China Summit & International Conference on Signal and Information Processing (ChinaSIP) - Xi'an, China

Image removed.

2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP) was held 9-13 July 2014 in Xi’an, China. Research includes such topics as steganography, forensics, secure burst transmissions, retrieval of encrypted JPEG images, signal reconstruction, target signal detection, synthetic aperture radar, and much more.

  • Xinpeng Zhang; Hang Cheng, "Histogram-based retrieval for encrypted JPEG images," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.446,449, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889282 This work proposes a novel scheme for encrypted JPEG image retrieval, which includes image encryption and unsupervised/supervised retrieval phases. Using this scheme, the encrypted images are produced by permuting DCT coefficients, and transmitted to a database server. With an encrypted query image, although the server does not know the plaintext content, he may get the histogram at each frequency position. After calculating the distances between the histograms of encrypted query image and database image, the server can return the encrypted images with plaintext content similar to the query image according to integrated distances. If a training image set is available, the retrieval results can be also determined by conditional probabilities calculated from a supervised mechanism.
    Keywords: cryptography; discrete cosine transforms; image coding; image retrieval; DCT coefficients; database image; encrypted JPEG image retrieval; encrypted images; encrypted query image; histogram-based retrieval; image encryption; unsupervised retrieval phases; Databases; Encryption; Feature extraction; Histograms; Servers; Transform coding; Histogram; Image encryption; Image retrieval (ID#:14-3217)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889282&isnumber=6889177
  • Jia Duan; Lei Zhang; Yifeng Wu; Mengdao Xing; Min Wu, "A Novel Signal Reconstructing Method For Radar Targets," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on , vol., no., pp.175,178, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889226 In this paper, a novel signal reconstructing method for radar targets is proposed based on the attributed scattering center model. By extracting the attributed parameters, the large amount of target data can be represented by small amounts of attributed parameters. In this way, the data amount has been compressed sharply, which releases the computer memory for storage. After extraction, a target discriminating method is presented by applying a CFAR threshold to the energy of extracted attributed scattering centers, by which, weak distributed scattering centers with relatively high energy in total can be discriminated from noise under low SNRs. Experimental results validate the effectiveness of the signal reconstructing capability of the proposal.
    Keywords: radar signal processing; radar target recognition; scattering; signal reconstruction; CFAR threshold; SNR; attributed parameters extraction; attributed scattering center model; radar target; signal reconstruction method ;target discriminating method; weak distributed scattering center; Image reconstruction; Noise; Parameter estimation; Radar imaging; Scattering; Signal reconstruction; Signal reconstruction; attributed scattering center; radar images (ID#:14-3218)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889226&isnumber=6889177
  • Ziqiang Meng; Yachao Li; Mengdao Xing; Zheng Bao, "Imaging Of Missile-Borne Bistatic Forward-Looking SAR," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.179,183, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889227 As a special imaging mode, missile-borne bistatic forward-looking synthetic aperture radar (MBFL-SAR) has many advantages in two-dimensional (2-D) imaging capability for targets in the straight-ahead position over mono-static missile-borne SAR and airborne SAR. It is difficult to obtain the 2-D frequency spectrum of the target echo signal due to the high velocity and acceleration in this configuration, which brings a lot of obstacles to the following imaging processing. A new imaging algorithm for MBFL-SAR configuration based on series reversion is proposed in this paper. The 2-D frequency spectrum obtained through this method can implement range compression and range cell migration correction (RCMC) effectively. Finally, some simulations of point targets and comparison results confirm the efficiency of our proposed algorithm.
    Keywords: airborne radar; military radar; missiles; radar imaging; synthetic aperture radar; 2D frequency spectrum;2D imaging; MBFL-SAR imaging mode; RCMC; airborne SAR; missile-borne bistatic forward-looking SAR imaging; mono-static missile-borne SAR; point target simulation; range cell migration correction; range compression; series reversion; straight-ahead position; synthetic aperture radar; target echo signal ;two-dimensional imaging capability; Algorithm design and analysis; Azimuth; Data models; Frequency-domain analysis; Imaging; Synthetic aperture radar;2-D frequency spectrum; MBFL-SAR; Method of series reversion; SAR imaging (ID#:14-3219)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889227&isnumber=6889177
  • Xun Chao Cong; Rong Qiang Zhu; Yu Lin Liu; Qun Wan, "Feature Extraction of SAR Target In Clutter Based On Peak Region Segmentation And Regularized Orthogonal Matching Pursuit," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.189,193, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889229 Feature extraction in clutter is a challenging problem in SAR target recognition because of the difficulty in distinguishing the target signature from the background. In this paper, a new feature extracting algorithm based on automated peak region segmentation (PRS) and regularized orthogonal matching pursuit (ROMP) techniques is presented and called PRS-ROMP. It combines the processes in both signal domain and image domain. First, the proposed method uses PRS and parametric model (PM) to obtain the positions and atoms of strong scattering centers of target. Then we acquire the positions and atoms of weak scattering centers by the sparse reconstruction algorithm and PM for residual region. By using all atoms of strong and weak scattering centers we get the final amplitude estimation by LS. Experimental results of electromagnetic calculations data in clutter validate the proposed target feature extraction method.
    Keywords: amplitude estimation; feature extraction; image recognition; image reconstruction; image segmentation; iterative methods; least squares approximations; radar clutter; radar imaging; synthetic aperture radar; time-frequency analysis; LS; PM; PRS; ROMP technique; SAR target recognition; amplitude estimation; automated peak region segmentation; clutter; electromagnetic calculation; parametric model; regularized orthogonal matching pursuit technique; sparse reconstruction algorithm; target feature extraction method; target scattering center; Accuracy; Clutter; Feature extraction; Matching pursuit algorithms; Scattering; Signal processing algorithms; Sparse matrices; ROMP; SAR; automated peak region segmentation; feature extraction; parametric model (ID#:14-3220)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889229&isnumber=6889177
  • Azouz, A.; Zhenfang Li, "Improved Phase Gradient Autofocus Algorithm Based On Segments Of Variable Lengths And Minimum Entropy Phase Correction," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.194,198, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889230 In this paper, an improved phase gradient autofocus (PGA) Algorithm motion compensation (MOCO) approaches is proposed for the unmanned aerial vehicle (UAV) synthetic aperture radar (SAR) imagery. The approach is implemented in two-steps. The first step determines the length of segments depending on number of good quality scatterers and motion errors obtained from navigation data. In the second step, a novel minimum-entropy phase correction based on the Discrete Cosine Transform (DCT) coefficients is proposed. In this approach, transform phase error estimates by PGA to DCT-coefficient. The entropy of a focused image is utilized as the optimization function of the DCT coefficients to improve the final images quality. Finally, real-data experiments show that the proposed approach is appropriate for highly precise imaging of UAV SAR.
    Keywords: autonomous aerial vehicles; discrete cosine transforms; gradient methods; minimum entropy methods; motion compensation; radar imaging; synthetic aperture radar; DCT coefficients; PGA algorithm; SAR imagery; UAV-SAR imagery; discrete cosine transform; improved phase gradient autofocus algorithm; minimum entropy phase correction; motion errors; navigation data; optimization function; synthetic aperture radar; unmanned aerial vehicle; variable length segment; Azimuth; Electronics packaging; Entropy; Image segmentation; Motion segmentation; Navigation; Synthetic aperture radar; Motion compensation (MOCO); phase gradient autofocus (PGA) (ID#:14-3221)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889230&isnumber=6889177
  • Sheng-juan Cheng; Wen-Qin Wang; Huaizong Shao, "MIMO OFDM chirp waveform design with spread spectrum modulation," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.208,211, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889233 This paper proposes an approach to design orthogonal multiplexing waveform for use of Multiple-input Multiple-output (MIMO) radar. The designed scheme incorporate direct sequence spread spectrum (DSSS) coding techniques on orthogonal frequency division multiplexing (OFDM) chirp signaling. We call it spread spectrum coded OFDM chirp (SSCOC) signaling. The performance of the signals are analyzed with the cross-ambiguity function. In the experiment, the influence of spread spectrum code length and type as well as the bandwidth and duration of OFDM chirp waveforms on cross-ambiguity function (CAF) is discussed. It is verified that the proposed design scheme can ensure these waveforms stay orthogonal on receive and obtain large time-bandwidth product which are beneficial to separate closely spaced targets with ultra-high resolution.
    Keywords: MIMO radar; OFDM modulation; spread spectrum communication; MIMO OFDM chirp waveform design; cross ambiguity function; direct sequence spread spectrum coding technique; multiple input multiple output radar; orthogonal frequency division multiplexing chirp signaling; orthogonal multiplexing waveform; spread spectrum code; spread spectrum modulation; Bandwidth; Chirp; Gold; MIMO; OFDM; Synthetic aperture radar; Cross-Ambiguity Function (CAF); Direct Sequence Spread Spectrum (DSSS); Multiple-input Multiple-output (MIMO); Orthogonal frequency division multiplexing (OFDM); Spread Spectrum Coded OFDM Chirp (SSCOC) (ID#:14-3222)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889233&isnumber=6889177
  • Xiaofei Wang; Yanmeng Guo; Qiang Fu; Yonghong Yan, "Reverberation Robust Two-Microphone Target Signal Detection Algorithm With Coherent Interference," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.237,241, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889239 In this paper, a reverberation robust Target Signal Detection (TSD) algorithm using two microphones is proposed. Most of traditional TSD algorithms are based on the assumption of free sound field and close-talking scene incorporate with multichannel system. They lack in achieving robustness in reverberant and noisy environment. The proposed TSD algorithm is based on Beam-to-Reference Ratio (BRR), and a novel estimator, Direct-to-Reverberate Ratio (DRR), is introduced to enlarge the basic assumption to reverberant and distant-talking scene. Spatial correlation information between microphones is used to estimate the DRR to revise threshold on each Time-Frequency (T-F) block and to form full-band likelihood using soft-decision information. Experimental results show that the proposed method performs robust in different reverberant environments with coherent interferences when target signal is from priori known direction-of-arrivals (DOA) in distant-talking scene.
    Keywords: direction-of-arrival estimation; microphones; object detection; reverberation; signal detection; beam-to-reference ratio; coherent interference; direct-to-reverberate ratio; direction-of-arrivals; distant-talking scene; estimator; full-band likelihood; microphones; multichannel system; reverberant assumption; reverberation robust target signal detection; reverberation robust two-microphone target signal detection algorithm; soft-decision information; spatial correlation information; time-frequency block ;Interference; Microphones; Noise; Reverberation; Robustness; Speech; Speech enhancement; Direct-to-Reverberate Ratio; Reverberation Robust; Speech Enhancement; Target Signal Detection (ID#:14-3223)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889239&isnumber=6889177
  • Aggarwal, H.K.; Majumdar, A., "Compressive Sensing Multi-Spectral Demosaicing From Single Sensor Architecture," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.334,338, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889259 This paper addresses the recovery of multi-spectral images from single sensor cameras using compressed sensing (CS) techniques. It is an exploratory work since this particular problem has not been addressed before. We considered two types of sensor arrays - uniform and random; and two recovery approaches - Kronecker CS (KCS) and group-sparse reconstruction. Two sets of experiments were carried out. From the first set of experiments we find that both KCS and group-sparse recovery yields good results for random sampling, but for uniform sampling only KCS yields good results. In the second set of experiments we compared our proposed techniques with state-of-the-art methods. We find that our proposed methods yields considerable better results.
    Keywords: cameras; compressed sensing; image reconstruction; image sampling ;image segmentation; image sensors; sensor arrays; KCS approach; Kronecker CS approach; compressed sensing technique; group-sparse reconstruction; multispectral demosaicing; multispectral image recovery; random sampling; sensor array; single sensor architecture; single sensor camera; Cameras; Compressed sensing; Filtering algorithms; Image reconstruction; Signal processing; Transforms; Compressed Sensing; Demosaicing; Multi-spectral Imaging (ID#:14-3224)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889259&isnumber=6889177
  • Bo Li; Yuchao Dai; Mingyi He; van den Hengel, A., "A Relaxation Method To Articulated Trajectory Reconstruction From Monocular Image Sequence," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.389,393, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889270 In this paper, we present a novel method for articulated trajectory reconstruction from a monocular image sequence. We propose a relaxation-based objective function, which utilises both smoothness and geometric constraints, posing articulated trajectory reconstruction as a non-linear optimization problem. The main advantage of this approach is that it remains the re-constructive power of the original algorithm, while improving its robustness to the inevitable noise in the data. Furthermore, we present an effective approach to estimating the parameters of our objective function. Experimental results on the CMU motion capture dataset show that our proposed algorithm is effective.
    Keywords: image motion analysis; image reconstruction; image sequences; nonlinear programming; CMU motion capture dataset; articulated trajectory reconstruction; geometric constraint; monocular image sequence; nonlinear optimization problem; relaxation method; relaxation-based objective function; Cameras; Educational institutions; Image reconstruction; Linear programming; Noise; Three-dimensional displays; Trajectory; articulated trajectory; noise; relaxation; robust; smoothness (ID#:14-3225)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889270&isnumber=6889177
  • Cong Liu; Hefei Ling; Fuhao Zou; Lingyu Yan; Xinyu Ou, "Efficient Digital Fingerprints Tracing," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.431,435, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889279 Digital fingerprinting is a promising approach to protect multimedia contents from unauthorized redistribution. Whereas, large scale and high dimensionality make existing fingerprint detection methods fail to trace the traitors efficiently. To handle this problem, we propose a novel local and global structure preserving hashing to conduct fast fingerprint detection. Applying the hashing method, we obtain a low-dimensional neighborhood-preserving hash code for each fingerprint. Through hash codes, we can find the nearest neighbors of the extracted fingerprint, thereby tracing the real traitors within a small range. These properties make the proposed approach efficient to trace the real traitors. Extensive experiments demonstrate that the proposed approach outperforms traditional linear scan detection methods in term of efficiency.
    Keywords: cryptography; fingerprint identification; digital fingerprint tracing; fingerprint detection; fingerprint extraction; linear scan detection methods; low-dimensional neighborhood-preserving hash code; multimedia content protection; Correlation; Fingerprint recognition; Forensics; Indexes; Multimedia communication; Training; Watermarking; digital fingerprinting; hash-based similarity search; multimedia security; neighborhood preserving hashing (ID#:14-3226)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889279&isnumber=6889177
  • Lingyu Yan; Hefei Ling; Cong Liu; Xinyu Ou, "Hashing based feature aggregating for fast image copy retrieval," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.441,445, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889281 Recently the methods based on visual words have become very popular in near- duplicate retrieval and content identification. However, obtaining the visual vocabulary by quantization is very time-consuming and unscalable to large databases. In this paper, we propose a fast feature aggregating method for image representation which uses machine learning based hashing to achieve fast feature aggregation. Since the machine learning based hashing effectively preserves neighborhood structure of data, it yields visual words with strong discriminability. Furthermore, the generated binary codes leads image representation building to be of low-complexity, making it efficient and scalable to large scale databases. The evaluation shows that our approach significantly outperforms state-of-the-art methods.
    Keywords: data structures; database management systems image representation ;image retrieval; learning (artificial intelligence); binary codes; content identification; fast feature aggregating method; feature aggregation; hashing based feature; image copy retrieval; image representation; large scale database; machine learning based hashing; near-duplicate retrieval; neighborhood data structure; visual vocabulary; visual words; Binary codes; Feature extraction; Histograms; Image representation; Linear programming; Training; Visualization; Feature Aggregation; Image Copy Retrieval; Machine Learning base hashing; Visual Words (ID#:14-3227)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889281&isnumber=6889177
  • Tianzhuo Wang; Xiangwei Kong; Yanqing Guo; Bo Wang, "Exposing the Double Compression In MP3 Audio By Frequency Vibration," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on , vol., no., pp.450,454, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889283 A novel approach is presented to detect double compressed MP3 audio by frequency vibration. With the analysis of double compression effect on MDCT (Modified Discrete Cosine Transform) coefficients in MP3 audio, we propose a simple feature called FVV (frequency vibration value) to measure the vibration caused by double compression. The experimental results on challenging dataset show that our method outperforms most of the existing methods in double MP3 compression detection, especially with a second bitrate higher than the first one. Besides, we can also estimate the original bit-rate for a double compressed MP3 by this technique.
    Keywords: audio coding; data compression; discrete cosine transforms; signal detection; FVV;MDCT; double MP3 compression detection; double compressed MP3 audio detection; double compression effect analysis; frequency vibration value; modified discrete cosine transform; second bitrate; Accuracy; Digital audio players; Feature extraction; Frequency measurement; Multimedia communication; Transforms; Vibrations; MDCT coefficients;MP3;audio forensics; double compression detection; frequency vibration (ID#:14-3228)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889283&isnumber=6889177
  • Xiaohua Li; Zifan Zhang, "Exploit the Scale Of Big Data For Data Privacy: An Efficient Scheme Based On Distance-Preserving Artificial Noise And Secret Matrix Transform," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.500,504, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889293 In this paper we show that the extensive results in blind/non-blind channel identification developed within the community of signal processing in communications can play an important role in guaranteeing big data privacy. It is widely believed that the sheer scale of big data makes most conventional data privacy techniques ineffective for big data. In contrast to this pessimistic common belief, we propose a scheme that exploits the sheer scale to guarantee privacy. This scheme uses jointly artificial noise and secret matrix transform to scramble the source data. Desirable data utility can be supported because the noise and the transform preserve some important geometric properties of the source data. With a comprehensive privacy analysis, we use the blind/non-blind channel identification theories to show that the secret transform matrix and the source data can not be estimated from the scrambled data. The artificial noise and the sheer scale of big data are critical for this purpose. Simulations of collaborative filtering are conducted to demonstrate the proposed scheme.
    Keywords: Big Data; data privacy; transforms; big data privacy; blind-nonblind channel identification theories; collaborative filtering; distance-preserving artificial noise; privacy analysis; secret matrix transform; source data scrambling; Accuracy; Big data; Data privacy; Estimation; Noise; Privacy; Transforms; big data; blind source separation; channel identification; privacy; signal processing (ID#:14-3229)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889293&isnumber=6889177
  • Yang Wang; Dan-Feng Zhao; Xi Liao, "Simplified Maximum Likelihood Detection For Multi-Beam Satellite Systems Using Group-Wise Interference Cancellation," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.559,562, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889305 The ideal joint detection method for multi-beam satellite systems is the maximum likelihood (ML) detection, while the complexity increases exponentially with the number of spot beams. A simplified ML detection is proposed for multi-beam satellite systems in this paper. The proposed algorithm is based on grouping of spot beams. ML detection is applied within groups after a crucial group detection and interference cancellation. The performance is improved by keeping multiple candidates for each group and a final constrained ML detection. Simulation results verify that the proposed algorithm reduces the computational complexity significantly while limiting the performance loss to within 0.2 dB from ML detection. In addition, the complexity of the proposed algorithm is reduced by 60 percent compared with that of a multistage group detection algorithm.
    Keywords: interference suppression; maximum likelihood detection; radiofrequency interference; satellite communication; crucial group detection; groupwise interference cancellation; ideal joint detection method; maximum likelihood detection; multibeam satellite systems; Computational complexity; Interference cancellation; Maximum likelihood detection; Partitioning algorithms; Satellites; Simulation; group-wise interference cancellation; maximum likelihood detection; multi-beam satellites; satellite communications (ID#:14-3230)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889305&isnumber=6889177
  • Chao Jin; Rangding Wang; Diqun Yan; Pengfei Ma; Kaiyun Yang, "A Novel Detection Scheme For MP3Stego With Low Payload," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.602,606, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889314 MP3Stego is a typical steganographic tool of MP3 audios. Though many researchers have been making every effort on attacking it, the performance of their approaches could be improved especially at the low embedding rate. In this paper, we have proposed a scheme for detecting low embedding rate of MP3Stego. Based on investigating the embedding principle of MP3Stego and observing the alteration of quantized MDCT coefficients (QMDCTs), the one-step transition probabilities of the difference of quantized MDCT coefficients were extracted. Finally, SVM was used for constructing a classification model according to the extracted features. Experimental results show that our scheme can effectively detect the MP3Stego steganography with low payload.
    Keywords: audio signal processing; discrete cosine transforms; feature extraction; probability; signal detection; steganography; support vector machines; MP3 audios; MP3Stego; QMDCTs; SVM; classification model; feature extraction; low embedding rate detection scheme; low payload; one-step transition probability; quantized MDCT coefficients; steganographic tool; Bit rate; Digital audio players; Encoding; Feature extraction; Payloads; Probability; Transform coding;MP3;low embedding rate; steganalysis; steganography; transition probability (ID#:14-3231)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889314&isnumber=6889177
  • Xiaochun Cao; Na Liu; Ling Du; Chao Li, "Preserving Privacy For Video Surveillance Via Visual Cryptography," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.607,610, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889315 The video surveillance widely installed in public areas poses a significant threat to the privacy. This paper proposes a new privacy preserving method via the Generalized Random-Grid based Visual Cryptography Scheme (GRG-based VCS). We first separate the foreground from the background for each video frame. These foreground pixels contain the most important information that needs to be protected. Every foreground area is encrypted into two shares based on GRG-based VCS. One share is taken as the foreground, and the other one is embedded into another frame with random selection. The content of foreground can only be recovered when these two shares are got together. The performance evaluation on several surveillance scenarios demonstrates that our proposed method can effectively protect sensitive privacy information in surveillance videos.
    Keywords: cryptography; data protection; video surveillance; GRG-based VCS; foreground pixels; generalized random-grid based visual cryptography scheme; performance evaluation; random selection; sensitive privacy information preservation method; video frame; video surveillance; Cameras; Cryptography; PSNR; Privacy; Video surveillance; Visualization; Random-Grid; Video surveillance; privacy protection; visual cryptography (ID#:14-3232)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889315&isnumber=6889177
  • Xianfeng Zhao; Haibo Yu; Jie Zhu; Yong Deng, "Differential Forensics Of DC-DM Based Watermarking," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.611,615, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889316 Forensics of watermarking may be desired by attackers and business competitors. It aims at not only recognizing the existence of watermark but also estimating the algorithm and its parameters. Distortion compensated-dither modulation (DC-DM) is the improved and generalized form of quantization-based embedding which is widely used in watermarking. It adopts pseudo-random dither sequences and adds back partial quantization noise so that estimation of the algorithm and its parameters seems very difficult. However, in case that changing embedding locations each time or using a private embedding domain is not a principle of designing watermarking as what we see nowadays, the differential forensics proposed in this paper, which exploits the differences between the watermarked copies, can recognize the DC-DM algorithm and estimate the algorithmic parameters well.
    Keywords: digital forensics; distortion; image watermarking; modulation; parameter estimation; quantisation (signal);DC-DM based watermarking; algorithmic parameter estimation; back partial quantization noise; differential forensics; distortion compensated-dither modulation; private embedding domain; pseudo-random dither sequences; quantization-based embedding; watermarking forensics; Discrete cosine transforms; Forensics; Lattices; Modulation; Noise; Quantization (signal); Watermarking; Forensics; distortion compensation; dither modulation; quantization index modulation; watermarking (ID#:14-3233)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889316&isnumber=6889177
  • Rongrong Ni; Cheng, H.D.; Yao Zhao; Lize Chen, "Adaptive Reversible Watermarking Using Trimmed Prediction And Pixel-Selection-Based Sorting," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on , vol., no., pp.616,620, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889317 Prediction error expansion based on sorting is an important technique in reversible watermarking since it yields large embedding capacity and low distortion. In this paper, an efficient and adaptive reversible watermarking scheme is proposed based on trimmed prediction and pixel selection sorting. The trimmed prediction excludes one singular pixel from the neighboring region. A more efficient sorting method is used to achieve lower distortion. Then, a further sorting that considers context complexity is proposed to ensure better visual quality. The smooth pixels located in rough areas are assigned high priorities for carrying bits by using the prediction error expansion method. With these improvements, our method shows better performances in terms of capacity and distortion.
    Keywords: sorting; watermarking; adaptive reversible watermarking; context complexity; embedding capacity ;low distortion; pixel selection sorting; prediction error expansion method; singular pixel; trimmed prediction; visual quality; Complexity theory; Context; Data mining; Payloads; Prediction algorithms; Sorting; Watermarking; Reversible watermarking; complexity; prediction error expansion; sorting; trimmed prediction (ID#:14-3234)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889317&isnumber=6889177
  • Ling Zou; Jichen Yang; Tangsen Huang, "Automatic Cell Phone Recognition From Speech Recordings," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.621,625, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889318 Recording device recognition is an important research field of digital audio forensic. In this paper, we utilize Gaussian mixture model-universal background model (GMM-UBM) as the classifier to form a recording device recognition system. We examine the performance of Mel-frequency cepstral coefficients (MFCCs) and Power-normalized cepstral coefficients (PNCCs) to this problem. Experiments conducted on recordings come from 14 cell phones show that MFCCs are more effective than PNCCs in cell phone recognition. We find that the identification performance can be improved by stacking MFCCs and energy feature. We also investigate the effect of speaker mismatch and de-noising processing for acoustic feature to this problem. The highest identification accuracy achieved here is 97.71%.
    Keywords: Gaussian processes; audio recording; mobile handsets; speech recognition; GMM-UBM; Gaussian mixture model-universal background model; MFCC; Mel-frequency cepstral coefficients; PNCCs; acoustic feature; automatic cell phone recognition; denoising processing; digital audio forensic; power normalized cepstral coefficients; recording device recognition; speaker mismatch; speech recordings; Accuracy; Cellular phones; Forensics; Object recognition; Speech; Speech recognition Training; Cell phone identification; Gaussian mixture model-universal background model (GMM-UBM);Mel-frequency cepstral coefficients (MFCCs);Power-normalized cepstral coefficients (PNCCs)}, (ID#:14-3235)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889318&isnumber=6889177
  • Yuxiao Yang; Jianjiang Zhou; Fei Wang; Chenguang Shi, "An LPI Design For Secure Burst Communication Systems," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.631,635, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889320 An LPI burst communication model based on conditional maximum entropy is presented in this paper. In this model, the conditional entropy of transmitting moments is the largest, and the prior data are used as the sample space, while Lagrange multipliers are selected as optimization variables. Hybrid Chaotic Particle Swarm Optimization (HCPSO) that is used in the model takes the dual programming of the conditional maximum entropy as objective function, and the conditional maximum entropy model is ultimately determined through this optimization algorithm. Compared with the usual method of fixed threshold, the simulation results show that the conditional maximum entropy method not only has longer effective communication time, but also can effectively increase the uncertainty of transmitting moments. The more the uncertainty of transmitting moments, the better the low probability of intercept performance is. So the burst communication has better performance of low probability of intercept using conditional maximum entropy model.
    Keywords: chaos; maximum entropy methods; particle swarm optimisation; telecommunication security; HCPSO; LPI burst communication model; LPI design; Lagrange multipliers; conditional maximum entropy dual programming; fixed threshold method; hybrid chaotic particle swarm optimization; low probability of intercept performance; objective function; optimization variables; secure burst communication systems; transmitting moment uncertainty; Communication systems; Entropy; Optimization; Particle swarm optimization; Probability density function; Programming; Uncertainty; Burst communication; LPI; maximum entropy technique (ID#:14-3236)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889320&isnumber=6889177
  • Chenguang Shi; Jianjiang Zhou; Fei Wang, "Low Probability Of Intercept Optimization For Radar Network Based On Mutual Information," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.683,687, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889331 This paper investigates the problem of low probability of intercept (LPI) design for radar network system and presents a novel LPI optimization strategy based on mutual information (MI) to improve the LPI performance for radar network. With the radar network system model, this paper would first derive Schleher intercept factor for radar network. Then, a novel LPI optimization strategy is proposed, where for a predefined threshold of MI to estimate the target parameters, Schleher intercept factor is minimized by optimizing transmission power allocation among netted radars in the network. Moreover, the nonlinear programming based genetic algorithm (NPGA) is employed to solve the resulting nonconvex and nonlinear optimization problem. Simulations demonstrate that our proposed scheme is valuable and effective to improve the LPI performance for radar network.
    Keywords: concave programming; genetic algorithms; nonlinear programming; parameter estimation; probability; radar theory; LPI design; LPI optimization strategy; MI; NPGA; Schleher intercept factor; low probability of intercept optimization; mutual information; netted radars; nonconvex optimization problem; nonlinear optimization problem; nonlinear programming based genetic algorithm; radar network system model; target parameter estimation; transmission power allocation; Optimization; Radar antennas; Radar cross-sections; Radar tracking; Resource management; Signal to noise ratio; Low probability of intercept (LPI); Schleher intercept factor; mutual information (MI); radar network (ID#:14-3237)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889331&isnumber=6889177
  • Qi Ding; Qian He; Zishu He; Blum, R.S., "Diversity Gain For MIMO-OTH Radar Target Detection Under Product Of Complex Gaussian Reflections," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.688,692, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889332 Consider a multiple-input multiple-output skywave over-the-horizon (MIMO-OTH) radar system withM transmit and N receive antennas employing the conventional optimal detector for a single complex Gaussian target. The signal from the mth transmit antenna reaches the target after being reflected by the ionosphere via Qm ray paths. Each of these multipath signals bounce off the target and reach the nth receiver after being reflected by the ionosphere again via Hmn ray paths. Thus the transmitted signals are reflected once off the target and twice by the ionosphere before arriving at the receive end, and any of these three reflections can be either categorized as being complex Gaussian or deterministic. If either one or two of the reflections are modeled as complex Gaussian while the others are modeled as deterministic, it is shown that the largest possible diversity gain is upper bounded by equation.
    Keywords: Gaussian processes; MIMO radar; diversity reception; radar detection; MIMO-OTH radar target detection; complex Gaussian reflection product; diversity gain; multiple input multiple output skywave; optimal detector; over-the-horizon radar system; single complex Gaussian target; Diversity methods; Ionosphere; Radar; Radar antennas; Receiving antennas; MIMO-OTH radar; complex Gaussian; diversity gain (ID#:14-3238)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889332&isnumber=6889177
  • Cai Xing-fu; Song Jian-she; Zhang Xiong-mei; Zheng Yong-an, "A Jamming Technique Against SAR Based On Inter-Pulse Subsection Randomly-Shift-Frequency And Its Application1," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.785,789, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889352 In order to ensure the safety of intelligence in important place, a jamming method against SAR based on inter-pulse subsection randomly-shift-frequency technique is brought forward. This technique can produce several noise-like jamming swathes in range direction, whose number is determined by the number of inter-pulse subsection. And, the position and width of the swathe are determined by frequency shifted. It can be concluded from the experiments that the number of subsections can't exceed 5; the centre of the shift-frequency can't exceed Br / 2 and the scope of the shift-frequency can't exceed Br / 4. In allusion to the phenomena of focusing on jamming technique but application, the application model of this technique brought forward in this paper is established, which followed the implement steps and method of this technique. The availability and advantage of this method is proved in the simulation experiments.
    Keywords: jamming; radar signal processing; synthetic aperture radar; SAR; inter-pulse subsection randomly-shift-frequency technique; jamming technique; noise-like jamming; range direction; synthetic aperture radar; Apertures; Azimuth; Coherence; Frequency modulation; Jamming; Synthetic aperture radar; Time-frequency analysis; Application; Randomly-shift-frequency; Subsection; Synthetic Aperture Radar (ID#:14-3239)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889352&isnumber=6889177
  • Lichen Zhang; Yingmin Wang; Aiping Huang, "Effect Of Seawater On Radiation Field Of Electric Dipole," Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, pp.800,803, 9-13 July 2014. doi: 10.1109/ChinaSIP.2014.6889355 The corrosion and corrosion resistance current of the submarine will produce extremely low frequency electric field after modulated by the propeller rotation in the seawater. It becomes one of the most important characteristics of the signal source. We derive the expression for the electric and magnetic fields of the electric dipole in the seawater using the electric Hertz vector, also give the expressions for the standard field. Measurements and numerical simulations show that the standard field amplitude of the submarine in the shaft frequency is in a great location. And the shaft - rate electric field can be received in a long distance. Therefore, submarine detection using the shaft - rate electric field can be probably best carried out.
    Keywords: corrosion resistance; electric fields; magnetic fields; object detection; propellers; seawater; shafts; signal sources; underwater vehicles; corrosion resistance current; electric Hertz vector; electric dipole; low frequency electric field; magnetic fields; propeller rotation; seawater effect; shaft rate electric field; submarine detection; Electric fields; Electromagnetic scattering; Frequency modulation; Shafts; Standards; Underwater vehicles; Vectors; electric dipole; extremely low frequency electric fields; seawater; shaft - rate electric field; submarine detection (ID#:14-3240)
    URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6889355&isnumber=6889177

Note:

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.