best R-D coding performance. In this work, we attempt to design some new transforms with two goals: i) approaching to the KLT's R-D performance and ii) maintaining the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Radix-3 Algorithm for the Generalized Discrete Hartley Transform of Type II

    Publication Year: 2012, Page(s):348 - 351
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1047 KB) | HTML iconHTML

    We present a new fast radix-3 algorithm for the computation of the length-N generalized discrete Hartley transform of type-II (GDHT-II), where N = 3m, m ≥ 2. Then we apply this algorithm to the direct computation of length-N GDHT-II coefficients when given three adjacent length-N/3 GDHT-II coefficients. The computational complexity of the propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time-Frequency Analysis via Ramanujan Sums

    Publication Year: 2012, Page(s):352 - 355
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (630 KB) | HTML iconHTML

    Research in signal processing shows that a variety of transforms have been introduced to map the data from the original space into the feature space, in order to efficiently analyze a signal. These techniques differ in their basis functions, that is used for projecting the signal into a higher dimensional space. One of the widely used schemes for quasi-stationary and non-stationary signals is the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Stochastic System for Large Network Growth

    Publication Year: 2012, Page(s):356 - 359
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (751 KB) | HTML iconHTML

    This letter proposes a new model for preferential attachment in dynamic directed networks. This model consists of a linear time-invariant system that uses past observations to predict future attachment rates, and an innovation noise process that induces growth on vertices that previously had no attachments. Analyzing a large citation network in this context, we show that the proposed model fits th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of Multipath Environment Using Copulas for Particle Filtering Based GPS Navigation

    Publication Year: 2012, Page(s):360 - 363
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1080 KB) | HTML iconHTML

    Today in GPS navigation, an accuracy from 5 to 10 m can be achieved, but performance can be strongly degraded in a multipath environment. Multipath can introduce large errors when measuring the distance between the satellites and the GPS receiver. They are commonly modeled by additive-measurement noise variance jumps affecting GPS measurements if there is a direct path between the satellites and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Block Fixed Point Continuation Algorithm for Block-Sparse Reconstruction

    Publication Year: 2012, Page(s):364 - 367
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1137 KB) | HTML iconHTML

    Block-sparse reconstruction, which arises from the reconstruction of block-sparse signals in structured compressed sensing, is generally considered difficult to solve due to the mixed-norm structure. In this letter, we propose an algorithm for reconstructing block-sparse signals, that is an extension of fixed point continuation in block-wise case by incorporating block coordinate descent technique... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Leakage-Based MMSE Beamforming Design for a MIMO Interference Channel

    Publication Year: 2012, Page(s):368 - 371
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (851 KB) | HTML iconHTML

    We propose a low complexity design of the linear transmit filters for a MIMO interference channel. This design is based on a minimum mean squared error (MMSE) approach incorporating the signal and the interference leakage for each transmitter. Unlike the previous methods, it allows a closed-form expression of the regularization factor for the MMSE transmit filter. Hence, it requires a lower comput... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of Transmit Antenna Selection Physical Layer Security Schemes

    Publication Year: 2012, Page(s):372 - 375
    Cited by:  Papers (66)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1184 KB) | HTML iconHTML

    We analyze the physical layer (PHY) security of a communication scheme consisting of a multiple antenna transmitter with a single radio frequency (RF) chain using transmit antenna selection (TAS) and a single antenna receiver, in the presence of a sophisticated multiple antenna eavesdropper. We develop closed-form expressions for the analysis of the secrecy outage probability, and we show that the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Signal Processing Letters information for authors

    Publication Year: 2012, Page(s):376 - 377
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Signal Processing Society Membership Application

    Publication Year: 2012, Page(s): 378
    Request permission for commercial reuse | PDF file iconPDF (807 KB)
    Freely Available from IEEE
  • Special Issue on Intelligent Video Surveillance for Public Security & Personal Privacy

    Publication Year: 2012, Page(s): 379
    Request permission for commercial reuse | PDF file iconPDF (721 KB)
    Freely Available from IEEE
  • Special Issue on Privacy and Trust Management in Cloud and Distributed Systems

    Publication Year: 2012, Page(s): 380
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2012, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Signal Processing Letters is a monthly, archival publication designed to provide rapid dissemination of original, cutting-edge ideas and timely, significant contributions in signal, image, speech, language and audio processing.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Peter Willett
University of Connecticut
Storrs, CT 06269
peter.willett@uconn.edu