We present a new framework for embedding holographic halftone watermarking data into images by fusion of scale-related wavelet coefficients. The halftone watermarking image is obtained by using error-diffusion method and converted into Fresnel hologram, which is considered to be the initial password. After encryption, a scrambled watermarking image through Arnold transform is embedded into the host image during the halftoning process. We characterize the multi-scale representation of the original image using the discrete wavelet transform. The boundary information of the target image is fused by correlation of wavelet coefficients across wavelet transform layers to increase the pixel resolution scale. We apply the inter-scale fusion method to gain fusion coefficient of the fine-scale, which takes into account both the detail of the image and approximate information. Using the proposed method, the watermarking information can be embedded into the host image with recovery against the halftoning operation. The experimental results show that the proposed approach provides security and robustness against JPEG compression and different attacks compared to previous alternatives.
Shuang LIU Zhong ZHANG Baihua XIAO Xiaozhong CAO
Texture feature descriptors such as local binary patterns (LBP) have proven effective for ground-based cloud classification. Traditionally, these texture feature descriptors are predefined in a handcrafted way. In this paper, we propose a novel method which automatically learns discriminative features from labeled samples for ground-based cloud classification. Our key idea is to learn these features through mutual information maximization which learns a transformation matrix for local difference vectors of LBP. The experimental results show that our learned features greatly improves the performance of ground-based cloud classification when compared to the other state-of-the-art methods.
In this paper, we propose a method for reconstructing 3D sequential patterns from multiple images without knowing exact image correspondences and without calibrating linear camera sensitivity parameters on intensity. The sequential pattern is defined as a series of colored 3D points. We assume that the series of the points are obtained in multiple images, but the correspondence of individual points is not known among multiple images. For reconstructing sequential patterns, we consider a camera projection model which combines geometric and photometric information of objects. Furthermore, we consider camera projections in the frequency space. By considering the multi-view relationship on the new projection model, we show that the 3D sequential patterns can be reconstructed without knowing exact correspondence of individual image points in the sequential patterns; moreover, the recovered 3D patterns do not suffer from changes in linear camera sensitivity parameters. The efficiency of the proposed method is tested using real images.
The deployment of small cells is one of the most effective means to cope with the traffic explosion of cellular mobile systems. However, a small cell system increases the inter-cell interference, which limits the capacity and degrades the cell-edge user throughput. Inter-cell interference coordination (ICIC), such as fractional frequency reuse (FFR), is a well-known scheme that autonomously mitigates inter-cell interference. In the Long Term Evolution (LTE)-Advanced, the three-dimensional (3D) beamforming, which combines conventional horizontal beamforming and vertical beamforming, has been gaining increasing attention. This paper proposes a novel centralized ICIC scheme that controls the direction of narrow 3D beam for each frequency band of each base station. The centralized controller collects information from the base stations and calculates sub-optimum combinations of narrow beams so as to maximize the proportional fair (PF) utility of all users. This paper describes the throughput of the new centralized ICIC scheme as evaluated by computer simulations and shows it has a significant gain in both average user throughput and cell-edge user throughput compared with the conventional ICIC scheme. This paper also investigates the feasibility of the scheme by assessing its throughput performance in a realistic deployment scenario.
Xuemin YANG Zhi ZHENG Guangjun LI
In this paper, a new parameter estimator for coherently distributed (CD) noncircular (NC) signals is proposed, and can estimate both the central direction-of-arrivals (DOAs) and the angular spreads. It can also be considered as an extended version of the generalized Capon method by using both covariance matrix and an elliptic covariance matrix. The central DOAs and angular spreads are obtained by two-dimensional spectrum-peak searching. Numerical examples illustrate that the proposed method can estimate the central DOAs and the angular spreads when the number of signals is greater than the number of sensors. The proposed method also offers better performance than the methods against which it is compared.
Hajime UNO Sho ENDO Naofumi HOMMA Yu-ichi HAYASHI Takafumi AOKI
Electromagnetic analysis (EMA) against public-key cryptographic software on an embedded OS is presented in this paper. First, we propose a method for finding an observation point for EMA, where the EM radiation caused by cryptographic operations can be observed with low noise. The basic idea is to find specific EM radiation patterns produced by cryptographic operations given specific input pattern. During the operations, we scan the surface of the target device(s) with a micro magnetic probe. The scan is optimized in advanced using another compatible device that has the same central processing unit (CPU) and OS as the target device. We demonstrate the validity of the proposed EMAs through some EMA experiments with two types of RSA software on an embedded OS platform. The two types of RSA software have different implementations for modular multiplication algorithms: one is a typical and ready-made implementation using BigInteger class on Java standard library, and another is a custom-made implementation based on the Montgomery multiplication algorithm. We conduct experiments of chosen-message EMA using our scanning method, and show such EMAs successfully reveal the secret key of RSA software even under the noisy condition of the embedded OS platform. We also discuss some countermeasures against the above EMAs.
Shinichiro YAMAMOTO Kenichi HATAKEYAMA Takanori TSUTAOKA
This paper proposes reflection and transmission control panels using artificially designed materials. As the artificially designed material, finite- and infinite-length metal wire array sheets are used here. Laminated structures consisting of the metal wire array sheets and dielectric material are proposed. Reflection and transmission characteristics of these structures can be controlled by changing the metal wire parameters such as wire length, spacing gaps between the wires, and the dielectric material's thickness and relative permittivity. The reflection and transmission characteristics of the laminated structures are evaluated by measurements in free space and by transmission line theory.
Akihiro TATENO Tomoaki NAGAOKA Kazuyuki SAITO Soichi WATANABE Masaharu TAKAHASHI Koichi ITO
With the development and diverse use of wireless radio terminals, it is necessary to estimate the specific absorption rate (SAR) of the human body from such devices under various exposure situations. In particular, tablet computers may be used for a long time while placed near the abdomen. There has been insufficient evaluation of the SAR for the human body from tablet computers. Therefore, we investigated the SAR of various configurations of a commercial tablet computer using a numerical model with the anatomical structures of Japanese males and females, respectively. We find that the 10-g-averaged SAR of the tablet computer is strongly altered by the tablet's orientation, i.e., from -7.3dB to -22.6dB. When the tablet computer is moved parallel to the height direction, the relative standard deviations of the 10-g averaged SAR for the male and female models are within 40%. In addition, those for the different tilts of the computer are within 20%. The fluctuations of the 10-g-averaged SAR for the seated human models are within ±1.5dB in all cases.
Ryo OYAMA Shouhei KIDERA Tetsuo KIRIMOTO
Microwave imaging techniques, particularly for synthetic aperture radar (SAR), produce high-resolution terrain surface images regardless of the weather conditions. Focusing on a feature of complex SAR images, coherent change detection (CCD) approaches have been developed in recent decades that can detect invisible changes in the same regions by applying phase interferometry to pairs of complex SAR images. On the other hand, various techniques of polarimetric SAR (PolSAR) image analysis have been developed, since fully polarimetric data often include valuable information that cannot be obtained from single polarimetric observations. According to this background, various coherent change detection methods based on fully polarimetric data have been proposed. However, the detection accuracies of these methods often degrade in low signal-to-noise ratio (SNR) situations due to the lower signal levels of cross-polarized components compared with those of co-polarized ones. To overcome the problem mentioned above, this paper proposes a novel CCD method by introducing the Pauli decomposition and the weighting of component with their respective SNR. The experimental data obtained in anechoic chamber show that the proposed method significantly enhances the performance of the receiver operation characteristic (ROC) compared with that obtained by a conventional approach.
Kyungsun LEE Minseok KEUM David K. HAN Hanseok KO
It is unclear whether Hidden Markov Model (HMM) or Dynamic Time Warping (DTW) mapping is more appropriate for visual speech recognition when only small data samples are available. In this letter, the two approaches are compared in terms of sensitivity to the amount of training samples and computing time with the objective of determining the tipping point. The limited training data problem is addressed by exploiting a straightforward template matching via weighted-DTW. The proposed framework is a refined DTW by adjusting the warping paths with judicially injected weights to ensure a smooth diagonal path for accurate alignment without added computational load. The proposed WDTW is evaluated on three databases (two in the public domain and one developed in-house) for visual recognition performance. Subsequent experiments indicate that the proposed WDTW significantly enhances the recognition rate compared to the DTW and HMM based algorithms, especially under limited data samples.
Shinichiro NAKAMURA Shunsuke KOSHITA Masahide ABE Masayuki KAWAMATA
In this paper, we propose Affine Combination Lattice Algorithm (ACLA) as a new lattice-based adaptive notch filtering algorithm. The ACLA makes use of the affine combination of Regalia's Simplified Lattice Algorithm (SLA) and Lattice Gradient Algorithm (LGA). It is proved that the ACLA has faster convergence speed than the conventional lattice-based algorithms. We conduct this proof by means of theoretical analysis of the mean update term. Specifically, we show that the mean update term of the ACLA is always larger than that of the conventional algorithms. Simulation examples demonstrate the validity of this analytical result and the utility of the ACLA. In addition, we also derive the step-size bound for the ACLA. Furthermore, we show that this step-size bound is characterized by the gradient of the mean update term.
Kenta TSUKAMOTO Mizuki IWANAMI Eiji HANKUI
In this paper the amplitude probability distribution (APD) measurement method is applied to evaluate noise coupling to an antenna on an evaluation board that uses mixed RF and digital signals of an IC. We analytically investigate noise coupling path to the antenna where the correlation coefficient matches the APD curve of the evaluation board. Moreover, in order to verify the analysis results, the noise coupling path in the board is evaluated by measurements involving In-phase/Quadrature (I/Q) signals as well as electromagnetic simulations. As a result, we demonstrate that APD method is effective in evaluating a degree of noise coupling from an IC to multiple antennas on the board, and confirm that the intensity of noise coupling to each antenna is affected greatly by the board layout patterns.
Sen MORIYA Kana KIKUCHI Hiroshi SASANO
This paper considers a method for constructing good high-rate punctured convolutional codes through dual codes. A low-rate R=1/n convolutional code has a dual code identical to a punctured convolutional code with rate R=(n-1)/n. This implies that a low-rate R=1/n convolutional code encoder can help the search of punctured convolutional code encoders. This paper provides the procedures that obtain all the useful dual code encoders to a given CC with rate R=1/n easily, and the best PCC encoder with rate R=(n-1)/n among the encoders we derive from all the obtained dual code encoders. This paper also shows an example of the PCC the procedures obtain from some CC.
Takashi IMAGAWA Masayuki HIROMOTO Hiroyuki OCHI Takashi SATO
Time redundancy is sometimes an only option for enhancing circuit reliability when the circuit area is severely restricted. In this paper, a time-redundant error-correction scheme, which is particularly suitable for coarse-grained reconfigurable arrays (CGRAs), is proposed. It judges the correctness of the executions by comparing the results of two identical runs. Once a mismatch is found, the second run is terminated immediately to start the third run, under the assumption that the errors tend to persist in many applications, for selecting the correct result in the three runs. The circuit area and reliability of the proposed method is compared with a straightforward implementation of time-redundancy and a selective triple modular redundancy (TMR). A case study on a CGRA revealed that the area of the proposed method is 1% larger than that of the implementation for the selective TMR. The study also shows the proposed scheme is up to 2.6x more reliable than the full-TMR when the persistent error is predominant.
We introduce a coding theoretic criterion for Yamamoto's strong security of the ramp secret sharing scheme. After that, by using it, we show the strong security of the strongly multiplicative ramp secret sharing proposed by Chen et al. in 2008.
For the electric demand prediction problem, a modification mechanism of predicted demand data has been proposed in the previous work. In this paper, we analyze the performance of the modification mechanism in power balancing control. Then, we analytically derive an upper bound of the performance, which is characterized by system parameters and prediction precision.
RXv2 is the new generation of Renesas's processor architecture for microcontrollers with high-capacity flash memory. An enhanced instruction set and pipeline structure with an advanced fetch unit (AFU) provide an effective balance between power consumption performance and high processing performance. Enhanced instructions such as DSP function and floating point operation and a five-stage dual-issue pipeline synergistically boost the performance of digital signal applications. The RXv2 processor delivers 1.9 - 3.7 the cycle performance of the RXv1 in these applications. The decrease of the number of Flash memory accesses by AFU is a dominant determiner of reducing power consumption. AFU of RXv2 benefits from adopting branch target cache, which has a comparatively smaller area than that of typical cache systems. High code density delivers low power consumption by reducing instruction memory bandwidth. The implementation of RXv2 delivers up to 46% reduction in static code size, up to 30% reduction in dynamic code size relative to RISC architectures. RXv2 reaches 4.0 Coremark per MHz and operates up to 240MHz. The RXv2 processor delivers approximately more than 2.2 - 5.7x the power efficiency of the RXv1. The RXv2 microprocessor achieves the best possible computing performance in various applications such as building automation, medical, motor control, e-metering, and home appliances which lead to the higher memory capacity, frequency and processing performance.
Xin TAN Yu LIU Huaxin XIAO Maojun ZHANG
A cascaded video denoising method based on frame averaging is proposed in this paper. A novel segmentation approach using intensity and structure tensor is used for change compensation, which can effectively suppress noise while preserving the structure of an image. The cascaded framework solves the problem of noise residual caused by single-frame averaging. The classical Wiener filter is used for spatial denoising in changing areas. Our algorithm works in real-time on an FPGA, since it does not involve future frames. Experiments on standard grayscale videos for various noise levels demonstrate that the proposed method is competitive with current state-of-the-art video denoising algorithms on both peak signal-to-noise ratio and structural similarity evaluations, particularly when dealing with large-scale noise.
Leigang HUO Xiangchu FENG Chunlei HUO Chunhong PAN
Using traditional single-layer dictionary learning methods, it is difficult to reveal the complex structures hidden in the hyperspectral images. Motivated by deep learning technique, a deep dictionary learning approach is proposed for hyperspectral image denoising, which consists of hierarchical dictionary learning, feature denoising and fine-tuning. Hierarchical dictionary learning is helpful for uncovering the hidden factors in the spectral dimension, and fine-tuning is beneficial for preserving the spectral structure. Experiments demonstrate the effectiveness of the proposed approach.
Sen ZHONG Wei XIA Lingfeng ZHU Zishu HE
In the localization systems based on time difference of arrival (TDOA), multipath fading and the interference source will deteriorate the localization performance. In response to this situation, TDOA estimation based on blind beamforming is proposed in the frequency domain. An additional constraint condition is designed for blind beamforming based on maximum power collecting (MPC). The relationship between the weight coefficients of the beamformer and TDOA is revealed. According to this relationship, TDOA is estimated by discrete Fourier transform (DFT). The efficiency of the proposed estimator is demonstrated by simulation results.