An Error-Controlling Scheme according to the Importance of Individual Segments of Model-Based Coded Facial Images (Special Section on Information Theory and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
This paper proposes and investigates an intelligent error-controlling scheme according to different importance of segmental information. In particular, the scheme is designed for facial images encoded by model-based coding that is a kind of intelligent compression coding [1], [2]. Intelligent communication systems regard the contents of information to be transmitted with extremely high compression and reliability. After highly efficient information compression by model-based coding, errors in the compressed information lead to severe semantic errors. The proposed scheme reduces semantic errors of information for the receiver. In this paper, we consider Action Unit (AU) as a segment of model-based coded facial image of human being and define the importance for each AU. According to the importance, an AU is encoded by an appropriated code among codes with different error-correcting capabilities. For encoding with different error controlling codes, we use three kinds of constructions to obtain unequal error protection (UEP) codes in this paper. One of them is the direct sum construction and the others are the proposed constructions which are based on joint and double coding. These UEP codes can have higher coderate than other UEP codes when minimum Hamming distance is small. By using these UEP codes, the proposed intelligent error-controlling scheme can protect information in segment in order to reduce semantic errors over a conventional error-controlling scheme in which information is uniformly protected by an error-correcting code.
- 社団法人電子情報通信学会の論文
- 1994-08-25
著者
-
Imai H
Research Center For Information Security (rcis):national Institute Of Advanced Industrial Science An
-
Kohno R
Yokohama National Univ. Yokohama‐shi Jpn
-
Kohno Ryuji
Kohno Laboratory School Of Electrical And Computer Engineering Of Yokohama National University
-
Kohno Ryuji
Faculty Of Engineering Yokohama National University
-
Kohno Ryuji
The Faculty Of Engineering Yoko Hama National University
-
IMAI Hideki
Institute of Industrial Science, The University of Tokyo
-
Imai H
Chuo University
-
Imai Hideki
Institute Of Industrial Science The University Of Tokyo
-
Sasaki T
Dept. Of Electrical Engineering Tokyo Metropolitan University
-
SUZUKI Noriko
Faculty of Pharmaceutical Sciences, Kanazawa University
-
Sasaki Taroh
Faculty of Engineering, Yokohama National University
-
Suzuki Noriko
Faculty Of Engineering Yokohama National University
-
Kohno Ryuji
Faculty Of Eng. Yokohama National University
-
Imai Hideki
Institute Of Industrial Science Interfaculty Initiative For Information Studies University Of Tokyo
-
Sasaki T
National Defence Academy Yokosuka‐shi Jpn
-
Sasaki Taroh
Faculty of Engineering, Kanagawa University
関連論文
- Efficient Algorithms for Tate Pairing(Elliptic Curve Cryptography, Cryptography and Information Security)
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- Coded Modulation for Satellite Broadcasting Based on Unconventional Partitionings (Special Section on Information Theory and Its Applications)
- Unconditionally Secure Chaffing-and-Winnowing
- Shared Pseudo-Random Secret Generation Protocols (Special Section on Discrete Mathematics and Its Applications)
- Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms (Special Section on Discrete Mathematics and Its Applications)
- Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6
- An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
- Anonymous Password-Authenticated Key Exchange : New Construction and Its Extensions
- A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
- A New Security Architecture for Personal Networks and Its Performance Evaluation
- RSA-Based Password-Authenticated Key Exchange, Revisited
- A Secure Authenticated Key Exchange Protocol for Credential Services
- An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction(Information Security)
- New Security Architecture for Mobile IPv6 Networks
- Notes on Formal Methods Used for Verification of the Security Properties of Protocols Used in Wireless Environment
- A Leakage-Resilient Network Storage System
- Security Analysis of Password-based Protocols via FDR and AVISPA
- A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications(Information Security)
- An Efficient Leakage-Resilient Authenticated Key Exchange Protocol
- A Secure and Lightweight Authenticated Key Exchange Protocol for Wireless Networks
- The MAC-based Construction of Strong Multiple Encryption
- Efficient Strong Multiple Encryption from Relaxed Conditions
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Shielding Asymmetric Cryptosystems from Decryption Failures
- A Bandwidth-Saving Public Key Encryption Conversion Scheme
- Towards Removing Random Oracles from OAEP
- Transmitting Array Antenna Beamforming Based on Goal Programming for Forward Link of DS-CDMA System (Special Issue on Adaptive Array Antenna Techniques for Advanced Wireless Communications)
- Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions(Special Section on Cryptography and Information Security)
- Adaptive Array Antenna Using Array Antennas as Element Antennas(Special Issue on Mobile Multimedia Communications)
- Security Issues for Software Defined Radio : Design of a Secure Download System(Special Issue on Software Defined Radio Technology and Its Applications)
- A Novel Approach to Algebraic and Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- A Remark on GEM
- Compact Encoding of the Web Graph Exploiting Various Power Distributions(Discrete Mathematics and Its Applications)
- Sliced Onion Routing Scheme and its Aptitude for Sender-Identifiable Environments
- A New Anonymous Routing Scheme and its Aptitude for Ad-hoc Networks
- A Software Radio Receiver with Direct Conversion and Its Digital Processing(Special Issue on Software Defined Radio Technology and Its Applications)
- Design of Simplified Coherent QPSK Modem for Frequency Hopping Spread Spectrum(Special Section on Spread Spectrum Techniques and Applications)
- Subset Incremental Chain Based Broadcast Encryption with Shorter Ciphertext
- Optimally Mastering Keys in Various Broadcast Encryption Schemes
- Personal Entropy from Graphical Passwords : Methods for Quantification and Practical Key Generation(Cryptography and Information Security)(Information Theory and Its Applications)
- Finding Neighbor Communities in the Web Using an Inter-Site Graph(Database)
- Managing Encryption and Key Publication Independently in Digital Rights Management Systems (Applications) (Cryptography and Information Security)
- On Evaluating the Entropy of Graphical Passwords
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Implementation of an Industrial R/C System Using a Hybrid DS/FH Spread Spectrum Technique (Special Issue on Spread Spectrum Techniques and Applications)
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- On the oblivious transfer capacity of the erasure channel
- MFSK/FH-CDMA System with Two-Stage Address Coding and Error Correcting Coding and Decoding
- An Error-Controlling Scheme according to the Importance of Individual Segments of Model-Based Coded Facial Images (Special Section on Information Theory and Its Applications)
- Variable Error Controlling Schemes for Intelligent Error Controlling Systems (Special Section on Information Theory and Its Applications)
- A Provably Secure Refreshable Partially Anonymous Token and Its Applications(Discrete Mathematics and Its Applications)
- An Efficient Anonymous Authentication Scheme with No Unlinkability
- Bearing Estimation for Wideband Signals in a Multipath Channel (Special Section on Spread Spectrum Techniques and Applications)
- Spatially and Temporally Joint Transmitter-Receiver Using an Adaptive Array Antenna (Special Issue on Advanced Adaptive Radio Communication Technologies)
- Efficient Reliability-Based Turbo Decoding
- New Short Signature Scheme without Random Oracles
- Relation between the XL Algorithm and Grobner Basis Algorithms(Symmetric Key Cryptography, Cryptography and Information Security)
- An Efficient Group Signature Scheme from Bilinear Maps(Discrete Mathematics and Its Applications)
- Effect of Noisy Estimation on Turbo-Coded Modulation over Rayleigh Fading Channel
- A Trade-off Traitor Tracing Scheme
- Block Coding Scheme Based on Complementary Sequences for Multicarrier Signals
- A Hybrid Decision Feedback - Forward Error Correction Approach for Energy Constrained Sensor Networks
- Performance of Modified Orthogonal Space-Time Block Codes in Nakagami Fading Channels
- A Lagrangean Method of Channel Estimation for Space-Time Block Codes in Moderate Fading Channels
- Integrated Co-channel Interference Cancellation and Decoding Scheme over Fading Multipath Channel for CDMA
- Quantum Bit Commitment Robust against Noise and Multiple-photons
- Performance Evaluation of DS/CDMA Scheme with Diversity Coding and MUI Cancellation over Fading Multipath Channel (Special Section on Spread Spectrum Techniques and Applications)
- A Simple Method to Control Indirect Information Flows (Special Section of Letters Selected from the 1994 IEICE Spring Conference)
- Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model(Special Section on Information Theory and Its Applications)
- Non-proper Variable-to-Fixed Length Arithmetic Coding
- UWB Interference Mitigation using a Modified Pseudo Chaotic Time Hopping System
- Coded Combined PPM and PSM for UWB Communications
- Constructing c-Secure CRT Codes Using Polynomials over Finite Fields(Information Security)
- Adaptively Sampled Near-Field Smart Array Antenna for Indoor Wireless Communications (Special Issue on Adaptive Array Antenna Techniques for Advanced Wireless Communications)
- A Cross-Layer Approach for Byzantine Fault-Tolerance in Sensor Networks
- Adaptive Equalization with Dual Diversity-Combining (Special Issue on Land Mobile/Portable Propagation)
- Viterbi Equalizing FH-SS Receiver with Sector Beamed Space Hopping(Special Issue on Signals, Systems and Electronics Technology)
- Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols
- A Novel Byzantine Algorithm-Based Scheme for Fault Tolerance in Sensor Networks
- A Spatially and Temporally Optimal Multi-User Receiver Using an Array Antenna for DS/CDMA
- Effect of Noisy Estimation on Turbo-Coded Modulation over Flat Rayleigh Fading Channels(Special Section on Information Theory and Its Applications)
- Vehicular Spread Spectrum Radar for Multiple Targets Detection Using Multi-Beam Antenna (Special Section on Spread Spectrum Techniques and Applications)
- Improvements On Security Proofs of Some Identity Based Encryption Schemes
- Performance of Orthogonal Multi-Carrier FH-CDMA System in the Presence of Selective Fading and Nonlinear Amplification (Special Section on Spread Spectrum Techniques and Applications)
- Multilevel RLL (D, K, I) Constrained Sequences (Special Section on Information Theory and Its Applications)
- Secure Architecture For Distributed Intrusion Detection Systems
- Adaptive Multi-User Equalizer Using Multi-Dimensional Lattice Filters for DS-CDMA (Special Section on Information Theory and Its Applications)
- A Fast Automatic Fingerprint Identification Method Based on a Weighted-Mean of Binary Image (Special Section on Information Theory and Its Applications)
- A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing(Information Security)
- LDPC coded Hybrid Type II ARQ System
- Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
- Compression Coding Using an Optical Model for a Pair of Range and Gray-Scale Images of 3D Objects (Special Section on Information Theory and Its Applications)
- A Wireless Multi-Media CDMA System Based on Processing Gain Control (Special Section on Spread Spectrum Techniques and Applications)
- A Novel Wireless Multimedia CDMA System Based Adaptive Chip/Bit Rate Control (Special Section on Spread Spectrum Techniques and Applications)
- Relations among Notions of Security for Identity Based Encryption Schemes