IJIGSP Vol. 6, No. 11, Oct. 2014
Cover page and Table of Contents: PDF (size: 125KB)
REGULAR PAPERS
In its operation, every electrical device generates electromagnetic disturbance signals. They can be due to the operation of components of the device (step motors, heaters, control circuits, or electronic circuits). Quite often such signals have the characteristics of the data processed on such devices. They can have the form of a text. In each case, such signals are undesirable. However, they can be used to reproduce such data or, in other word, to conduct the process of electromagnetic infiltration. In the case of video signals (graphic mode of a computer, a laser printer), then the reproduced data can be presented in the form of graphic images that can be easily assimilated by people. Such images are transformed in order to find the data that is of interest. Reproduction of such data may lead to a disclosure of classified information.
There are many solutions that should counter the process of reproduction of such data. Such solutions are implemented in the design of equipment and influence, to a lesser or greater extent, the appearance of the equipment, as well as the related organizational methods. A new method that can be used in electromagnetic protection of process data is a software solution. It involves the use of appropriate computer fonts.
The article presents the possibilities related to shaping the form of video signals. For this purpose, appropriate shapes of the letter characters of computer fonts were recommended. Unlike characters in standard fonts (Arial and Times New Roman), they do not have the unique decorative elements (serif), such as hooks, connectors, heels, arches, and ribbons, and consist of only vertical and horizontal lines [5]. There are no slanted and crooked lines. Due to this, the characters are often very similar. This greatly contributes to the impossibility to differentiate between the letter characters in the reproduced image that is filled with noise and numerous disturbances. The graphic elements being searched, having the form of strings of letters, cannot be read. The digital image processing methods intended to improve the quality of the image are quite ineffective.
In search for graphic characters, such as computer font letter and digit characters, one can use methods based on the similarity of the standard with a portion of the analyzed image. However, when special fonts are used, the correlation method generates many false decisions, which also prevents reading text data.
In the film industry, many tricks have been employed using the integration of a 3D object with a real actor. Usually, attaching a 3D object with a real actor is a costly process because of the usage of an expensive motion capture system. This paper presents a system using a medium-cost motion capture system and a chroma-keying technique for generating a video footage of an actor with an integrated 3D object (e.g. amputated arm). The result of the proposed system shows the attaching process of different 3D objects with a real actor who is combined with a new background scene in the same viewpoint.
[...] Read more.In this paper we introduce a robust feature extractor, dubbed as Modified Function Cepstral Coefficients (MODFCC), based on gammachirp filterbank, Relative Spectral (RASTA) and Autoregressive Moving-Average (ARMA) filter. The goal of this work is to improve the robustness of speech recognition systems in additive noise and real-time reverberant environments. In speech recognition systems Mel-Frequency Cepstral Coefficients (MFCC), RASTA and ARMA Frequency Cepstral Coefficients (RASTA-MFCC and ARMA-MFCC) are the three main techniques used. It will be shown in this paper that it presents some modifications to the original MFCC method. In our work the effectiveness of proposed changes to MFCC were tested and compared against the original RASTA-MFCC and ARMA-MFCC features. The prosodic features such as jitter and shimmer are added to baseline spectral features. The above-mentioned techniques were tested with impulsive signals under various noisy conditions within AURORA databases.
[...] Read more.Many diversified applications do exist in science & technology, which make use of the primary theory of a recognition phenomenon as one of its solutions. Recognition scenario is incorporated with a set of decisions and the action according to the decision purely relies on the quality of extracted information on utmost applications. Thus, the quality decision making absolutely reckons on processing momentum and precision which are entirely coupled with recognition methodology. In this article, a latest rule is formulated based on the degree of correlation to characterize the generalized recognition constraint and the application is explored with respect to image based information extraction. Machine learning based perception called feed forward architecture of Artificial Neural Network has been applied to attain the expected eminence of elucidation. The proposed method furnishes extraordinary advantages such as less memory requirements, extremely high level security for storing data, exceptional speed and gentle implementation approach.
[...] Read more.Detection of optic disc area is complex because it is located in an area that is considered as pathological blood vessels when in segmentation and thus require a method to detect the area of the optic disc, this paper proposed the optic disc segmentation using a method that has not been used before, and this method is very simple, K-means clustering is a proposed Method in this paper to detect the optic disc area with perfected using adaptive morphology. This paper successfully detect optic disc area quickly and segmented blood vessels more quickly.
[...] Read more.Automatic speech segmentation as an important part of speech recognition system (ASR) is highly noise dependent. Noise is made by changes in the communication channel, background, level of speaking etc. In recent years, many researchers have proposed noise cancelation techniques and have added visual features from speaker’s face to reduce the effect of noise on ASR systems. Removing noise from audio signals depends on the type of the noise; so it cannot be used as a general solution. Adding visual features improve this lack of efficiency, but advanced methods of this type need manual extraction of visual features. In this paper we propose a completely automatic system which uses optical flow vectors from speaker’s image sequence to obtain visual features. Then, Hidden Markov Models are trained to segment audio signals from image sequences and audio features based on extracted optical flow. The developed segmentation system based on such method acts totally automatic and become more robust to noise.
[...] Read more.A great many chaos-based image encryption schemes have been proposed in the past decades. Most of them use the permutation-diffusion architecture in pixel level, which has been proved insecure enough as they are not dependent on plain-images and so cannot resist chosen/known plain-image attack usually. In this paper, we propose a novel image encryption scheme comprising of one permutation process and one diffusion process. In the permutation process, the image sized is expanded to one sized by dividing the plain-image into two parts: one consisting of the higher 4bits and one consisting of the lower 4bits. The permutation operations are done row-by-row and column-by-column to increase the speed of permutation process. The chaotic cat map is utilized to generate chaotic sequences, which are quantized to shuffle the expanded image. The chaotic sequence for permutation process is dependent on plain-image and cipher keys, resulting in good key sensitivity and plain-image sensitivity. To achieve more avalanche effect and larger key space, a chaotic Bernoulli shift map based bilateral (i.e., horizontal and vertical) diffusion function is applied as well. The security and performance of the proposed image encryption have been analyzed, including histograms, correlation coefficients, information entropy, key sensitivity analysis, key space analysis, differential analysis, encryption rate analysis etc. All the experimental results suggest that the proposed image encryption scheme is robust and secure and can be used for secure image and video communication applications.
[...] Read more.Super resolution (SR) images play an important role in Image processing applications. Spatial resolution is the key parameter in many applications of image processing. Super resolution images can be used to improve the spatial resolution. In this paper a new SR image reconstruction algorithm is proposed using Integer wavelet transform (IWT) and Binary plane technique (BPT). The proposed method is analyzed in different color space transforms such as CIELAB, YCbCr and RGB. In this paper we compared PSNR, ISNR, Blocking effect and Homogeneity with different colour images in RGB, YCbCr and CIELAB domains. Qualitative analysis shows that the proposed method in CIELAB color space transforms has better performance.
[...] Read more.