An adaptive digital image stabilization method based on empirical mode decomposition is presented in this paper. The frame position signal is firstly decomposed into a series of intrinsic mode functions, and then the ...
详细信息
In this paper, a novel coding scheme of multi-view image is proposed. It is based on fusion rather than redundancy removal since the former is more similar to visual characteristic of people. A multi-view image system...
详细信息
In this paper, we designed a hardware and software system using TI's new multimedia technology, Davinci based on multimedia DSP. The objective is to develop a practical internetbased intelligent video analysis pr...
详细信息
A majority of urban pretimed traffic signal control systems deploy multiple signal time-intervals to account for traffic demand changes during a day. There have been some mature studies on the algorithms of time-inter...
详细信息
A new measuring method of wool fiber diameter based on image processing was proposed. A series of computer image processing with Matlab were used to the vertical cross-section wool fiber image under the scanning elect...
详细信息
Multi-focus image fusion aims at processing and synthesizing information provided by various sensors. In this paper, the application of the shearlet transform in image fusion was discussed. Shearlet is a novel multisc...
详细信息
image encryption is one of the most important methods of image information hiding. A new image encryption method based on some techniques and knowledge of genetic engineering for image hiding is presented in this pape...
详细信息
ISBN:
(纸本)9780878492879
image encryption is one of the most important methods of image information hiding. A new image encryption method based on some techniques and knowledge of genetic engineering for image hiding is presented in this paper. This method is implemented by using modern biological techniques as tools and biological hard problems as main security basis to fully exert the special advantages. The keys are some substances of biological materials such as restriction endonuclease, polymerase and so on, the preparation flow and the experimental conditions. The analysis demonstrates that the image encryption algorithm is feasible and highly secure. Moreover, the size of the decrypted image is the same as the original image so that it can be applied for image hiding and be transmitted via the internet.
With the rise of industrial IOT and development of sensor technology, this paper proposes hoist perception system based on IOT technology. The hoist perception system is analyzed from the hardware architecture, LAN co...
详细信息
The authors take GIS technology as based platform, using internet and database management techniques, to complete the collection, storage, management, analysis, computation and graphics processing of urban public tran...
详细信息
暂无评论