IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E101.A , Issue 6
Showing 1-18 articles out of 18 articles from the selected issue
Special Section on Image Media Quality
  • Toshiya NAKAGUCHI
    2018 Volume E101.A Issue 6 Pages 883
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS
    Download PDF (322K)
  • Shinya MOCHIDUKI, Reina WATANABE, Miyuki SUGANUMA, Hiroaki KUDO, Nobor ...
    Type: PAPER
    2018 Volume E101.A Issue 6 Pages 884-891
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    Stereoscopic vision technology is applied in a wide range of fields, from 3D movies to medical care. Stereoscopic vision makes it possible to observe images in parallax between both eyes. However, parallax images cannot be used all the time due to a situation called “occlusion”, in which an object is hidden in the depths by another object. In this case, different images are projected on the right and left retina. Here, we propose a psychology experiment to elucidate the function of parvocellular cells in the LGN of the visual cortex of the brain using occlusion perception. As a new psychology experiment to clarify whether parvocellular cells in the LGN of the visual cortex, said to process chromatic and luminance information, can detect a disagreement between the retinal images produced by each eye, we measured convergence eye movement when gazing at the rim of a column under occlusion using an equiluminance random dot pattern. When eye movement prevented the disagreement of the retinal images caused by occlusion, we thought that convergence eye movement to move both eyes in front of the rim or divergence eye movement to move them behind the rim would occur. In other words, we thought that we could clarify whether there was parvocellular system process agreement or disagreement between the right and left retinal images under equiluminance. Therefore, we examined whether a system to detect disagreement between the retinal images exists in the brain when gazing at the rim of a column onto which an equiluminance random dot texture was mapped. Results suggested that the mechanism to avoid disagreement between the retinal images of the eyes caused by occlusion occurs in the parvocellular cells, which mainly process color information, as well as in the magnocellular cells, which process binocular disparity.

    Download PDF (4407K)
  • Shinya MOCHIDUKI, Reina WATANABE, Hideaki TAKAHIRA, Mitsuho YAMADA
    Type: PAPER
    2018 Volume E101.A Issue 6 Pages 892-899
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    We measured head and eye movements while subjects viewed 4K high-definition images to clarify the influence of different viewing positions. Subjects viewed three images from nine viewing positions: three viewing distances x three viewing positions. Though heads rotated toward the center irrespective of viewing screen positions, they also tended to turn straight forward as the viewing distance became close to an image.

    Download PDF (2903K)
  • Megumi TAKEZAWA, Hirofumi SANADA, Takahiro OGAWA, Miki HASEYAMA
    Type: LETTER
    2018 Volume E101.A Issue 6 Pages 900-903
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    In this paper, we propose a highly accurate method for estimating the quality of images compressed using fractal image compression. Using an iterated function system, fractal image compression compresses images by exploiting their self-similarity, thereby achieving high levels of performance; however, we cannot always use fractal image compression as a standard compression technique because some compressed images are of low quality. Generally, sufficient time is required for encoding and decoding an image before it can be determined whether the compressed image is of low quality or not. Therefore, in our previous study, we proposed a method to estimate the quality of images compressed using fractal image compression. Our previous method estimated the quality using image features of a given image without actually encoding and decoding the image, thereby providing an estimate rather quickly; however, estimation accuracy was not entirely sufficient. Therefore, in this paper, we extend our previously proposed method for improving estimation accuracy. Our improved method adopts a new image feature, namely lacunarity. Results of simulation showed that the proposed method achieves higher levels of accuracy than those of our previous method.

    Download PDF (1647K)
Regular Section
  • Hiroyuki ASAHARA, Takuji KOUSAKA
    Type: PAPER
    Subject area: Nonlinear Problems
    2018 Volume E101.A Issue 6 Pages 904-914
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    In this research, we propose an effective stability analysis method to impacting systems with periodically moving borders (periodic borders). First, we describe an n-dimensional impacting system with periodic borders. Subsequently, we present an algorithm based on a stability analysis method using the monodromy matrix for calculating stability of the waveform. This approach requires the state-transition matrix be related to the impact phenomenon, which is known as the saltation matrix. In an earlier study, the expression for the saltation matrix was derived assuming a static border (fixed border). In this research, we derive an expression for the saltation matrix for a periodic border. We confirm the performance of the proposed method, which is also applicable to systems with fixed borders, by applying it to an impacting system with a periodic border. Using this approach, we analyze the bifurcation of an impacting system with a periodic border by computing the evolution of the stable and unstable periodic waveform. We demonstrate a discontinuous change of the periodic points, which occurs when a periodic point collides with a border, in the one-parameter bifurcation diagram.

    Download PDF (2737K)
  • Kwangsu LEE, Dong Hoon LEE
    Type: PAPER
    Subject area: Cryptography and Information Security
    2018 Volume E101.A Issue 6 Pages 915-928
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    Functional encryption is a new paradigm of public-key encryption that allows a user to compute f(x) on encrypted data CT(x) with a private key SKf to finely control the revealed information. Multi-input functional encryption is an important extension of (single-input) functional encryption that allows the computation f(x1,...,xn) on multiple ciphertexts CT(x1),...,CT(xn) with a private key SKf. Although multi-input functional encryption has many interesting applications like running SQL queries on encrypted database and computation on encrypted stream, current candidates are not yet practical since many of them are built on indistinguishability obfuscation. To solve this unsatisfactory situation, we show that practical two-input functional encryption schemes for inner products can be built based on bilinear maps. In this paper, we first propose a two-input functional encryption scheme for inner products in composite-order bilinear groups and prove its selective IND-security under simple assumptions. Next, we propose a two-client functional encryption scheme for inner products where each ciphertext can be associated with a time period and prove its selective IND-security. Furthermore, we show that our two-input functional encryption schemes in composite-order bilinear groups can be converted into schemes in prime-order asymmetric bilinear groups by using the asymmetric property of asymmetric bilinear groups.

    Download PDF (661K)
  • Kazuki YONEYAMA, Reo YOSHIDA, Yuto KAWAHARA, Tetsutaro KOBAYASHI, Hito ...
    Type: PAPER
    Subject area: Cryptography and Information Security
    2018 Volume E101.A Issue 6 Pages 929-944
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    In this paper, we propose the first identity-based dynamic multi-cast key distribution (ID-DMKD) protocol which is secure against maximum exposure of secret information (e.g., secret keys and session-specific randomness). In DMKD protocols, users share a common session key without revealing any information of the session key to the semi-honest server, and can join/leave to/from the group at any time even after establishing the session key. Most of the known DMKD protocols are insecure if some secret information is exposed. Recently, an exposure resilient DMKD protocol was introduced, however, each user must manage his/her certificate by using the public-key infrastructure. We solve this problem by constructing the DMKD protocol authenticated by user's ID (i.e., without certificate). We introduce a formal security definition for ID-DMKD by extending the previous definition for DMKD. We must carefully consider exposure of the server's static secret key in the ID-DMKD setting because exposure of the server's static secret key causes exposure of all users' static secret keys. We prove that our protocol is secure in our security model in the standard model. Another advantage of our protocol is scalability: communication and computation costs of each user are independent from the number of users. Furthermore, we show how to extend our protocol to achieve non-interactive join by using certificateless encryption. Such an extension is useful in applications that the group members frequently change like group chat services.

    Download PDF (1403K)
  • Jie PENG, Chik How TAN, Qichun WANG, Jianhua GAO, Haibin KAN
    Type: PAPER
    Subject area: Cryptography and Information Security
    2018 Volume E101.A Issue 6 Pages 945-952
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    Research on permutation polynomials over the finite field F22k with significant cryptographical properties such as possibly low differential uniformity, possibly high nonlinearity and algebraic degree has attracted a lot of attention and made considerable progress in recent years. Once used as the substitution boxes (S-boxes) in the block ciphers with Substitution Permutation Network (SPN) structure, this kind of polynomials can have a good performance against the classical cryptographic analysis such as linear attacks, differential attacks and the higher order differential attacks. In this paper we put forward a new construction of differentially 4-uniformity permutations over F22k by modifying the inverse function on some specific subsets of the finite field. Compared with the previous similar works, there are several advantages of our new construction. One is that it can provide a very large number of Carlet-Charpin-Zinoviev equivalent classes of functions (increasing exponentially). Another advantage is that all the functions are explicitly constructed, and the polynomial forms are obtained for three subclasses. The third advantage is that the chosen subsets are very large, hence all the new functions are not close to the inverse function. Therefore, our construction may provide more choices for designing of S-boxes. Moreover, it has been checked by a software programm for k=3 that except for one special function, all the other functions in our construction are Carlet-Charpin-Zinoviev equivalent to the existing ones.

    Download PDF (1656K)
  • Qihua NIU, Tongjiang YAN, Yuhua SUN, Chun'e ZHAO, Fei TANG
    Type: PAPER
    Subject area: Cryptography and Information Security
    2018 Volume E101.A Issue 6 Pages 953-960
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    The concept of witness hiding was proposed by Feige and Shamir as a natural relaxation of zero-knowledge. Prior constructions of witness hiding protocol for general hard distribution on NP language consist of at least three rounds. In this paper we construct a two-round witness hiding protocol for all hard distributions on NP language. Our construction is based on two primitives: point obfuscation and adaptive witness encryption scheme.

    Download PDF (1400K)
  • Kuo CAO, Yueming CAI, Yongpeng WU, Weiwei YANG
    Type: LETTER
    Subject area: Digital Signal Processing
    2018 Volume E101.A Issue 6 Pages 961-966
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    This letter studies secure transmission design with finite alphabet input for cooperative jamming network under individual power constraint. By adopting the zero-force scheme, where the jamming signal is fully laid in the null space of the relay-destination channel, the problem of enhancing the achievable secrecy rate is decomposed into two independent subproblems: relay weights design and power control. We reveal that the problem of relay weights design is identical to the problem of minimizing the maximal equivalent source-eavesdropper channel gain, which can be transformed into a semi-definite programming (SDP) problem and thus is tackled using interior point method. Besides, the problem of power control is solved with the fundamental relation between mutual information and minimum mean square error (MMSE). Numerical results show that the proposed scheme achieves significant performance gains compared to the conventional Gaussian design.

    Download PDF (352K)
  • Shunsuke YAMAKI, Masahide ABE, Masayuki KAWAMATA
    Type: LETTER
    Subject area: Digital Signal Processing
    2018 Volume E101.A Issue 6 Pages 967-970
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    This letter proposes performance evaluation of phase-only correlation (POC) functions using signal-to-noise ratio (SNR) and peak-to-correlation energy (PCE). We derive the general expressions of SNR and PCE of the POC functions as correlation performance measures. SNR is expressed by simple fractional function of circular variance. PCE is simply given by squared peak value of the POC functions, and its expectation can be expressed in terms of circular variance.

    Download PDF (341K)
  • Ho-Lim CHOI
    Type: LETTER
    Subject area: Systems and Control
    2018 Volume E101.A Issue 6 Pages 971-973
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    A problem of global stabilization of a class of approximately feedback linearized systems is considered. A new system structural feature is the presence of non-trivial diagonal terms along with nonlinearity, which has not been addressed by the previous control results. The stability analysis reveals a new relationship between the time-varying rates of system parameters and system nonlinearity along with our controller. Two examples are given for illustration.

    Download PDF (425K)
  • Nan SHA, Yuanyuan GAO, Mingxi GUO, Shijie WANG, Kui XU
    Type: LETTER
    Subject area: Communication Theory and Signals
    2018 Volume E101.A Issue 6 Pages 974-977
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    We consider a physical-layer network coding (PNC) scheme based on M-ary continuous phase frequency shift keying (M-CPFSK) modulation for a bidirectional relay network. In this scheme, the maximum-likelihood sequence detection (MLSD) algorithm for the relay receiver over Rayleigh fading channels is discussed. Moreover, an upper bound on the minimum Euclidean distance for the superimposed signals is analyzed and the corresponding lower bound for the average symbol error rate (SER) at the relay is derived. Numerical results are also sustained by simulations which corroborate the exactness of the theoretical analysis.

    Download PDF (213K)
  • Jinu GONG, Hoojin LEE, Joonhyuk KANG
    Type: LETTER
    Subject area: Communication Theory and Signals
    2018 Volume E101.A Issue 6 Pages 978-981
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    In this letter, we present a new expression of ergodic capacity for two-wave with diffuse power (TWDP) fading channels. The derived formula is relatively concise and consists of well-known functions even in infinite series form. Especially, the truncated approximate expression and asymptotic formula are also presented, which enable us to obtain useful and physical insights on the effect of TWDP fading on the ergodic capacity for various fading conditions.

    Download PDF (283K)
  • Xiaoli ZENG, Longye WANG, Hong WEN, Gaoyuan ZHANG
    Type: LETTER
    Subject area: Spread Spectrum Technologies and Applications
    2018 Volume E101.A Issue 6 Pages 982-987
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    By interleaving known Z-periodic complementary (ZPC) sequence set, a new ZPC sequence set is constructed with multiple ZPC sequence subsets based on an orthogonal matrix in this work. For this novel ZPC sequence set, which refer to as asymmetric ZPC (AZPC) sequence set, its inter-subset zero cross-correlation zone (ZCCZ) is larger than intra-subset zero correlation zone (ZCZ). In particular, if select a periodic perfect complementary (PC) sequence or PC sequence set and a discrete Fourier transform (DFT) matrix, the resultant sequence set is an inter-group complementary (IGC) sequence set. When a suitable shift sequence is chosen, the obtained IGC sequence set will be optimal in terms of the corresponding theoretical bound. Compared with the existing constructions of IGC sequence sets, the proposed method can provide not only flexible ZCZ width but also flexible choice of basic sequences, which works well in both synchronous and asynchronous operational modes. The proposed AZPC sequence sets are suitable for multiuser environments.

    Download PDF (348K)
  • Feifei ZHAO, Wenping MA, Momiao ZHOU, Chengli ZHANG
    Type: LETTER
    Subject area: Mobile Information Network and Personal Communications
    2018 Volume E101.A Issue 6 Pages 988-991
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    Based on Bezout's theorem, the feasibility condition for interference alignment (IA) is established in a two-way small cell network where part of cells transmit in downlink while the others in uplink. Moreover, the sufficient and necessary condition for the two-way network to achieve as many degrees of freedom (DoFs) as the traditional one-way network is presented. We find that in certain cases every small cell can independently decide to work in either downlink mode or uplink mode as needed without causing performance degradation of IA.

    Download PDF (246K)
  • Yuta ISHIDA, Yusuke KAMEDA, Tomokazu ISHIKAWA, Ichiro MATSUDA, Susumu ...
    Type: LETTER
    Subject area: Image
    2018 Volume E101.A Issue 6 Pages 992-996
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    This paper proposes a lossy image coding method for still images. In this method, recursive and non-recursive type intra prediction techniques are adaptively selected on a block-by-block basis. The recursive-type intra prediction technique applies a linear predictor to each pel within a prediction block in a recursive manner, and thus typically produces smooth image values. In this paper, the non-recursive type intra prediction technique is extended from the angular prediction technique adopted in the H.265/HEVC video coding standard to enable interpolative prediction to the maximum possible extent. The experimental results indicate that the proposed method achieves better coding performance than the conventional method that only uses the recursive-type prediction technique.

    Download PDF (1035K)
  • Yoojin KIM, Yongwoon SONG, Hyukjun LEE
    Type: LETTER
    Subject area: Measurement Technology
    2018 Volume E101.A Issue 6 Pages 997-999
    Published: June 01, 2018
    Released: June 01, 2018
    JOURNALS RESTRICTED ACCESS

    An accurate but energy-efficient estimation of a position is important as the number of mobile computing systems grow rapidly. A challenge is to develop a highly accurate but energy efficient estimation method. A particle filter is a key algorithm to estimate and track the position of an object which exhibits non-linear movement behavior. However, it requires high usage of computation resources and energy. In this paper, we propose a scheme which can dynamically adjust the number of particles according to the accuracy of the reference signal for positioning and reduce the energy consumption by 37% on Cortex A7.

    Download PDF (1276K)
feedback
Top