To improve the recognition accuracy of off-line handwritten Tibetan characters the local gradient direction histograms based on the wavelet transform are proposed as the recognition features.First for a Tibetan charac...To improve the recognition accuracy of off-line handwritten Tibetan characters the local gradient direction histograms based on the wavelet transform are proposed as the recognition features.First for a Tibetan character sample image the first level approximation component of the Haar wavelet transform is calculated.Secondly the approximation component is partitioned into several equal-sized zones. Finally the gradient direction histograms of each zone are calculated and the local direction histograms of the approximation component are considered as the features of the character sample image.The proposed method is tested on the recently developed off-line Tibetan handwritten character sample database.The experimental results demonstrate the effectiveness and efficiency of the proposed feature extraction method.Furthermore compared with the detail components the approximation component contributes more to the recognition accuracy.展开更多
Along with the development of motion capture technique, more and more 3D motion databases become available. In this paper, a novel approach is presented for motion recognition and retrieval based on ensemble HMM (hidd...Along with the development of motion capture technique, more and more 3D motion databases become available. In this paper, a novel approach is presented for motion recognition and retrieval based on ensemble HMM (hidden Markov model) learning. Due to the high dimensionality of motion’s features, Isomap nonlinear dimension reduction is used for training data of ensemble HMM learning. For handling new motion data, Isomap is generalized based on the estimation of underlying eigen- functions. Then each action class is learned with one HMM. Since ensemble learning can effectively enhance supervised learning, ensembles of weak HMM learners are built. Experiment results showed that the approaches are effective for motion data recog- nition and retrieval.展开更多
We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different t...We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different to the original watermark, and different kinds of modification lead to different extracted watermarks. In this paper, different kinds of modification are considered as classes, and we used classification algorithm to recognize the modifications with high probability. Simulation results show that the proposed method is potential and effective.展开更多
In this paper, a Covert Speech Telephone (CST) is designed and implemented based on the information hiding technique, which works on the internet. To solve the large embedding capacity problem for real-time informatio...In this paper, a Covert Speech Telephone (CST) is designed and implemented based on the information hiding technique, which works on the internet. To solve the large embedding capacity problem for real-time information hiding, a steganographic system combined with a watermarking scheme is proposed, which skillfully transfers the secret speech into watermarking information. The basic idea is to use the speech recognition to significantly reduce the size of information that has to be transmitted in a hidden way. Furthermore, an improved DFT watermarking scheme is proposed which adaptively chooses the embedding locations and applies the multi-ary modulation technique. Based on the GUI (Graphical User Interface) software, the CST operates on both ordinary and secure mode. It is a completely digital system with high speech quality. Objective and subjective tests show that the CST is robust against normal signal processing attacks and steganalysis. The proposed scheme can be used in terms of military applications.展开更多
A face recognition system based on Support Vector Machine (SVM) and Hidden Markov Model (HMM) has been proposed. The powerful discriminative ability of SVM is combined with the temporal modeling ability of HMM. The ou...A face recognition system based on Support Vector Machine (SVM) and Hidden Markov Model (HMM) has been proposed. The powerful discriminative ability of SVM is combined with the temporal modeling ability of HMM. The output of SVM is moderated to be probability output, which replaces the Mixture of Gauss (MOG) in HMM. Wavelet transformation is used to extract observation vector, which reduces the data dimension and improves the robustness.The hybrid system is compared with pure HMM face recognition method based on ORL face database and Yale face database. Experiments results show that the hybrid method has better performance.展开更多
The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,deve...The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,developing secure steganography is formulated as solving a constrained IP(Integer Programming) problem,which takes the relative entropy of cover and stego distributions as the objective function.Furthermore,a novel method is introduced based on BPSO(Binary Particle Swarm Optimization) for achieving the optimal solution of this programming problem.Experimental results show that the proposed method can achieve excellent performance on preserving neighboring co-occurrence features for JPEG steganography.展开更多
This paper focuses on a state sharing method for an artificial neural network (ANN) and hidden Markov model (HMM) hybrid on line handwriting recognition system. A modeling precision based distance measure is proposed ...This paper focuses on a state sharing method for an artificial neural network (ANN) and hidden Markov model (HMM) hybrid on line handwriting recognition system. A modeling precision based distance measure is proposed to describe similarity between two ANNs, which are used as HMM state models. Limiting maximum system performance loss, a minimum quantification error aimed hierarchical clustering algorithm is designed to choose the most representative models. The system performance is improved by about 1.5% while saving 40% of the system expense. About 92% of the performance may also be maintained while reducing 70% of system parameters. The suggested method is quite useful for designing pen based interface for various handheld devices.展开更多
In this paper,transient electromagnetic method was used to carry out the feasibility study on the detection and recognition of chamber blasting misfire.Firstly,an electromagnetic background field was established in th...In this paper,transient electromagnetic method was used to carry out the feasibility study on the detection and recognition of chamber blasting misfire.Firstly,an electromagnetic background field was established in the test;secondly,a benign conductor was preset in the chamber,and then the background field was eliminated after the electromagnetic field was measured;thirdly,the transient electromagnetic field was measured again after blasting;at last,the chamber blasting misfire was detected and recognized by comparing the change of eddy current field of the preset benign conductor before and after blasting.The test results showed that:When the buried depth of aluminum box target was no more than 30 m,transient electromagnetic method can clearly identify the position of the aluminum box;when the buried depth of aluminum box was more than30 m,the buried depth and position of the aluminum box was not sure due to the unknown level of secondary eddy current field generated by aluminum box.展开更多
基金The National Natural Science Foundation of China(No.60963016)the National Social Science Foundation of China(No.17BXW037)
文摘To improve the recognition accuracy of off-line handwritten Tibetan characters the local gradient direction histograms based on the wavelet transform are proposed as the recognition features.First for a Tibetan character sample image the first level approximation component of the Haar wavelet transform is calculated.Secondly the approximation component is partitioned into several equal-sized zones. Finally the gradient direction histograms of each zone are calculated and the local direction histograms of the approximation component are considered as the features of the character sample image.The proposed method is tested on the recently developed off-line Tibetan handwritten character sample database.The experimental results demonstrate the effectiveness and efficiency of the proposed feature extraction method.Furthermore compared with the detail components the approximation component contributes more to the recognition accuracy.
基金Project supported by the National Natural Science Foundation of China (Nos. 60533090 and 60525108), the National Basic Research Program (973) of China (No. 2002CB312101), and the Science and Technology Project of Zhejiang Province (Nos. 2005C13032 and 2005C11001-05), China
文摘Along with the development of motion capture technique, more and more 3D motion databases become available. In this paper, a novel approach is presented for motion recognition and retrieval based on ensemble HMM (hidden Markov model) learning. Due to the high dimensionality of motion’s features, Isomap nonlinear dimension reduction is used for training data of ensemble HMM learning. For handling new motion data, Isomap is generalized based on the estimation of underlying eigen- functions. Then each action class is learned with one HMM. Since ensemble learning can effectively enhance supervised learning, ensembles of weak HMM learners are built. Experiment results showed that the approaches are effective for motion data recog- nition and retrieval.
文摘We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different to the original watermark, and different kinds of modification lead to different extracted watermarks. In this paper, different kinds of modification are considered as classes, and we used classification algorithm to recognize the modifications with high probability. Simulation results show that the proposed method is potential and effective.
基金the Natural Science Foundation of Jiangsu Province (No.BK2004150)the National 863 Key Project (No.2006AA010102).
文摘In this paper, a Covert Speech Telephone (CST) is designed and implemented based on the information hiding technique, which works on the internet. To solve the large embedding capacity problem for real-time information hiding, a steganographic system combined with a watermarking scheme is proposed, which skillfully transfers the secret speech into watermarking information. The basic idea is to use the speech recognition to significantly reduce the size of information that has to be transmitted in a hidden way. Furthermore, an improved DFT watermarking scheme is proposed which adaptively chooses the embedding locations and applies the multi-ary modulation technique. Based on the GUI (Graphical User Interface) software, the CST operates on both ordinary and secure mode. It is a completely digital system with high speech quality. Objective and subjective tests show that the CST is robust against normal signal processing attacks and steganalysis. The proposed scheme can be used in terms of military applications.
基金This project is supported by the National Natural Science Foundation of China (No. 69889050)
文摘A face recognition system based on Support Vector Machine (SVM) and Hidden Markov Model (HMM) has been proposed. The powerful discriminative ability of SVM is combined with the temporal modeling ability of HMM. The output of SVM is moderated to be probability output, which replaces the Mixture of Gauss (MOG) in HMM. Wavelet transformation is used to extract observation vector, which reduces the data dimension and improves the robustness.The hybrid system is compared with pure HMM face recognition method based on ORL face database and Yale face database. Experiments results show that the hybrid method has better performance.
基金Supported by the National Natural Science Foundation of China (No.60572111)
文摘The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,developing secure steganography is formulated as solving a constrained IP(Integer Programming) problem,which takes the relative entropy of cover and stego distributions as the objective function.Furthermore,a novel method is introduced based on BPSO(Binary Particle Swarm Optimization) for achieving the optimal solution of this programming problem.Experimental results show that the proposed method can achieve excellent performance on preserving neighboring co-occurrence features for JPEG steganography.
文摘This paper focuses on a state sharing method for an artificial neural network (ANN) and hidden Markov model (HMM) hybrid on line handwriting recognition system. A modeling precision based distance measure is proposed to describe similarity between two ANNs, which are used as HMM state models. Limiting maximum system performance loss, a minimum quantification error aimed hierarchical clustering algorithm is designed to choose the most representative models. The system performance is improved by about 1.5% while saving 40% of the system expense. About 92% of the performance may also be maintained while reducing 70% of system parameters. The suggested method is quite useful for designing pen based interface for various handheld devices.
文摘In this paper,transient electromagnetic method was used to carry out the feasibility study on the detection and recognition of chamber blasting misfire.Firstly,an electromagnetic background field was established in the test;secondly,a benign conductor was preset in the chamber,and then the background field was eliminated after the electromagnetic field was measured;thirdly,the transient electromagnetic field was measured again after blasting;at last,the chamber blasting misfire was detected and recognized by comparing the change of eddy current field of the preset benign conductor before and after blasting.The test results showed that:When the buried depth of aluminum box target was no more than 30 m,transient electromagnetic method can clearly identify the position of the aluminum box;when the buried depth of aluminum box was more than30 m,the buried depth and position of the aluminum box was not sure due to the unknown level of secondary eddy current field generated by aluminum box.