Journal:Informatica
Volume 15, Issue 2 (2004), pp. 147–160
Abstract
In this paper, a new digital watermarking method based on vector quantization (VQ) is proposed. In contrast with conventional VQ‐based watermarking schemes, the mean of sub‐blocks is used to train the VQ codebook. In addition, the Anti‐Gray Coding (AGC) technique is employed to enhance the robustness of the proposed watermarking scheme. In this scheme, the secret keys are used to hide the associated information between the original image and the watermark. Then the set of secret keys will be registered to a trusted third party for future verification. Thus, the original image remains unchanged after the watermark is melted into the set of secret keys. Experimental results show that the watermark can survive various possible attacks. Besides that, the size of the secret keys can be reduced.
Journal:Informatica
Volume 15, Issue 2 (2004), pp. 161–170
Abstract
This paper presents an improved method inspired by the recently proposed Pretty‐Simple PAKE (Password Authenticated Key‐Exchange) protocol, which is already a well‐known, robust and simple password authenticated key exchange scheme. In our even more efficient scheme, only the password needs to be negotiated in advance, and the computations have also been simplified. Our scheme is based on the elliptic curve discrete logarithm problem and can gain the benefit from the key block size, speed and security. Since our new scheme is both efficient and fast with a low cost for device storage, it is especially suitable for the wireless network environment.
Journal:Informatica
Volume 15, Issue 2 (2004), pp. 171–202
Abstract
In this paper on basis of the results (Dyomin et al., 2003a) the structure of Shannon information amount in the joint filtering and extrapolation problem of the stochastic processes by continuous‐discrete time memory observations is investigated. For particular class of processes with applying of the general results the problem of optimal transmission over the lag channels is considered and efficiency of filtering and extrapolation receptions under transmission over channels with memory or lag is investigated.
Journal:Informatica
Volume 15, Issue 2 (2004), pp. 203–218
Abstract
A quick matrix multiplication algorithm is presented and evaluated on a cluster of networked workstations consisting of Pentium hosts connected together by Ethernet segments. The obtained results confirm the feasibility of using networked workstations to provide fast and low cost solutions to many computationally intensive applications such as large linear algebraic systems. The paper also presents and verifies an accurate timing model to predict the performance of the proposed algorithm on arbitrary clusters of workstations. Through this model the viability of the proposed algorithm can be revealed without the extra effort that would be needed to carry out real testing.
Journal:Informatica
Volume 15, Issue 2 (2004), pp. 219–230
Abstract
This paper proposes the use of a particle filter combined with color, depth information and shape features as an efficient and effective way to deal with tracking a head on the basis of image stream coming from a mobile stereovision camera. The head is modeled in the 2D image domain by an ellipse. The color distribution within interior of the ellipse is represented by a color histogram. The color histogram is dynamically updated over time. The length of the ellipse's minor axis is determined on the basis of depth information. The particles representing the candidate ellipses are weighted in each time step in respect of intensity gradient near the edge of the ellipse and matching score of the color histograms representing the interior of an ellipse surrounding the tracked object and currently analyzed one. The proposed algorithm can track a head reliably in cases of temporal occlusions as well as varying illumination conditions by dealing with multiple hypotheses for the pose. Experimental results obtained on long image sequences show the feasibility of our approach to perform tracking a head undergoing complex changes of shape and appearance against a varying background. The tracker has been evaluated in experiments consisting in face tracking with a real mobile agent.
Journal:Informatica
Volume 15, Issue 2 (2004), pp. 231–242
Abstract
This paper describes a preliminary experiment in designing a Hidden Markov Model (HMM)‐based part‐of‐speech tagger for the Lithuanian language. Part‐of‐speech tagging is the problem of assigning to each word of a text the proper tag in its context of appearance. It is accomplished in two basic steps: morphological analysis and disambiguation. In this paper, we focus on the problem of disambiguation, i.e., on the problem of choosing the correct tag for each word in the context of a set of possible tags. We constructed a stochastic disambiguation algorithm, based on supervised learning techniques, to learn hidden Markov model's parameters from hand‐annotated corpora. The Viterbi algorithm is used to assign the most probable tag to each word in the text.
Journal:Informatica
Volume 15, Issue 2 (2004), pp. 243–250
Abstract
In this article we propose a novel Wavelet Packet Decomposition (WPD)‐based modification of the classical Principal Component Analysis (PCA)‐based face recognition method. The proposed modification allows to use PCA‐based face recognition with a large number of training images and perform training much faster than using the traditional PCA‐based method. The proposed method was tested with a database containing photographies of 423 persons and achieved 82–89% first one recognition rate. These results are close to that achieved by the classical PCA‐based method (83–90%).
Journal:Informatica
Volume 15, Issue 2 (2004), pp. 251–270
Abstract
A new digital signature scheme in non‐commutative Gaussian monoid is presented. Two algebraic structures are employed: Gaussian monoid and a certain module being compatible with a monoid. For both monoid and module, presentation and action level attributes are defined. Monoid action level is defined as monoid element (word) action on module element as an operator. A module is a set of functions (elements) with special properties and could be treated as some generalization of vector space.
Signature scheme is based on the one‐way functions (OWF) design using: three recognized hard problems in monoid presentation level, one postulated hard problem in monoid action level and one provable hard problem in module action level.
For signature creation and verification the word equivalence problem is solved in monoid action level thus avoiding solving it in monoid presentation level. Then the three recognized hard problems in monoid presentation level can be essentially as hard as possible to increase signature security. Thus they do not influence on the word problem complexity and, consequently, on the complexity of signature realization.
The investigation of signature scheme security against four kind of attacks is presented. It is shown that the signature has a provable security property with respect to the list of attacks presented here, which are postulated to be complete.
Journal:Informatica
Volume 15, Issue 2 (2004), pp. 271–282
Abstract
We consider a problem of nonlinear stochastic optimization with linear constraints. The method of ɛ‐feasible solution by series of Monte‐Carlo estimators has been developed for solving this problem avoiding “jamming” or “zigzagging”. Our approach is distinguished by two peculiarities: the optimality of solution is tested in a statistical manner and the Monte‐Carlo sample size is adjusted so as to decrease the total amount of Monte‐Carlo trials and, at the same time, to guarantee the estimation of the objective function with an admissible accuracy. Under some general conditions we prove by the martingale approach that the proposed method converges a.s. to the stationary point of the problem solved. As a counterexample the maximization of the probability of portfolio desired return is given, too.
Journal:Informatica
Volume 15, Issue 2 (2004), pp. 283–290
Abstract
The paper describes a new method to segment ischemic stroke region on computed tomography (CT) images by utilizing joint features from mean, standard deviation, histogram, and gray level co‐occurrence matrix methods. Presented unsupervised segmentation technique shows ability to segment ischemic stroke region.