Blind source extraction (BSE) is particularly at- tractive to solve blind signal mixture problems where only a few source signals are desired. Many existing BSE methods do not take into account the existence of nois...
详细信息
Blind source extraction (BSE) is particularly at- tractive to solve blind signal mixture problems where only a few source signals are desired. Many existing BSE methods do not take into account the existence of noise and can only work well in noise-free environments. In practice, the desired signal is often contaminated by additional noise. Therefore, we try to tackle the problem of noisy component extraction. The reference signal carries enough prior information to dis- tinguish the desired signal from signal mixtures. According to the useful properties of Gaussian moments, we incorporate the reference signal into a negentropy objective function so as to guide the extraction process and develop an improved BSE method. Extensive computer simulations demonstrate its validity in the process of revealing the underlying desired signal.
Recently, Lee, Lai and Li proposed a dynamic identity based remote user authentication scheme using smart card to remedy the weaknesses of Lee-Lin-Chang's scheme. However, we find that Lee-Lai-Li's scheme is s...
详细信息
Fuzz testing is an automated black-box testing technique providing random data as input to a software system in the hope to find vulnerability. In order to be effective, the fuzzed input must be common enough to pass ...
详细信息
A robust watermarking scheme that used computer-generated holograms as the watermark is in NSCT (NonSampled Contourlet Transform) domain was proposed. To maintain imperceptibility and robustness, a repeated embedding ...
详细信息
ISBN:
(纸本)9783037855744
A robust watermarking scheme that used computer-generated holograms as the watermark is in NSCT (NonSampled Contourlet Transform) domain was proposed. To maintain imperceptibility and robustness, a repeated embedding algorithm is adopted to embed the mark hologram into the low-frequency subband of the NSCT host image. Compared with other watermark schemes using digital holograms, the proposed algorithm has the obvious advantage in robustness The experimental results demonstrated that the proposed method had good robustness to resist common attacks such as, rotation, scaling, translation, image flipping, combined attacks, filtering, occlusion, cropping, and JPEG compression.
Visual saliency detection and segmentation are widely used in many applications in image processing and computer vision. However, existing saliency detection methods have not fully taken the spatial information of sal...
详细信息
In order to take the complex background interference and real-time requirements into account, the experience apply NMI feature and Cam-Shift feature space on face tracking. By secondary search on the feature space of ...
详细信息
Aiming at solving the problems of occlusion and illumination in face recognition, a new method of face recognition based on Kernel Principal Components Analysis (KPCA) and Collaborative Representation Classifier (CRC)...
详细信息
A good method to improve the security of Steganography System is to embed messages by minimizing a sum of per-pixel distortions and the near-optimal codes for this minimization problem is the Syndrome-Trellis Codes(ST...
详细信息
ISBN:
(纸本)9781479900305
A good method to improve the security of Steganography System is to embed messages by minimizing a sum of per-pixel distortions and the near-optimal codes for this minimization problem is the Syndrome-Trellis Codes(STCs).This paper will use the non-binary embedding operations with Multi-Layered Syndrome-Trellis Codes(ML-STCs) to design image steganography method instead of simply binary embedding operation with ***,a distortion function in discrete wavelet transform domain was designed according to human visual system and integer lifting wavelet transform,which mainly concerned about the influences of frequency,luminance and texture masking factor to the cover *** then,the Multi-Layered Syndrome-Trellis Codes was combined with the distortion function to propose the steganography method,so make sure that the embedding impact to the cover minimizing and centralize in un-sensitivity *** results show that the proposed approach maintains a good visual quality of stego-image and have a high security against steganalysis in space and wavelet domain.
LBP and Gabor wavelets are two widely used and successful local image representation methods. This paper presents the visible light texture image classification method simultaneously using Gabor and Local Binary Patte...
详细信息
Increasingly widespread use of mobile devices for processing monetary transactions and accessing business secrets has created a great demand on securing mobile devices. Poorly designed authentication mechanisms (e.g.,...
详细信息
暂无评论