The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

9201-9220hit(42807hit)

  • Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code

    Harumi MURATA  Akio OGIHARA  Masaki UESAKA  

     
    LETTER

      Vol:
    E98-D No:1
      Page(s):
    89-94

    Yajima et al. proposed a method based on amplitude and phase coding of audio signals. This method has relatively high sound quality because human auditory property is considered for embedding. However, in this method, the tolerance to attacks tends to be weak. Hence, we propose a high-tolerance watermarking method using BCH code which is one of error correcting code. This paper evaluates whether our method preserves the sound quality while ensuring high tolerance.

  • Mimetic Code Using Successive Additive Color Mixture

    Shigeyuki KOMURO  Shigeru KURIYAMA  Takao JINNO  

     
    LETTER

      Vol:
    E98-D No:1
      Page(s):
    98-102

    Multimedia contents can be enriched by introducing navigation with image codes readable by camera-mounted mobile devices such as smartphones. Data hiding technologies were utilized for embedding such codes to make their appearances inconspicuous, which can reduce esthetic damage on visual media. This article proposes a method of embedding two-dimensional codes into images based on successive color mixture for a blue-color channel. This technology can make the color of codes mimic those used on a cover image, while preserving their readability for current general purpose image sensors.

  • Person Re-Identification as Image Retrieval Using Bag of Ensemble Colors

    Lu TIAN  Shengjin WANG  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E98-D No:1
      Page(s):
    180-188

    Person re-identification is a challenging problem of matching observations of individuals across non-overlapping camera views. When pedestrians walk across disjoint camera views, continuous motion information is lost, and thus re-identification mainly relies on appearance matching. Person re-identification is actually a special case of near duplicate search in image retrieval. Given a probe, our task is to find the image containing the same person in galleries. At present many state-of-the-art methods in image retrieval are based on the Bag-of-Words (BOW) model. By adapting the BOW model to our task, Bag-of-Ensemble-Colors (BOEC) is proposed to tackle person re-identification in this paper. We combine low-level color histogram and semantic color names to represent human appearances. Meanwhile, some mature and efficient techniques in image retrieval are employed in the model containing soft quantization, burstiness punishing strategy, and negative evidence. In consideration apriori knowledge of human body structure, efficient spatial constraints are proposed to weaken the influence of background. Extensive experiments on VIPeR and ETHZ databases are performed to test the effectiveness of our approach, and promising results are obtained in the public databases. Compared with other unsupervised methods, we obtain state-of-the-art performances. The recognition rate is 32.23% on VIPeR dataset, 87% on ETHZ SEQ.#1, 83% on ETHZ SEQ.#2, and 91% on ETHZ SEQ.#3.

  • Real-Time Touch Controller with High-Speed Touch Accelerator for Large-Sized Touch Screens

    SangHyuck BAE  DoYoung JUNG  CheolSe KIM  KyoungMoon LIM  Yong-Surk LEE  

     
    LETTER-Human-computer Interaction

      Pubricized:
    2014/10/17
      Vol:
    E98-D No:1
      Page(s):
    193-196

    For a large-sized touch screen, we designed and evaluated a real-time touch microarchitecture using a field-programmable gate array (FPGA). A high-speed hardware accelerator based on a parallel touch algorithm is suggested and implemented in this letter. The touch controller also has a timing control unit and an analog digital convert (ADC) control unit for analog touch sensing circuits. Measurement results of processing time showed that the touch controller with its proposed microarchitecture is five times faster than the 32-bit reduced instruction set computer (RISC) processor without the touch accelerator.

  • Robust Segmentation of Highly Dynamic Scene with Missing Data

    Yinhui ZHANG  Zifen HE  Changyu LIU  

     
    LETTER-Pattern Recognition

      Pubricized:
    2014/09/29
      Vol:
    E98-D No:1
      Page(s):
    201-205

    Segmenting foreground objects from highly dynamic scenes with missing data is very challenging. We present a novel unsupervised segmentation approach that can cope with extensive scene dynamic as well as a substantial amount of missing data that present in dynamic scene. To make this possible, we exploit convex optimization of total variation beforehand for images with missing data in which depletion mask is available. Inpainting depleted images using total variation facilitates detecting ambiguous objects from highly dynamic images, because it is more likely to yield areas of object instances with improved grayscale contrast. We use a conditional random field that adapts to integrate both appearance and motion knowledge of the foreground objects. Our approach segments foreground object instances while inpainting the highly dynamic scene with a variety amount of missing data in a coupled way. We demonstrate this on a very challenging dataset from the UCSD Highly Dynamic Scene Benchmarks (HDSB) and compare our method with two state-of-the-art unsupervised image sequence segmentation algorithms and provide quantitative and qualitative performance comparisons.

  • In-Phase and Anti-Phase Synchronization Phenomena in Coupled Systems of Piecewise Constant Oscillators

    Keisuke SUZUKI  Tadashi TSUBONE  

     
    PAPER-Nonlinear Problems

      Vol:
    E98-A No:1
      Page(s):
    340-353

    In this paper, we consider synchronization phenomena in coupled systems of piecewise constant oscillators. Both in-phase and anti-phase synchronization phenomena are observed in the oscillators, which are coupled by a voltage controlled current source (VCCS) with Signum-like characteristic. On the other hand, their co-existence is observed in the oscillators coupled by a VCCS with hysteresis characteristic. We analyze the stability of the synchronization phenomena in the coupled systems by using a fast calculation algorithm for the rigorous solutions. And we clarify the parameter regions of in-phase and anti-phase synchronization by deriving correlation coefficients. We suggest that the synchronization phenomena of the proposed systems qualitatively correspond to one of van der Pol oscillators coupled by passive elements. Some theoretical results are verified in the experimental circuits.

  • A System for Measuring Gaze Movement and Hand Movement Simultaneously for Hand-Held Devices

    Hideaki TAKAHIRA  Kei KIKUCHI  Mitsuho YAMADA  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    51-61

    We develop a system for comprehensively evaluating the gaze motions of a person operating a small electronic device such as a PDA or tablet computer. When people operate small electronic devices, they hold the device in their hand and gaze at it. Their hand movements while holding the device are considered part of the movement involved in operating the device. Our measurement system uses a video camera image taken from behind the subject as a substitute for the view camera of an eye-tracking recorder. With our new system, it is also possible to measure the subject's gaze superimposed on the view image by directly inputting the display screen from a small electronic terminal or other display. We converted the subjects' head and hand movements into eye movements and we calculated the gaze from these values; we transformed the gaze coordinates into view image coordinates and superimposed each gaze on the view image. We examined this hand movement in relation to gaze movement by simultaneously measuring the gaze movement and hand movement. We evaluated the accuracy of the new system by conducting several experiments. We first performed an experiment testing gaze movement as the summation of head and eye movements, and then we performed an experiment to test the system's accuracy for measuring hand movements. From the result of experiments, less than approx. 6.1° accuracy was acquired in the horizontal 120° range and the perpendicular 90° range, and we found that the hand motions converted into the angle equivalent to gaze movement could be detected with approx. 1.2° accuracy for 5° and 10° hand movements. When the subjects' hand moved forward, the results were changed into the angle equivalent to gaze movement by converting the distance between the terminal and the subjects' eyes.

  • Future Channel Utilization-Aware Routing for Cognitive Radio Ad Hoc Networks

    Celimuge WU  Juan XU  Yusheng JI  Satoshi OHZAHATA  Toshihiko KATO  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    107-115

    Cognitive radio ad hoc networks can be used to solve the problems of limited available spectrum and inefficient spectrum usage by adaptively changing their transmission parameters. Routing protocol design has a significant impact on the network performance. However, an efficient protocol that takes account of primary user flows and the long-term channel assignment issue in route selection is still missing. In this paper, we propose AODV-cog, a cognitive routing protocol for CSMA/CA ad hoc networks based on AODV. AODV-cog chooses a route by considering the effect on the primary users, available channel bandwidth and link reliability. AODV-cog also takes account of future channel utilization which is an important but underexplored issue. AODV-cog switches channels for secondary user flows when network congestion occurs. We use theoretical analysis and computer simulations to show the advantage of AODV-cog over existing alternatives.

  • Data Embedding into Characters Open Access

    Koichi KISE  Shinichiro OMACHI  Seiichi UCHIDA  Masakazu IWAMURA  Marcus LIWICKI  

     
    INVITED PAPER

      Vol:
    E98-D No:1
      Page(s):
    10-20

    This paper reviews several trials of re-designing conventional communication medium, i.e., characters, for enriching their functions by using data-embedding techniques. For example, characters are re-designed to have better machine-readability even under various geometric distortions by embedding a geometric invariant into each character image to represent class label of the character. Another example is to embed various information into handwriting trajectory by using a new pen device, called a data-embedding pen. An experimental result showed that we can embed 32-bit information into a handwritten line of 5 cm length by using the pen device. In addition to those applications, we also discuss the relationship between data-embedding and pattern recognition in a theoretical point of view. Several theories tell that if we have appropriate supplementary information by data-embedding, we can enhance pattern recognition performance up to 100%.

  • Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding Property

    Kyungho SON  Dong-Guk HAN  Dongho WON  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E98-B No:1
      Page(s):
    160-170

    In this work we propose a two-party anonymous authenticated key exchange protocol that provides a communication binding property. The proposed protocol makes use of a compact structure to ensure key exchange and anonymity by adopting an anonymous implicit proof on the possession of a credential. We formally prove that the proposed protocol achieves anonymity, AKE-security, and a communication binding property. The protocol yields short communication messages and runs in two rounds. We show that our protocol is efficient via a comparison analysis with best-known anonymous authenticated key exchange protocols.

  • Distance-Based Fair Resource Allocation Algorithm for Device-to-Device Multicast Communication in SFN System

    Wenrong GONG  Xiaoxiang WANG  Mingming LI  Zijia HUANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:1
      Page(s):
    252-259

    Device-to-device (D2D) multicast communication is a useful way to improve the communication efficiency of local services. This study considers a scenario of D2D multicast communication in a single frequency network (SFN) system and investigates the frequency resource allocation problem. Firstly, we propose that D2D user equipments (DUEs) do not share frequency with cellular user equipments (CUEs) in the same SFN, but reuse frequency with CUEs in other SFNs, by which the interference between D2D and cellular communications can be avoided. Then, under the principle that two nearest D2D multicast groups cannot reuse the same frequency, the study develops a distance-based fair frequency resource allocation (DFRA) algorithm. The DFRA algorithm ensures control of the interference within a reasonable range and fairly allocate the available frequency resources to the D2D multicast groups. Numerical simulation results show that the proposed resource allocation algorithm is effective in improving the data rate and reducing the outage probability for D2D communications.

  • Object Extraction Using an Edge-Based Feature for Query-by-Sketch Image Retrieval

    Takuya TAKASU  Yoshiki KUMAGAI  Gosuke OHASHI  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2014/10/15
      Vol:
    E98-D No:1
      Page(s):
    214-217

    We previously proposed a query-by-sketch image retrieval system that uses an edge relation histogram (ERH). However, it is difficult for this method to retrieve partial objects from an image, because the ERH is a feature of the entire image, not of each object. Therefore, we propose an object-extraction method that uses edge-based features in order to enable the query-by-sketch system to retrieve partial images. This method is applied to 20,000 images from the Corel Photo Gallery. We confirm that retrieval accuracy is improved by using the edge-based features for extracting objects, enabling the query-by-sketch system to retrieve partial images.

  • A Design Strategy of Error-Prediction Low-Density Parity-Check (EP-LDPC) Error-Correcting Code (ECC) and Error-Recovery Schemes for Scaled NAND Flash Memories

    Shuhei TANAKAMARU  Masafumi DOI  Ken TAKEUCHI  

     
    PAPER-Integrated Electronics

      Vol:
    E98-C No:1
      Page(s):
    53-61

    A design strategy (the required ECC strength and the judgment method of the dominant error mode) of error-prediction low-density parity-check (EP-LDPC) error-correcting code (ECC) and error-recovery schemes for scaled NAND flash memories is discussed in this paper. The reliability characteristics of NAND flash memories are investigated with 1X, 2X and 3Xnm NAND flash memories. Moreover, the system-level reliability of SSDs is analyzed from the acceptable data-retention time of the SSD. The reliability of the NAND flash memory is continuously degrading as the design rule shrinks due to various problems. As a result, future SSDs will not be able to maintain system-level reliability unless advanced ECCs with signal processing are adopted. Therefore, EP-LDPC and error-recovery (ER) schemes are previously proposed to improve the reliability. The reliability characteristics such as the bit-error rate (BER) versus the data-retention time and the effect of the cell-to-cell interference on the BER are measured. These reliability characteristics obtained in this paper are stored in an SSD as a reliability table, which plays a principal role in EP-LDPC scheme. The effectiveness of the EP-LDPC scheme with the scaling of the NAND flash memory is also discussed by analyzing the cell-to-cell interference. An interference factor $alpha$ is proposed to discuss the impact of the cell-to-cell coupling. As a result, the EP-LDPC scheme is assumed to be effective down to 1Xnm NAND flash memory. On the other hand, the ER scheme applies different voltage pulses to memory cells, according to the dominant error mode: program-disturb or data-retention error dominant mode. This paper examines when the error mode changes, corresponding to which pulse should be applied. Additionally, the estimation methods of the dominant error mode by ER scheme are also discussed. Finally, as a result of the system-level reliability analysis, it is concluded that the use of the EP-LDPC scheme can maintain the reliability of the NAND flash memory in 1Xnm technology node.

  • Key Update Mechanism Using All-or-Nothing Transform for Network Storage of Encrypted Data

    Dai WATANABE  Masayuki YOSHINO  

     
    PAPER-Foundation

      Vol:
    E98-A No:1
      Page(s):
    162-170

    Cryptography is now popularized and is widely used anywhere for many aims such as data confidentiality and integrity. The cryptographic key has a limited lifetime. For example, the National Institute of Standards and Technology published SP800-57 in order to provide cryptographic key management guidance, and it strictly limits the lifetime of the cryptographic key and the lifetime of encrypted data. That means, the data encryption key is required to be periodically updated and the associated encrypted data is required to be re-encrypted with the new key each time. The cost, especially network traffic, is crucial if the encrypted data is away from the key. In this paper we discuss what to be achieved by key updating and propose a key update mechanism reducing the communication and computation cost of re-encryption.

  • Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation

    Ryo KIKUCHI  Koji CHIDA  Dai IKARASHI  Wakaha OGATA  Koki HAMADA  Katsumi TAKAHASHI  

     
    PAPER-Foundation

      Vol:
    E98-A No:1
      Page(s):
    213-222

    Secret sharing scheme (SS) has been extensively studied since SSs are important not only for secure data storage but also as a fundamental building block for multiparty computation (MPC). For an application to secure data storage, the share size of SS is an important factor. For an application to a building block for MPC, the extendibility to MPC is needed. Computationally secure SSs and a ramp scheme have a small share size but there have been few studies concerning their MPC. In contrast, there have been many studies about MPC on Shamir's and replicated SSs while their share size is large. We consider an application scenario of SS such as applying SSs to secure data storage service with MPC. In this application, users store their data in servers through SS, and sometimes the servers perform MPC as an optional feature. In this case, the extendibility to MPC is needed and good code-efficiency is preferable. We propose a new computational SS, and show how to convert shares of our SS and a ramp SS to those of multiparty-friendly SS such as Shamir's and replicated SS. This enables one to secretly-share data compactly and extend secretly-shared data to MPC if needed.

  • Localizing Sensors from Their Responses to Targets Open Access

    Shigeo SHIODA  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    145-152

    The spatial relations between sensors placed for target detection can be inferred from the responses of individual sensors to the target objects. Motivated by this fact, this paper proposes a method for estimating the location of sensors by using their responses to target objects. The key idea of the proposal is that when two or more sensors simultaneously detect an object, the distances between these sensors are assumed to be equal to a constant called the basic range. Thus, new pieces of proximity information are obtained whenever an object passes over the area in which the sensors are deployed. This information is then be aggregated and transformed into a two dimensional map of sensors by solving a nonlinear optimization problem, where the value of the basic range is estimated together. Simulation experiments verify that the proposed algorithm yields accurate estimates of the locations of sensors.

  • Multi-Label Learning Using Mathematical Programming

    Hyunki LIM  Jaesung LEE  Dae-Won KIM  

     
    LETTER-Pattern Recognition

      Pubricized:
    2014/09/29
      Vol:
    E98-D No:1
      Page(s):
    197-200

    We propose a new multi-label feature selection method that does not require the multi-label problem to be transformed into a single-label problem. Using quadratic programming, the proposed multi-label feature selection algorithm provides markedly better learning performance than conventional methods.

  • Cryptanalysis of the Quaternion Rainbow

    Yasufumi HASHIMOTO  

     
    PAPER-Public Key Based Cryptography

      Vol:
    E98-A No:1
      Page(s):
    144-152

    Rainbow is one of signature schemes based on the problem solving a set of multivariate quadratic equations. While its signature generation and verification are fast and the security is presently sufficient under suitable parameter selections, the key size is relatively large. Recently, Quaternion Rainbow — Rainbow over a quaternion ring — was proposed by Yasuda, Sakurai and Takagi (CT-RSA'12) to reduce the key size of Rainbow without impairing the security. However, a new vulnerability emerges from the structure of quaternion ring; in fact, Thomae (SCN'12) found that Quaternion Rainbow is less secure than the same-size original Rainbow. In the present paper, we further study the structure of Quaternion Rainbow and show that Quaternion Rainbow is one of sparse versions of the Rainbow. Its sparse structure causes a vulnerability of Quaternion Rainbow. Especially, we find that Quaternion Rainbow over even characteristic field, whose security level is estimated as about the original Rainbow of at most 3/4 by Thomae's analysis, is almost as secure as the original Rainbow of at most 1/4-size.

  • Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist

    Yu SASAKI  

     
    PAPER-Symmetric Key Based Cryptography

      Vol:
    E98-A No:1
      Page(s):
    61-71

    In this paper, generic attacks are presented against hash functions that are constructed by a hashing mode instantiating a Feistel or generalized Feistel networks with an SP-round function. It is observed that the omission of the network twist in the last round can be a weakness against preimage attacks. The first target is a standard Feistel network with an SP round function. Up to 11 rounds can be attacked in generic if a condition on a key schedule function is satisfied. The second target is a 4-branch type-2 generalized Feistel network with an SP round function. Up to 15 rounds can be attacked in generic. These generic attacks are then applied to hashing modes of ISO standard ciphers Camellia-128 without FL and whitening layers and CLEFIA-128.

  • Hue-Preserving Unsharp-Masking for Color Image Enhancement

    Zihan YU  Kiichi URAHAMA  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2014/09/22
      Vol:
    E97-D No:12
      Page(s):
    3236-3238

    We propose an unsharp-masking technique which preserves the hue of colors in images. This method magnifies the contrast of colors and spatially sharpens textures in images. The contrast magnification ratio is adaptively controlled. We show by experiments that this method enhances the color tone of photographs while keeping their perceptual scene depth.

9201-9220hit(42807hit)