%0 Journal Article
%J Information Forensics and Security, IEEE Transactions on
%D 2006
%T Joint coding and embedding techniques for MultimediaFingerprinting
%A He,Shan
%A M. Wu
%K coding-embedding
%K coding;
%K collusion-resistant
%K complexity;
%K computational
%K data;
%K DETECTION
%K embedded
%K EMBEDDING
%K fingerprinting;
%K group-based
%K image
%K joint
%K multimedia
%K of
%K Security
%K subsegment
%K systems;
%K technique;
%K techniques;
%X Digital fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. The collusion attack is a powerful attack where several different fingerprinted copies of the same content are combined together to attenuate or even remove the fingerprints. One major category of collusion-resistant fingerprinting employs an explicit step of coding. Most existing works on coded fingerprinting mainly focus on the code-level issues and treat the embedding issues through abstract assumptions without examining the overall performance. In this paper, we jointly consider the coding and embedding issues for coded fingerprinting systems and examine their performance in terms of collusion resistance, detection computational complexity, and distribution efficiency. Our studies show that coded fingerprinting has efficient detection but rather low collusion resistance. Taking advantage of joint coding and embedding, we propose a permuted subsegment embedding technique and a group-based joint coding and embedding technique to improve the collusion resistance of coded fingerprinting while maintaining its efficient detection. Experimental results show that the number of colluders that the proposed methods can resist is more than three times as many as that of the conventional coded fingerprinting approaches.
%B Information Forensics and Security, IEEE Transactions on
%V 1
%P 231 - 247
%8 2006/06//
%@ 1556-6013
%G eng
%N 2
%R 10.1109/TIFS.2006.873597
%0 Conference Paper
%B Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on
%D 2005
%T Flattening curved documents in images
%A Liang,Jian
%A DeMenthon,D.
%A David Doermann
%K calibration;
%K camera
%K character
%K content;
%K curved
%K distortion;
%K document
%K document;
%K image
%K images;
%K OCR
%K optical
%K page
%K pictures;
%K printed
%K processing;
%K recognition;
%K restoration;
%K scanned
%K techniques;
%K textual
%K warping;
%X Compared to scanned images, document pictures captured by camera can suffer from distortions due to perspective and page warping. It is necessary to restore a frontal planar view of the page before other OCR techniques can be applied. In this paper we describe a novel approach for flattening a curved document in a single picture captured by an uncalibrated camera. To our knowledge this is the first reported method able to process general curved documents in images without camera calibration. We propose to model the page surface by a developable surface, and exploit the properties (parallelism and equal line spacing) of the printed textual content on the page to recover the surface shape. Experiments show that the output images are much more OCR friendly than the original ones. While our method is designed to work with any general developable surfaces, it can be adapted for typical special cases including planar pages, scans of thick books, and opened books.
%B Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on
%V 2
%P 338 - 345 vol. 2 - 338 - 345 vol. 2
%8 2005/06//
%G eng
%R 10.1109/CVPR.2005.163
%0 Conference Paper
%B INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE
%D 2005
%T Measurement-based multipath multicast
%A Guven,T.
%A La,R.J.
%A Shayman,M.A.
%A Bhattacharjee, Bobby
%K algorithm;
%K allocation;
%K application-layer
%K approximation
%K approximation;
%K balance
%K communication;
%K Convergence
%K convergence;
%K intradomain
%K load
%K measurement-based
%K methods;
%K Multicast
%K multipath
%K network
%K numerical
%K of
%K overlaying;
%K perturbation
%K processes;
%K resource
%K Routing
%K routing;
%K source;
%K Stochastic
%K techniques;
%K Telecommunication
%K theory;
%K traffic;
%X We propose a measurement-based routing algorithm to load balance intradomain traffic along multiple paths for multiple multicast sources. Multiple paths are established using application-layer overlaying. The proposed algorithm is able to converge under different network models, where each model reflects a different set of assumptions about the multicasting capabilities of the network. The algorithm is derived from simultaneous perturbation stochastic approximation and relies only on noisy estimates from measurements. Simulation results are presented to demonstrate the additional benefits obtained by incrementally increasing the multicasting capabilities.
%B INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE
%V 4
%P 2803 - 2808 vol. 4 - 2803 - 2808 vol. 4
%8 2005/03//
%G eng
%R 10.1109/INFCOM.2005.1498566
%0 Conference Paper
%B Information Fusion, 2005 8th International Conference on
%D 2005
%T A new approach to image fusion based on cokriging
%A Memarsadeghi,N.
%A Le Moigne,J.
%A Mount, Dave
%A Morisette,J.
%K ALI;
%K analysis;
%K based
%K cokriging;
%K component
%K data;
%K forecasting
%K fusion
%K fusion;
%K geophysical
%K geostatistical
%K Hyperion
%K image
%K Interpolation
%K interpolation;
%K invasive
%K ISFS
%K method;
%K metrics;
%K PCA;
%K principal
%K processing;
%K project;
%K QUALITY
%K quantitative
%K remote
%K remotely
%K sensed
%K sensing;
%K sensor
%K sensors;
%K signal
%K species
%K system;
%K techniques;
%K transforms;
%K wavelet
%K wavelet-based
%X We consider the image fusion problem involving remotely sensed data. We introduce cokriging as a method to perform fusion. We investigate the advantages of fusing Hyperion with ALI. This evaluation is performed by comparing the classification of the fused data with that of input images and by calculating well-chosen quantitative fusion quality metrics. We consider the invasive species forecasting system (ISFS) project as our fusion application. The fusion of ALI with Hyperion data is studied using PCA and wavelet-based fusion. We then propose utilizing a geostatistical based interpolation method called cokriging as a new approach for image fusion.
%B Information Fusion, 2005 8th International Conference on
%V 1
%P 8 pp. - 8 pp.
%8 2005/07//
%G eng
%R 10.1109/ICIF.2005.1591912
%0 Journal Article
%J Signal Processing Magazine, IEEE
%D 2004
%T Collusion-resistant fingerprinting for multimedia
%A M. Wu
%A Trappe,W.
%A Wang,Z.J.
%A Liu,K. J.R
%K attacks;
%K colluder
%K collusion
%K collusion-resistant
%K content;
%K correlated
%K data;
%K digital
%K fingerprinting;
%K identification;
%K multimedia
%K multiuser
%K of
%K orthogonal
%K policies;
%K rights
%K Security
%K systems;
%K techniques;
%K tracing;
%K watermarking
%K watermarking;
%X Digital fingerprinting is a technology for enforcing digital rights policies whereby unique labels, known as digital fingerprints, are inserted into content prior to distribution. For multimedia content, fingerprints can be embedded using conventional watermarking techniques that are typically concerned with robustness against a variety of attacks mounted by an individual. These attacks, known as multiuser collusion attacks, provide a cost-effective method for attenuating each of the colluder's fingerprints and poses a real threat to protecting media data and enforcing usage policies. In this article, we review some major design methodologies for collusion-resistant fingerprinting of multimedia and highlight common and unique issues of different fingerprinting techniques. It also provides detailed discussions on the two major classes of fingerprinting strategies, namely, orthogonal fingerprinting and correlated fingerprinting.
%B Signal Processing Magazine, IEEE
%V 21
%P 15 - 27
%8 2004/03//
%@ 1053-5888
%G eng
%N 2
%R 10.1109/MSP.2004.1276103
%0 Conference Paper
%B Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE
%D 2004
%T Dynamic distortion control for 3-D embedded wavelet video over multiuser OFDM networks
%A Su,Guan-Ming
%A Han,Zhu
%A M. Wu
%A Liu,K. J.R
%K 3D
%K 802.11a;
%K channels;
%K codec;
%K codecs;
%K communication;
%K control;
%K deviation;
%K distortion
%K diversity
%K diversity;
%K downlink
%K dynamic
%K embedded
%K fairness;
%K Frequency
%K IEEE
%K LAN;
%K maximal
%K minimax
%K minimization;
%K modulation;
%K multimedia
%K multiuser
%K OFDM
%K OFDM;
%K PSNR
%K rate
%K reception;
%K streaming;
%K systems;
%K techniques;
%K theory;
%K TIME
%K transforms;
%K video
%K video;
%K wavelet
%K wireless
%X In this paper, we propose a system to transmit multiple 3D embedded wavelet video programs over downlink multiuser OFDM. We consider the fairness among users and formulate the problem as minimizing the users' maximal distortion subject to power, rate, and subcarrier constraints. By exploring frequency, time, and multiuser diversity in OFDM and flexibility of the 3D embedded wavelet video codec, the proposed algorithm can achieve fair video qualities among all users. Compared to a scheme similar to the current multiuser OFDM standard (IEEE 802.11a), the proposed scheme outperforms it by 1-5 dB on the worst received PSNR among all users and has much smaller PSNR deviation.
%B Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE
%V 2
%P 650 - 654 Vol.2 - 650 - 654 Vol.2
%8 2004/12/03/nov
%G eng
%R 10.1109/GLOCOM.2004.1378042
%0 Conference Paper
%B Parallel Architectures, Algorithms and Networks, 2004. Proceedings. 7th International Symposium on
%D 2004
%T Strategies for exploring large scale data
%A JaJa, Joseph F.
%K algorithms;
%K association;
%K asymptotic
%K bounds;
%K business
%K data
%K data;
%K database
%K databases;
%K demographic
%K discovery;
%K Indexing
%K indexing;
%K information
%K knowledge
%K large
%K linear
%K mining;
%K multidimensional
%K objects;
%K optimal
%K Parallel
%K pattern
%K processing;
%K query
%K querying;
%K range
%K scale
%K scientific
%K search
%K serial
%K series
%K series;
%K simulation
%K space
%K structure;
%K structures;
%K techniques;
%K temporal
%K TIME
%K value
%K very
%K window;
%X We consider the problem of querying large scale multidimensional time series data to discover events of interest, test and validate hypotheses, or to associate temporal patterns with specific events. This type of data currently dominates most other types of available data, and will very likely become even more prevalent in the future given the current trends in collecting time series of business, scientific, demographic, and simulation data. The ability to explore such collections interactively, even at a coarse level, will be critical in discovering the information and knowledge embedded in such collections. We develop indexing techniques and search algorithms to efficiently handle temporal range value querying of multidimensional time series data. Our indexing uses linear space data structures that enable the handling of queries in I/O time that is essentially the same as that of handling a single time slice, assuming the availability of a logarithmic number of processors as a function of the temporal window. A data structure with provably almost optimal asymptotic bounds is also presented for the case when the number of multidimensional objects is relatively small. These techniques improve significantly over standard techniques for either serial or parallel processing, and are evaluated by extensive experimental results that confirm their superior performance.
%B Parallel Architectures, Algorithms and Networks, 2004. Proceedings. 7th International Symposium on
%P 2 - 2
%8 2004/05//
%G eng
%R 10.1109/ISPAN.2004.1300447
%0 Conference Paper
%B Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on
%D 2004
%T Vehicle detection and tracking using acoustic and video sensors
%A Chellapa, Rama
%A Qian,Gang
%A Qinfen Zheng
%K acoustic
%K applications;
%K audio
%K audio-visual
%K beam-forming
%K Carlo
%K chain
%K density
%K detection;
%K direction-of-arrival
%K DOA
%K empirical
%K estimation;
%K framework;
%K functions;
%K fusion
%K fusion;
%K joint
%K Markov
%K methods;
%K Monte
%K moving
%K multimodal
%K object
%K optical
%K posterior
%K probability
%K probability;
%K processes;
%K processing;
%K sensing;
%K sensor
%K sensors;
%K signal
%K Surveillance
%K surveillance;
%K systems;
%K target
%K techniques;
%K tracking;
%K vehicle
%K video
%X Multimodal sensing has attracted much attention in solving a wide range of problems, including target detection, tracking, classification, activity understanding, speech recognition, etc. In surveillance applications, different types of sensors, such as video and acoustic sensors, provide distinct observations of ongoing activities. We present a fusion framework using both video and acoustic sensors for vehicle detection and tracking. In the detection phase, a rough estimate of target direction-of-arrival (DOA) is first obtained using acoustic data through beam-forming techniques. This initial DOA estimate designates the approximate target location in video. Given the initial target position, the DOA is refined by moving target detection using the video data. Markov chain Monte Carlo techniques are then used for joint audio-visual tracking. A novel fusion approach has been proposed for tracking, based on different characteristics of audio and visual trackers. Experimental results using both synthetic and real data are presented. Improved tracking performance has been observed by fusing the empirical posterior probability density functions obtained using both types of sensors.
%B Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on
%V 3
%P iii - 793-6 vol.3 - iii - 793-6 vol.3
%8 2004/05//
%G eng
%R 10.1109/ICASSP.2004.1326664
%0 Conference Paper
%B Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on
%D 2003
%T Combining multiple evidences for gait recognition
%A Cuntoor, N.
%A Kale, A.
%A Chellapa, Rama
%K analysis;
%K dynamic
%K evidences;
%K extraction;
%K feature
%K features;
%K frontal
%K Gait
%K height;
%K human
%K identification;
%K image
%K MIN
%K multiple
%K nonprobabilistic
%K probabilistic
%K Product
%K recognition;
%K rules;
%K sets;
%K side
%K static
%K Sum
%K sway;
%K swing;
%K techniques;
%K views;
%X In this paper, we systematically analyze different components of human gait, for the purpose of human identification. We investigate dynamic features such as the swing of the hands/legs, the sway of the upper body and static features like height, in both frontal and side views. Both probabilistic and non-probabilistic techniques are used for matching the features. Various combination strategies may be used depending upon the gait features being combined. We discuss three simple rules: the Sum, Product and MIN rules that are relevant to our feature sets. Experiments using four different datasets demonstrate that fusion can be used as an effective strategy in recognition.
%B Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on
%V 3
%P III - 33-6 vol.3 - III - 33-6 vol.3
%8 2003/04//
%G eng
%R 10.1109/ICASSP.2003.1199100
%0 Journal Article
%J Image Processing, IEEE Transactions on
%D 2003
%T Data hiding in image and video .I. Fundamental issues and solutions
%A M. Wu
%A Liu,Bede
%K adaptive
%K analysis;
%K bits;
%K colour
%K condition;
%K constant
%K CONTROL
%K data
%K embedded
%K EMBEDDING
%K embedding;
%K encapsulation;
%K extractable
%K hiding;
%K image
%K Modulation
%K modulation;
%K multilevel
%K multiplexing
%K multiplexing;
%K NOISE
%K nonstationary
%K processing;
%K rate;
%K reviews;
%K shuffling;
%K signal
%K signals;
%K simulation;
%K solution;
%K techniques;
%K variable
%K video
%K visual
%X We address a number of fundamental issues of data hiding in image and video and propose general solutions to them. We begin with a review of two major types of embedding, based on which we propose a new multilevel embedding framework to allow the amount of extractable data to be adaptive according to the actual noise condition. We then study the issues of hiding multiple bits through a comparison of various modulation and multiplexing techniques. Finally, the nonstationary nature of visual signals leads to highly uneven distribution of embedding capacity and causes difficulty in data hiding. We propose an adaptive solution switching between using constant embedding rate with shuffling and using variable embedding rate with embedded control bits. We verify the effectiveness of our proposed solutions through analysis and simulation.
%B Image Processing, IEEE Transactions on
%V 12
%P 685 - 695
%8 2003/06//
%@ 1057-7149
%G eng
%N 6
%R 10.1109/TIP.2003.810588
%0 Conference Paper
%B Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on
%D 2003
%T Performance of detection statistics under collusion attacks on independent multimedia fingerprints
%A Zhao,Hong
%A M. Wu
%A Wang,Z.J.
%A Liu,K. J.R
%K analysis;
%K attacks;
%K based
%K collusion
%K content;
%K DETECTION
%K digital
%K fingerprint
%K fingerprinting;
%K fingerprints;
%K Gaussian
%K identification;
%K independent
%K multimedia
%K performance;
%K preprocessing
%K processes;
%K redistribution;
%K security;
%K statistical
%K statistics;
%K systems;
%K techniques;
%K Telecommunication
%K unauthorized
%X Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Collusion attack is a cost effective attack against digital fingerprinting where several copies with the same content but different fingerprints are combined to remove the original fingerprints. In this paper, we consider average attack and several nonlinear collusion attacks on independent Gaussian based fingerprints, and study the detection performance of several commonly used detection statistics in the literature under collusion attacks. Observing that these detection statistics are not specifically designed for collusion scenarios and do not take into account the characteristics of the newly generated fingerprints under collusion attacks, we propose pre-processing techniques to improve the detection performance of the detection statistics under collusion attacks.
%B Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on
%V 1
%P I - 205-8 vol.1 - I - 205-8 vol.1
%8 2003/07//
%G eng
%R 10.1109/ICME.2003.1220890
%0 Conference Paper
%B Information Visualization, 2002. INFOVIS 2002. IEEE Symposium on
%D 2002
%T Interactive information visualization of a million items
%A Fekete,J.-D.
%A Plaisant, Catherine
%K animation
%K animation;
%K cards;
%K Computer
%K count;
%K data
%K diagrams;
%K Graphics
%K hardware-based
%K information
%K interactive
%K interpolation;
%K overlap
%K plot
%K scatter
%K stereovision;
%K systems;
%K techniques;
%K treemaps;
%K visualisation;
%K visualization;
%X Existing information visualization techniques are usually limited to the display of a few thousand items. This article describes new interactive techniques capable of handling a million items (effectively visible and manageable on screen). We evaluate the use of hardware-based techniques available with newer graphics cards, as well as new animation techniques and non-standard graphical features such as stereovision and overlap count. These techniques have been applied to two popular information visualizations: treemaps and scatter plot diagrams; but are generic enough to be applied to other 2D representations as well.
%B Information Visualization, 2002. INFOVIS 2002. IEEE Symposium on
%P 117 - 124
%8 2002///
%G eng
%R 10.1109/INFVIS.2002.1173156
%0 Journal Article
%J Magnetics, IEEE Transactions on
%D 2002
%T Perturbation technique for LLG dynamics in uniformly magnetized bodies subject to RF fields
%A Bertotti,G.
%A Mayergoyz, Issak D
%A Serpico,C.
%K analytical
%K anisotropy
%K anisotropy;
%K applied
%K bodies;
%K circularly
%K component;
%K constant-in-time
%K constant;
%K damping
%K demagnetisation;
%K demagnetizing
%K differential
%K dynamics;
%K effective
%K elliptically
%K equation;
%K equations;
%K exactly
%K factors;
%K field;
%K film;
%K films;
%K Frequency
%K gyromagnetic
%K harmonic;
%K higher
%K Landau-Lifshitz-Gilbert
%K large
%K linear
%K magnetic
%K magnetisation;
%K magnetization
%K magnetization;
%K magnetized
%K modes;
%K MOTION
%K order
%K partial
%K particle;
%K particles;
%K perturbation
%K polarized
%K radio
%K ratio;
%K RF
%K saturation
%K solution;
%K solvable
%K system;
%K technique;
%K techniques;
%K thin
%K time-harmonic
%K uniaxial
%K uniformly
%X The problem of magnetization dynamics of a uniformly magnetized uniaxial particle or film, under elliptically polarized applied field, is considered. In the special case of circularly polarized applied field and particles (films) with a symmetry axis, pure time-harmonic magnetization modes exist that can be computed analytically. Deviations from these highly symmetric conditions are treated as perturbation of the symmetric case. The perturbation technique leads to the exactly solvable system of linear differential equations for the perturbations which enables one to compute higher order magnetization harmonic. The analytical solutions are obtained and then compared with numerical results.
%B Magnetics, IEEE Transactions on
%V 38
%P 2403 - 2405
%8 2002/09//
%@ 0018-9464
%G eng
%N 5
%R 10.1109/TMAG.2002.803596
%0 Conference Paper
%B Pattern Recognition, 1992. Vol.II. Conference B: Pattern Recognition Methodology and Systems, Proceedings., 11th IAPR International Conference on
%D 1992
%T Temporal clues in handwriting
%A David Doermann
%A Rosenfeld, A.
%K character
%K extraction;
%K feature
%K handwriting
%K information
%K offline
%K online
%K recognition;
%K techniques;
%K temporal
%X Handwritten character recognition is typically classified as online or offline depending on the nature of the input data. Online data consists of a temporal sequence of instrument positions while offline data is in the form of a 2D image of the writing sample. Online recognition techniques have been relatively successful but have the disadvantage of requiring the data to be gathered during the writing process. This paper presents work on the extraction of temporal information from static images of handwriting and its implications for character recognition
%B Pattern Recognition, 1992. Vol.II. Conference B: Pattern Recognition Methodology and Systems, Proceedings., 11th IAPR International Conference on
%P 317 - 320
%8 1992/09/03/aug
%G eng
%R 10.1109/ICPR.1992.201781