Volume 6 Issue 2 April 2008


Reversible Data Embedding for Color Images

Chin-Chen Chang The Duc Kieu, Yung-Chen Chou

https://doi.org/

Abstract The data hiding technique is used to hide a secret message into a cover image which is then sent to a receiver without raising any suspicions. With a reversible (lossless) data hiding method, a receiver can extract a secret message and exactly restore an original cover image from an embedded image. This paper presents a novel reversible data embedding scheme... Read More


Information Hiding on Lossless Data Compression

Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Tsutomu Matsumoto

https://doi.org/

Abstract We address a new class of Information hiding on lossless data compression. In our model, secret information is embedded into a compressed data (e.g. ZIP) in a way that the compressed data can still be decompressed by regular decompression process (e.g. UNZIP). The entity with secret key can extract the secret information from the compressed data. In this paper, we... Read More


A Strategy for Opposing DC Components Watermarking

Pei-Wei Tsai, Shu-Chuan Chu, Hsiang-Cheh Huang, Ting Chou, and Jen-Der Day

https://doi.org/

Abstract For the watermarking technique, which embeds the watermark in the dc components of the discrete cosine transform (DCT) based image using the method presented by Huang et al. [1], we present two methods to remove the watermark from the carrier image. In our first method, it removes the watermark via varying the energies in the transform domain and redeeming the... Read More


An Improved Biometric Template Protection Method based on Non-Uniform Quantization

Qi Han, Zhifang Wang, Xiamu Niu

https://doi.org/

Abstract In recent literature, the issue of biometric template protection was raised. Some schemes were proposed to solve the contradiction between the fuzzy biometric information and accurate cryptography functions to achieve the protection of biometric template via cryptography method. In this paper, a novel methodology to achieve the security of the biometric templates in biometric systems is proposed. An adaptive non-uniform... Read More


Optimal Two-Pass Frame-Layer Bit Allocation for H.264 Video*

Do-Kyoung Kwon, Mei-Yin Shen, C.-C. Jay Kuo

https://doi.org/

Abstract In this work, the frame-layer bit allocation problem is studied for H.264 video. We first impose a GOP (Group of Pictures) structure on the underlying H.264 video, and then develop a two-pass rate control algorithm based on the Lagrange optimization framework. The proposed algorithm estimates the rates and the distortions of all frames in a GOP by preencoding them using... Read More


Multiple Description Coding of an Audio Stream by Optimum Recovery Transforms

Akinori Ito, Shozo Makino

https://doi.org/

Abstract In this paper, we discuss a method of splitting one audio stream into two equal-quality streams and recover the original audio stream from only one of the split streams. From a mathematical consideration, it is found that the sum of errors of two recovered signals is equal to the power of the original signal if simple recovery is carried out.... Read More


Smoke Detection for Early Fire-Alarming System Based on Video Processing

Da-Jinn Wang, Thou-Ho (Chao-Ho) Chen, Yen-Hui Yin, Tsong-Yi Chen

https://doi.org/

Abstract The paper presents a smoke-detection method for early fire-alarming system based on video processing. The basic strategy of smoke-pixel judgment is composed of two decision functions: a chromaticitybased decision function in static characteristic and a diffusion-based decision function in dynamic characteristic. The chromatic decision rule is deduced by grayish color of smoke and the dynamic decision rule is dependent on... Read More


Discriminant Parallel Feature Fusion Based on Maximum Margin Criterion for Pattern Classification

Jun-Bao Li , Shu-Chuan Chu , Jeng-Shyang Pan

https://doi.org/

Abstract In this paper, we propose a novel parallel feature fusion based maximum margin criterion, namely discriminant parallel feature fusion, for pattern classification. The advantage of algorithm lies in: 1) A constrained optimization problem based on maximum margin criterion is created to solve the optimal fusion coefficients, which causes that fused data has the largest class discriminant in the fused feature... Read More


Robust Video Watermarking based on Dual-plane Correlation for Immunity to Rotation, Scale, Translation, and Random Distortion

Yusuke Atomori, Isao Echizen, Masanori Dainaka, Shinta Nakayama, Hiroshi Yoshiura

https://doi.org/

Abstract A robust video watermarking method is described that can embed watermarks immune to not only rotation, scaling, and translation but also to random geometric distortion and any of their combinations. It can detect watermarks without any search for canceling the effect of random distortion. Rotation, scale, and translation are canceled by searching for the angle, size, and origin of the... Read More


Web Information Extraction Using Web-specific Features

Jinlin Chen,Ping Zhong

https://doi.org/

Abstract Several problems exist with traditional HMM based approaches for Web information extraction (IE) due to the lack of consideration on Web-specific features. To address this issue we present a Generalized Hidden Markov Model (GHMM) that extends HMMs by making use of Web-specific information for Web IE. In GHMM based approach, Web content blocks instead of terms are used as basic... Read More


A Recommendation Model Based on Site Semantics and Usage Mining

Sofia Stamou, Lefteris Kozanidis, Paraskevi Tzekou, Nikos Zotos

https://doi.org/

Abstract The explosive growth of online data and the diversity of goals that may be pursued over the web have significantly increased the monetary value of the web traffic. To tap into this accelerating market, web site operators try to increase their traffic by customizing their sites to the needs of specific users. Web site customization involves three great challenges: (i)... Read More


A Smart Card Based Remote User Authentication Scheme

Mohammed Misbahuddin, P.Premchand, A.Govardhan

https://doi.org/

Abstract Password based authentication schemes are commonly used to authenticate remote users. Many schemes have been proposed both with and without smart cards but each have its own merits and demerits. This paper analyzes the security of an enhanced Dynamic ID based remote user authentication scheme and shows that the enhanced scheme has major security weaknesses. The paper also presents a... Read More


An actor Like Data Model for a Parallel DBMS

W.K Hidouchi - D.Ezegour

https://doi.org/

Abstract We present in this paper the new concept of “actor databases” (DB-Act) being studied at the INI institute (Act21 project) where we are developing a parallel main memory database system based on an actor like data model. To achieve data distribution we use a Scalable Distributed Data Structures (SDDS) called “distributed Compact Trie Hashing” (CTH*) currently in development at the... Read More