In this paper, we present a novel method called Code Book in steganography system based on CDMA (Code Division Multiple Access) techniques having regard to perceptibility of stego-image. These techniques and their var...
详细信息
ISBN:
(纸本)9781424435371
In this paper, we present a novel method called Code Book in steganography system based on CDMA (Code Division Multiple Access) techniques having regard to perceptibility of stego-image. These techniques and their variations are widely used in radio telecommunication systems. As it will be shown later, aptly imposed features of CDMA techniques are in consonance with imperatives claimed upon steganography systems.
An investigation of the fundamental operation of an artificial hand has been carried out with the aim to study the automatic control feedback for this system. The hand is modeled as a simple prehension system with thr...
详细信息
In this paper, we establish the corresponding points and their geometry relationship from a sequence of images. And the 3D patches are used to refine point positions. We rotate the normal to get mamy patches, and proj...
详细信息
In this paper, we establish the corresponding points and their geometry relationship from a sequence of images. And the 3D patches are used to refine point positions. We rotate the normal to get mamy patches, and project them into visible images. The NCC values between patches in reference image and patches in visible image are used to estimate the best correspondence points. And they are used to get better camera parameters by bundle adjustment. After getting more precise camera parameters, we use them to reconstruct the 3D model more realistic.
In this paper, we propose a fast algorithm that selects the temporal prediction type for the dyadic hierarchical prediction structure in scalable video coding (SVC). We make use of the strong correlations in the large...
详细信息
Double boundary text, also called outlined text, problem is presented when the text boundary has different color with background color and text stroke color. This problem, which frequently occurs in natural text of si...
详细信息
Double boundary text, also called outlined text, problem is presented when the text boundary has different color with background color and text stroke color. This problem, which frequently occurs in natural text of signboards, imposes another obstacle to the proper extraction of text information. In this paper, an efficient method is proposed based on well-known filling algorithms and characteristics of double boundary text for detecting and correcting double boundary text problem. The experimental results attained in different natural signboard images show the efficiency of our method.
This research is focused on generating dense stereo corresponding point pairs by the epipolar geometry. In this paper, the epipolar geometry is used to improve the accuracy of experimental results and the mutually-sup...
详细信息
This research is focused on generating dense stereo corresponding point pairs by the epipolar geometry. In this paper, the epipolar geometry is used to improve the accuracy of experimental results and the mutually-supported constraint is proposed for filtering wrong corresponding point pairs. For each corresponding point pair, the 3D patch is generated and projecting into images to calculate the ZNCC values. The ZNCC values are used to extracted high precision corresponding points. The method to optimize the normals is to rotate the patch around y-axis and z-axis and to change the dept. of the points. Finally, we can construct a more realistic 3D model using better dense corresponding point pairs.
We use visual hull to reconstruction rough 3D model and use images' information that we did not use it in the visual hull to refine this rough 3D model. We project 3D model patch to 2D images that the model is vis...
详细信息
We use visual hull to reconstruction rough 3D model and use images' information that we did not use it in the visual hull to refine this rough 3D model. We project 3D model patch to 2D images that the model is visible and calculate the best normal and dept. of the patch to refine the rough 3D models.
The demand for adequate security to electronic data system grows high over the decades. As the security issue also impact on the performance analysis of the wireless network, data encryption is necessary for sending a...
详细信息
The demand for adequate security to electronic data system grows high over the decades. As the security issue also impact on the performance analysis of the wireless network, data encryption is necessary for sending and receiving information secretly over the network. Since 1970s, data encryption standard (DES) has received a substantial amount of attention from academic cryptanalysts. However, in 1998 it has been proved insecure and on October 2000, National Institute of Standards and Technology (NIST) announced that the Rijndael algorithm has been selected as the advance encryption standard (AES).Our algorithm is based on AES. In this paper, we examine the performance of our new cipher in MANET and wireless LAN networks and make a performance comparison with that of AES.
With the advent development in Ubiquitous Healthcare system it's becoming one of the emerging areas of research. Due to mobile, dynamic, unpredictable and heterogeneous environment of ubiquitous computing systems ...
详细信息
We report Schottky-barrier (S-B) nanowire field effect transistors (NW FETs) with high-performance characteristics brought about by gate-induced Schottky-barrier tunneling. The devices exhibit sharp subthreshold slope...
详细信息
暂无评论