This paper describes a method of free iris and focus image generation based on transformation integrating multiple differently focused images. First, we assume that objects are defocused by a geometrical blurring model. And we combine acquired images on certain imaging planes and spatial information of objects by using a convolution of a three-dimensional blur. Then, based on spatial frequency analysis of the blur, we design three-dimensional filters that generate free iris and focus images from the acquired images. The method enables us to generate not only an all-in-focus image corresponding to an ideal pin-hole iris but also various images, which would be acquired with virtual irises whose sizes are different from the original one. In order to generate a certain image by using multiple differently focused images, especially very many images, conventional methods usually analyze focused regions of each acquired image independently and construct a depth map. Then, based on the map, the regions are merged into a desired image with some effects. However, generally, it is so difficult to conduct such depth estimation robustly in all regions that these methods cannot prevent merged results from including visible artifacts, which decrease the quality of generated images awfully. In this paper, we propose a method of generating desired images directly and robustly from very many differently focused images without depth estimation. Simulations of image generation are performed utilizing synthetic images to study how certain parameters of the blur and the filter affect the quality of generated images. We also introduce pre-processing that corrects the size of acquired images and a simple method for estimating the parameter of the three-dimensional blur. Finally, we show experimental results of free iris and focus image generation from real images.
Chih-Hung LIN Wen-Shyong HSIEH
This paper presents a secure and simple content-based digital signature method for verifying the image authentication under JPEG, JPEG2000 compression and scaling based on a novel concept named lowest authenticable difference (LAD). The whole method, which is extended from the crypto-based digital signature scheme, mainly consists of statistical analysis and signature generation/verification. The invariant features, which are generated from the relationship among image blocks in the spatial domain, are coded and signed by the sender's private key to create a digital signature for each image, regardless of the image size. The main contributions of the proposed scheme are: (1) only the spatial domain is adopted during feature generation and verification, making domain transformation process unnecessary; (2) more non-malicious manipulated images (JPEG, JPEG2000 compressed and scaled images) than related studies can be authenticated by LAD, achieving a good trade-off of image authentication between fragile and robust under practical image processing; (3) non-malicious manipulation is clearly defined to meet closely the requirements of storing images or sending them over the Internet. The related analysis and discussion are presented. The experimental results indicate that the proposed method is feasible and effective.
Junichi TAKAHARA Fuminori KUSUNOKI
Guiding and nanofocusing of a two-dimensional (2D) optical beam in a negative-dielectric-gap waveguide is studied theoretically. An index-guiding method along the dielectric core embedded in the negative-dielectric-gap is proposed and the confinement properties of the 2D optical beam are studied by the effective-refractive-index method and FDTD simulations. We have shown that the lateral beam width of the 2D optical beam can be shrunk to zero beyond the diffraction limit. A tapered negative-dielectric-gap waveguide using adiabatic propagation achieves nano-focusing and can be applied to nano-optical couplers. This is a gateway from conventional dielectric waveguides to nano-optical integrated circuits.
Yu SASAKI Yusuke NAITO Noboru KUNIHIRO Kazuo OHTA
At Eurocrypt'05, Wang et al. presented efficient collision attacks on MD5 and MD4 hash functions. They found a collision of MD5 with a complexity of less than 237 MD5 hash operations, and a collision of MD4 with complexity less than 28 MD4 hash operations. In their attack, the procedure to generate a collision is divided into 4 steps. First, they determine the message differential and output differentials of chaining variables in each step, which generates a collision with small complexity. Second, they construct sufficient conditions that guarantee that the desired differential is always calculated. Third, they find a message modification that can satisfy the sufficient conditions with high probability. Finally, they search for a message that satisfies all sufficient conditions. In this paper, we focus on the message modification of MD5 and MD4, and propose a new message modification. Using our message modification, a collision of MD5 can be found with complexity less than 229 MD5 hash operations, and a collision of MD4 can be found with complexity less than 3 MD4 hash operations. To improve the complexity from previous attacks, we mainly use two ideas. The first idea is to use message modification that can satisfy more sufficient conditions in the second round than in previous attacks. The second idea is to use message modification that can enable us to search for a collision starting from an intermediate step.
Young-Ho SEO Hyun-Jun CHOI Jin-Woo BAE Hoon-Jong KANG Seung-Hyun LEE Ji-Sang YOO Dong-Wook KIM
In this paper, we proposed an efficient coding method for digital hologram (fringe pattern) acquired with a CCD camera or by computer generation using multi-view prediction and MPEG video compression standard techniques. It processes each R, G, or B color component separately. The basic processing unit is a partial image segmented as the size of MN. Each partial image retains the information of the whole object. This method generates an assembled image for a column of the segmented and frequency-transformed partial images, which is the basis of the coding process. That is, a motion estimation and compensation technique of MPEG is applied between the reconstructed images from the assembled images with the disparities found during generation of assembled image and the original partial images. Therefore the compressed results are the disparity of each partial image to form the assembled image for the corresponding column, assembled image, and the motion vectors and the compensated image for each partial image. The experimental results with the implemented algorithm showed that the proposed method has NC (Normalized Correlation) values about 4% higher than the previous method at the same compression ratios, which convinced us that ours has better compression efficiency. Consequently, the proposed method is expected to be used effectively in the application areas to transmit or store in digital format the digital hologram data.
Koji OBATA Kazuyoshi TAKAGI Naofumi TAKAGI
We propose a new method of logic synthesis for dual-rail RSFQ (rapid single-flux-quantum) digital circuits. RSFQ circuit technology is one of the strongest candidates for the next generation technology of digital circuits. For representing logic functions, we use a root-shared binary decision diagram (RSBDD) which is a directed acyclic graph constructed from binary decision diagrams. In the method, first we construct an RSBDD from given logic functions, and then reduce the number of nodes in the constructed RSBDD by variable re-ordering. Finally, we synthesize a dual-rail RSFQ circuit from the reduced RSBDD. We have implemented the method and have synthesized benchmark circuits. We have synthesized dual-rail circuits that consist of about 27% fewer logic elements than those synthesized by a Transduction-based method on average.
Jianfeng XU Hong LI Wen-Yan YIN Junfa MAO Le-Wei LI
The element-by-element finite element method (EBE-FEM) combined with the preconditioned conjugate gradient (PCG) technique is employed in this paper to calculate the coupling capacitances of multi-level high-density three-dimensional interconnects (3DIs). All capacitive coupling 3DIs can be captured, with the effects of all geometric and physical parameters taken into account. It is numerically demonstrated that with this hybrid method in the extraction of capacitances, an effective and accurate convergent solution to the Laplace equation can be obtained, with less memory and CPU time required, as compared to the results obtained by using the commercial FEM software of either MAXWELL 3D or ANSYS.
Shen LI Lingfeng LI Takeshi IKENAGA Shunichi ISHIWATA Masataka MATSUI Satoshi GOTO
The coexistence of MPEG-2 and its powerful successor H.264/AVC has created a huge need for MPEG-2/H.264 video transcoding. However, a traditional transcoder where an MPEG-2 decoder is simply cascaded to an H.264 encoder requires huge computational power due to the adoption of a complicated rate-distortion based mode decision process in H.264. This paper proposes a 2-D Sobel filter based motion vector domain method and a DCT domain method to measure macroblock complexity and realize content-based H.264 candidate mode decision. A new local edge based fast INTRA prediction mode decision method is also adopted to boost the encoding efficiency. Simulation results confirm that with the proposed methods the computational burden of a traditional transcoder can be reduced by 20%30% with only a negligible bit-rate increase for a wide range of video sequences.
Junghyun NAM Seungjoo KIM Sangjoon PARK Dongho WON
A remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted, open network. Recently, Lee et al. have proposed an efficient nonce-based scheme for remote user authentication using smart cards. This work reviews Lee et al.'s authentication scheme and provides a security analysis on the scheme. Our analysis shows that Lee et al.'s scheme does not achieve its basic aim of authenticating remote users and furthermore has a very hazardous method for changing passwords. In addition, we recommend some changes to the scheme so that it can attain at least its main security goal.
Masashi NAKAO Kenta MATSUI Ikutaro KOBAYASHI Mitsuru NAGANUMA Masayuki IZUTSU
In this paper, we describe detailed experimental demonstrations of blue/violet light generation by the injection of ultrashort optical pulses into photonic crystal fibers (PCFs). Two lightwaves appear one on each side of the injected pulses in the spectral domain. They simultaneously evolve in the PCFs, changing their center wavelengths so as to spectrally stand apart from each other. Such behaviors are explained on the basis of the theory of nonlinear optics. The final center-wavelength difference between the two lightwaves at the end of the PCFs, depending on the power density of the injected pulse, is increased up to a limit imposed by the PCFs. Owing to this increase, the shorter wavelength limit reaches approximately 400 nm, which shows that short-pulse injection in PCFs is a promising method of realizing simple blue/violet light sources.
Min-Hang WENG Hung-Wei WU Kevin SHU Ru-Yuan YANG Yan-Kuin SU
Novel dual-band bandpass filter (BPF) with quasi-elliptic function response by using the meander coupled step-impedance resonators (SIRs) is presented. By tuning the appropriate impedance ratio (K) and physical length of SIRs, the BPF has good dual-band performance at 2.4 and 5.2 GHz with high selectivity, due to the transmission zeros appeared in two passband edges. Measured results of the proposed BPF have a good agreement with the electromagnetic (EM) simulated results.
We determine the annealing dynamics of AsGa antisite defects in As ion-implanted GaAs. An Arrhenius plot of the carrier decay rate or the defect density vs. the annealing temperature in the high temperature regime gives an energy EPA, which is different from true activation energy. The annealing time dependence of EPA obtained by the two diffusion models (self diffusion of AsGa antisite defects and VGa vacancy assisted diffusion of AsGa antisite defects) are compared with EPA's obtained from already published works. The results prove that the diffusion of AsGa antisite defects is assisted by the VGa vacancy defects that exist in a high density.
Kwan-Joo MYOUNG Soo-Young SHIN Hong-Seong PARK Wook-Hyun KWON
In this paper, the performance of IEEE 802.11b WLAN under the interference of IEEE 802.15.4 WPAN is analyzed. An analytic model for the coexistence of IEEE 802.15.4 and IEEE 802.11b is presented. Packet error rate, average transmission time, and throughput are evaluated.
Akira TSUCHIYA Masanori HASHIMOTO Hidetoshi ONODERA
This paper proposes a method to determine a single frequency for interconnect RL extraction. Resistance and inductance of interconnects depend on frequency, and hence the extraction frequency strongly affects the modeling accuracy of interconnects. The proposed method determines an extraction frequency based on the transfer characteristic of interconnects. By choosing the frequency where the transfer characteristic becomes maximum, the extracted RL values achieve the accurate modeling of the waveform. Experimental results show that the proposed method provides accurate transition waveforms over various interconnect topologies.
Tohru SHIMAOKA Hiroaki KOBAYASHI Kazuki YAMASHITA Yasuo OHDAIRA Kazunari SHINBO Keizo KATO Futao KANEKO
Molecular aligned naphthacene thins films were fabricated using vacuum evaporation and the rubbing method. The attenuated total reflection (ATR) and emission light properties from surface plasmon (SP) excitation due to molecular luminescence were investigated for these films. The long axis of the rod-like molecule was estimated to align perpendicular to the rubbing direction. The ATR and emission light properties depended on the molecular orientation.
A new 4B5B block inversion coding is proposed for dc-balanced transmission in high-speed optical parallel links. An 8-bit byte is partitioned into two 4-bit data and converted to two 5-bit blocks by an inversion encoding. The proposed coding greatly reduces circuit complexity with the minimum latency overhead of one clock for the encoder and none for the decoder. The maximum run length is 11.
Katsuyuki HAGIWARA Hiroshi ISHITANI
In this article, we considered the asymptotic expectations of the prediction error and the fitting error of a regression model, in which the component functions are chosen from a finite set of orthogonal functions. Under the least squares estimation, we showed that the asymptotic bias in estimating the prediction error based on the fitting error includes the true number of components, which is essentially unknown in practical applications. On the other hand, under a suitable shrinkage method, we showed that an asymptotically unbiased estimate of the prediction error is given by the fitting error plus a known term except the noise variance.
Peng CAI Zhewang MA Xuehui GUAN Yoshio KOBAYASHI Tetsuo ANADA
A novel wideband bandpass filter with improved stopband characteristics is presented in this paper. Dual-mode square ring resonator is used in the proposed filter. New formulas based on the even- and odd-mode analysis are derived to facilitate the design of transmission zeros of the square ring resonator. A short-circuited stub and a piece of aperture-enhanced parallel-coupled lines are introduced to the input and output of the resonator to lower the passband return loss and widen the stopband of the filter significantly. The filter has a 50% fractional bandwidth, is compact in configuration, and shows remarkably improved performance compared with previously reported filters of the same kind. The measured filtering response shows a good agreement with the simulated result.
This paper presents a numerical analysis of reverse link capacity by obtaining a closed form of ICI (InterCell Interference) over OFDM (Orthogonal Frequency Division Multiplexing)-based broadband wireless networks. In the analysis, shadowing factors are taken into account for determining the home BS (Base Station) of each MS (Mobile Station) over multicell environments. Under the consideration, a more accurate analysis of link capacity can be performed compared to Gilhousen's approximation. In the numerical results, it turns out that the actual interference is lower than Gilhousen's approximation with a decrease of around 20% in the interference.
Haruhito YOSHIDA Fumiaki MAEHARA Fumio TAKAHATA
This letter presents an iterative decision feedback channel estimation scheme for burst mode COFDM transmission. The feature of the proposed scheme is that the channel estimation using metrics comparison is applied to the initial stage of the iterative mechanism, which makes it possible to provide a reliable data stream at the initial stage. Computer simulation results show that the proposed approach provides better BER than the traditional iterative decision feedback channel estimation scheme irrespective of the number of iterations.