A New Information-Theoretic Based Ica Algorithm For Blind Signal Separation

2003 ◽  
Vol 25 (2) ◽  
pp. 106-110 ◽  
Author(s):  
Y.-M. Cheung ◽  
L. Xu
2013 ◽  
Vol 846-847 ◽  
pp. 1257-1261
Author(s):  
Heng Yan Zhou ◽  
Yu Cong Xu ◽  
Yu Xi Luo ◽  
Yu Bao Gao

The study presents a method to separate the fetal electrocardiograph (FECG) from concomitant maternal electrocardiograph (MECG) by using Fast Independent component analysis (ICA) algorithm of Blind Signal Separation. Current methods of extracting fetal ECG have defects and drawbacks. Traditional ICA method has a persistent problem that the signal of FECG extracted from MECG was always mixed with the signal of MECG in diverse levels, and the order of MECG and FECG is uncertain, resulting in the decrease of its rate of convergence. To improve the rate of convergence, this research adopts Fast ICA algorithm. Experimental results indicate that this method is useful for extracting the fetal signal of ECG. And a satisfactory signal to noise ratio (SNR) is obtained.


2003 ◽  
Vol 14 (5) ◽  
pp. 1038-1046 ◽  
Author(s):  
Chang-Min Kim ◽  
Hyung-Min Park ◽  
Taesu Kim ◽  
Yoon-Kyung Choi ◽  
Soo-Young Lee

2010 ◽  
Vol 121-122 ◽  
pp. 423-428
Author(s):  
Yan Jun Hu ◽  
Lei Yang ◽  
Xin De Cao ◽  
Guan Jun Wang

This paper proposes an attack algorithm for digital image watermarking based on independent component analysis (ICA). The paper gives a briefly introduction about ICA algorithm, and expatiates on the attack algorithm which we proposed. The algorithm uses an auxiliary image to remove the watermark signal from the host image based on blind signal separation technology. The paper also does some experiment to attack the watermark algorithm proposed by I J. Cox. The results show that this attack algorithm not only removes most of the digital watermark information, but also has little effect on the image’s peak signal to noise ratio. The paper also discusses the attack algorithm for different watermark signals and different auxiliary images; the effect of this attack algorithm is feasible.


Sign in / Sign up

Export Citation Format

Share Document