Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on

31 Aug.-4 Sept. 2004

Go

Filter Results

Displaying Results 1 - 25 of 240
  • Fragile authentication watermark combined with image feature and public key cryptography

    Publication Year: 2004, Page(s):2286 - 2289 vol.3
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    In this paper, a new invisible watermarking technique can localize tampered areas for image authentication is proposed, which skillfully combined with image feature and public key cryptography. A logo is embedded based on image feature and secret key as watermark for the integrity verification and localized tamper detection. The watermark extraction uses a public key corresponds to the private key... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Passive tracking of a maneuvering target in clutter

    Publication Year: 2004, Page(s):1997 - 2000 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (153 KB) | HTML iconHTML

    Passive tracking of a maneuvering target in clutter is studied. The converted measurement Kalman filter (CMKF) for the passive DOA system is presented and used in IMMPDAF algorithm. We call it CM_IMMPDAF algorithm. Simulation results show that the CM_IMMPDAF algorithm is effective to track a maneuvering target in clutter. Of course, it is necessary to choose accurate models for improving... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of turbo en-decoders with orthogonal interleavers

    Publication Year: 2004, Page(s):1906 - 1909 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    Nowadays, the cell phone users are increasing very rapid, but the wireless resource is limited. In this paper, we present a new approach of designing turbo en-decoders in which interleaver maps are orthogonal and the turbo en-decoders can be used to increase the capacity of CDMA systems. The orthogonal interleavers are selected by computer. In this paper, we simulate the performance of turbo en-de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel semi-fragile watermarking technique for image authentication

    Publication Year: 2004, Page(s):2282 - 2285 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    A novel semi-fragile watermarking technique is proposed for image authentication in this paper. A binary-valued image is embedded as the watermark for the integrity authentication and tamper defection by using the technique, of the HVS. The experimental results demonstrate, its effective robustness against JPEG compression and good property of localization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An IMM tracking algorithm based on a novel target model

    Publication Year: 2004, Page(s):1993 - 1996 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    In the field of target tracking, IMM is a simple algorithm and has good performance. However, choosing the target models is a very difficult problem. This paper modifies the IMM algorithm based on a target model presented in Li Hongyan and Feng Xinxi (2004). The maneuvering level parameter of this model can be adaptively adjusted through the output of the IMM filter. A lot of simulation results sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error rates calculation and performance analysis of (2,1) STBC systems

    Publication Year: 2004, Page(s):1902 - 1905 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    In this paper, closed-form solutions for error rates of MPSK modulated (2,1) STBC systems are derived. With the hypothesis of ideal channel estimation, a general method of formulating the (2,1) STBC MPSK systems' error rates is explicated and the closed-form solutions for symbol error rate and bit error rate are put forward, which provides the designers with a more accurate standard for evaluating... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new TCP protocol able to measure bottleneck bandwidth

    Publication Year: 2004, Page(s):2636 - 2639 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    In this paper, we propose a TCP protocol which can measure the end-to-end bottleneck bandwidth of a path without the network support. This is achieved by exploiting information in acknowledgment packets returned to TCP source. The key innovation is to combine the commonly used transport protocol with the ability to measure the end-to-end bottleneck bandwidth. Simulation studies exemplify the metho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of space-time diversity adaptive PIC for multipath CDMA channels

    Publication Year: 2004, Page(s):1861 - 1864 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    In this paper, a low complexity space-time multiuser detector that combines the antenna array with adaptive parallel interference cancellation (PIC) in a multipath fading channel is proposed. By beamforming, the signal-to-interference-ratio (SIR) increases which results in a lower BER in the initial stage of PIC. For in-beam multiple access interference (MAI) reduction, a nonlinear adaptive PIC wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design scheme of PSTN media gateway

    Publication Year: 2004, Page(s):2651 - 2654 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    This article presents an implementation of PSTN media gateway. The architecture of media gateway and the media processing scheme are described. It's designed from the idea of decomposed gateway. SIP, as a new VoIP technology, is adopted as the signaling protocol in the NGN. In the scheme we present the architecture of the hardware, the software control modules, and some other kernel technologies u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of lifting scheme in pitch extraction for speech processing of cochlear implants based on characteristics of Chinese language

    Publication Year: 2004, Page(s):2222 - 2225 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    Pitch extraction and estimation are very important issues in speech processing. Although frequency-domain analysis can get a good precision, its complex computing and mass memory occupation make it hardly suitable for cochlear implants based on characteristics of Chinese language. In this article, lifting scheme is adopted, combined with pitch extraction algorithm, to extract fundamental frequency... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable and oblivious digital watermarking for images

    Publication Year: 2004, Page(s):2338 - 2341 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Scalable compression algorithms, such as JPEG, can compress images to different quality or resolution levels so that the target systems with different display capabilities, can display the image. Digital watermarking is widely used for protection of copyright and identification of ownership on digital images. It is desirable to have scalable watermarking systems, where the watermark is detectable ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interferometric three-dimensional imaging on ground moving target

    Publication Year: 2004, Page(s):1934 - 1937 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    In this paper, a system of a three-dimensional (3D) interferometric SAR imaging for ground moving targets is analyzed. By using the estimation of angular motion parameters in the cross-range directions, the registration of the respective complex images can be achieved via compensating the respective echoes in the raw data level, and the 3D image can be reconstructed sequentially. Finally, the cros... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LFMCW radar multi-target acceleration and velocity estimation method

    Publication Year: 2004, Page(s):1989 - 1992 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    In the LFMCW radar system, the echo signal of moving target with acceleration has Doppler aberration. It causes target detection performance deterioration and parameter estimation loss. The polynomial phase transform (PPT) can only estimate the single target acceleration in the same range cell. This paper presents a method, which modified the PPT algorithm to process the Doppler signal of multiple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiuser detection based on quantum detection

    Publication Year: 2004, Page(s):1898 - 1901 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    The scheme based on quantum detection to solve the NP hard problem in conventional multi-user detection is proposed in the paper. The simulation results for optimal quantum multi-user detection is presented, and performance comparisons with classical techniques show an improvement when quantum detection is employed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-party conference system designed & realized based on DSP

    Publication Year: 2004, Page(s):2632 - 2635 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    In view of defects of tradition chips used for conference systems, such as poor performance and higher prices, this paper proposes the technical solution to use DSP technology to design and realize the multi-party conference system, and describes detailed designs and specified realization methods. With stable performance and requiring much lower costs, the product is now being extensively applied ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Processor architecture design for operation information processing based on safety model of instruments

    Publication Year: 2004, Page(s):2687 - 2690 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    An ASP architecture based on safety model of electronic instrument and circuit controlled over the Internet or local network is designed in this paper. The safety problem is discussed in detail as the base of safety problem modeling. The safety model is the description of operation rule and used for command checking so that the model is the base of the ASP design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated hand shape verification using HMM

    Publication Year: 2004, Page(s):2274 - 2277 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    In this paper we present a method for identity verification based on matching of hand shapes. Our method first represents the shapes of hands by sets of ordered points. Then the contour of the hand is characterized by a features sequence consisting of two parameters: the radius and curvature at the contour points, MMM has proved a very successful tool for modeling and recognition sequence signal. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification of mental tasks using de-noised EEG signals

    Publication Year: 2004, Page(s):2206 - 2209 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    The wavelet based de-noising can be employed with the combination of different kind of threshold parameters, threshold operators, mother wavelets and threshold rescaling methods. The central issue in wavelet based de-noising method is the selection of an appropriate threshold parameters. If the threshold is too small, the signal is still noisy but if it is too large, important signal features migh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian structural content abstraction for image authentication

    Publication Year: 2004, Page(s):2322 - 2325 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    An ideal authentication approach should be able to tolerate "content preserving" operations (e.g. compression and rotation) robustly, while detecting "content altering" (e.g. object removing and replacement) modifications sensitively. Although the numerous existing algorithms can detect and locate malicious alterations to the protected image, unfortunately, most are still too fragile to resist var... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of UMTS-FDD/HSDPA baseband

    Publication Year: 2004, Page(s):1857 - 1860 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    A design and implementation scenario for UMTS-FDD and HSDPA baseband processing based on DSP is proposed in the paper. Through detailed analysis of both dedicated channel (DCH) chain of UMTS-FDD and HS-DSCH chain of HSDPA, a cost-effective base band design based on DSP cluster is presented. Due to flexibility of software, it is easy to combine UMTS-FDD uplink and downlink, and HSDPA into one singl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SAR image compression at very low bit-rate

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    SAR (synthesis aperture radar) generates huge amounts of data which may easily exhaust the available capacity of downlink or storage device of the spaceborne SAR system. So there are special interests in SAR image compression. Common methods suffer from "ringing" effect at very low bit-rate when using wavelet codec: as a result poor quality is achieved. Our approach uses a Gaussian filter as a low... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of wavelet transform in track correlation algorithm

    Publication Year: 2004, Page(s):2541 - 2544 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    A new method of track correlation is proposed in this paper according to that wavelet decomposition has a function of signal de-noising. A new generalized classic assignment algorithm of track correlation is formed by wavelet decomposition and reconstruction. This method not only applies the statistical distance between two tracks to track correlation, but also considers the tendency of tracks. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fragile watermarking based on the triplet of wavelet coefficients

    Publication Year: 2004, Page(s):2298 - 2301 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    A novel fragile watermarking approach based on the triplet of wavelet coefficients is proposed and defined. The standard deviation of three wavelet coefficients in the triplet of wavelet coefficients is divided by a prespecified threshold, and watermark bit is embedded by the quantization of the remainder resulted from this division operation. Experimental results show that the proposed algorithm ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal receive polarization based on the pol-ellipse parameters

    Publication Year: 2004, Page(s):2009 - 2012 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    For optimal polarization received in the presence of signal and noise, a new SlNR (signal-interference-and-noise-ratio) equation is derived from two triangles in the polarization sphere based on the pol-ellipse parameters. In addition, the local optimal solutions of SINR on the great circle tracks and the circle tracks are obtained, and the comparison between the local optimal solutions, the globa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of the CTI system using SIP protocol

    Publication Year: 2004, Page(s):2647 - 2650 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    Using SIP (session initiation protocol), a CTI system is proposed for providing real-time and all-round service in call center. Compared with the traditional call center, for our CTI system adopts SIP as its signaling protocol, which can integrate other successful Internet service in a simple measure, such as HTTP and SMTP. The customer can be served through main kinds of convenient ways. Besides,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.