Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Due to the advent of the aging society, homecare is more and more important. In this paper, we design and implement the contactless pulse rate measurement method based on the Android smart TV, which allows the user to measure their pulse rate without requiring of contact sensors. This framework provides a convenient measurement environment for homecare. The results of the experiment show the presenting...
Contactless physiological measurement is a new trend for long-term monitoring and future home care. Remote image photo-plethysmography (RIPPG) is one of data acquisition method for contactless measurement. Nowadays, the presented frameworks are mostly developed based on PC or smartphone. However, the large scale of image and signal operations can cause the performance issues for image capturing and...
This paper presents a reversible fragile watermarking scheme for the authentication of demosaicked images. Each authentication code is embedded into the two rebuilt components of each color pixel by using a designed authentication table (ACT). The utilization of ACT secures the watermarking procedure and the watermarked image can be recovered back to the original demosaicked image by the proposed...
The goal of the project is to design intelligent and robust image-processing and augmented-reality algorithms for driver assistance and enhanced vehicular safety. In particular, the focuses were two-fold: (1) realizing the abilities to identify and localize in a vehicle''s on-board video the sweeping windshield wipers during raining days and (2) designing and implementing an in-painting technique...
This paper presents a new vision-based vehicle detection method for Forward Collision Warning System (FCWS) at nighttime. Also, lane detection is performed for assistance. To effectively extract the bright objects of interest, an essential image preprocessing including the tone mapping, contrast enhancement and adaptive binaryzation is applied in the nighttime road scenes. The characteristics of taillights...
This paper proposes a novel fast dehazing method based on dark channel prior. The dark channel prior is the phenomenon about normal outdoor images containing at least one low energy pixel around a block among three channels. It helps roughly estimating the air mediums thickness, which decreases the scene transmission. We propose a variation of optical model whose single atmospheric attenuation coefficient...
In 2007, Wang et al. proposed two visual secret sharing (VSS) schemes based on Boolean operations. The first one is a probabilistic (2, n) secret sharing scheme called (2, n) ProbVSS scheme for binary images. The other is a deterministic (n, n) secret sharing scheme for grayscale images. Although Wang et al.psilas two schemes solve the problems of computational complexity and pixel expansion at the...
This paper modifies an elegant data hiding method of Chang et alpsilas [Pattern Recog. Lett. 2004, vol. 25, no. 11, 1253-1261]. The embedding employs a modified search-order coding (SOC) technique to hide binary secret data in the vector quantization (VQ) index file of a host image. The recovered host image is identical to the one recovered by traditional VQ; the compression rate is competitive to...
Visual cryptography (VC) was introduced by Naor and Shamir. In general, a (k, n)-threshold scheme shares a given secret image S among n so-called shadow images. People can "view" the secret image by simply stacking any k of these n shadows (k < n is a threshold value). In most of the reported VC schemes, the size of each shadow is greater than that of S. This paper, we use Hilbert curve...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.