At the Graz research Centre, an instruction Library for a deAnza IP 6400 image Array Processor has been developed. This library provides easy access the imageprocessing facilities and speeds up algorithm implementati...
详细信息
Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them....
详细信息
Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them. In the paper, a novel color image encryption algorithm is introduced. The 24 bit planes of components R, G, and B of the color plain image are obtained and recombined into 4 compound bit planes, and this can make the three components affect each other. A four-dimensional(4D) memristive hyperchaotic system generates the pseudorandom key streams and its initial values come from the SHA 256 hash value of the color plain image. The compound bit planes and key streams are confused according to the principles of genetic recombination, then confusion and diffusion as a union are applied to the bit planes,and the color cipher image is obtained. Experimental results and security analyses demonstrate that the proposed algorithm is secure and effective so that it may be adopted for secure communication.
The paper presents a general non-rigid body representation for physically-based modeling of dynamic behaviour of heterogeneous objects and its application in a development of a new heterogeneous morphing technique to ...
详细信息
Context data is one of most important parts of every context-aware system. Context data is not only trigger of events but also result of these events. So, privacy of context is one of important issue of context-aware ...
详细信息
Context data is one of most important parts of every context-aware system. Context data is not only trigger of events but also result of these events. So, privacy of context is one of important issue of context-aware system. Established methods of privacy like RBAC are not efficient to context data because these methods cannot control context data itself. So, some methods add abstraction ontology to access control framework. Abstraction ontology control expose of context data. But, using ontology to control expose of context data also have some problems. One is reliability of abstracted value and the other is performance of context data. In this paper, we suggest abstraction based access control system which minimizes abstraction overhead. To do this, we classify context data newly first. Classification of context data is based on abstraction method. And then we propose abstraction method of context data. Few context data use abstraction ontology. But, many of context data do not use abstraction ontology and abstraction of these context data reduces abstraction cost.
Grain size of forged nickel alloy is an important feature for the mechanical properties of the material. For fully automatic grain size evaluation in images of micrographs it is necessary to detect the boundaries of e...
详细信息
Cognitive radio (CR) has been considered as a promising technology to improve the spectrum utilization. In this paper we analyze the capacity of a CR network with average received interference power constraints. Under...
详细信息
Monitoring of Brain perfusion using Arterial Spin Labeling (ASL) during thrombolysis is an example of an MR procedure that will take over one hour. During this time, patient head motion is inevitable. Among the soluti...
详细信息
暂无评论