The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By marking Chinese characters which have the specified number of strokes, this paper introduces a text watermarking algorithm based on the stroke of Chinese characters. Experimental results show that the algorithm has a greater watermarking capacity, stronger robustness and best imperceptibility. At the same time, the algorithm has good robustness against the format attack, and can identify the attacks...
We present a multi-stream Dynamic Bayesian Network model with Articulatory Features (AF_AV_DBN) for audio visual speech recognition. Conditional probability distributions of the nodes are defined considering the asynchronies between the articulatory features (AFs). Speech recognition experiments are carried out on an audio visual connected digit database. Results show that comparing with the state...
In reality, the paper money number recognition is significant, which can effectively prevent the illegal trade of paper money. First, this paper makes pretreatment to the paper money, and then for the rapidity and accuracy requirements, a new identification method is presented which based on intersection change and the distance difference between the two points of the character on the special location...
The paper introduces a hardware design method machine vision based of textile defect detection system. The system can effectively replace manual monitoring of textile production lines, which has greatly improved the production efficiency and automation. The system uses Samsung's ARM7 chip S3C44B0 as the production's core processor, using the FIFO memory to realize data cache of OV7620 image sensor,...
Harbor detection is an important aspect for remote sensing ocean application research. Fast and accurate harbor detection can greatly improve the ability of automatic interpretation for remote sensing image shipside buildings and ships inside ports. By having a detailed research on harbor object disposal, this paper established harbor model and advance knowledge, and proposed a harbor detection method...
In this paper, we propose a digital watermarking scheme about color image of tamper detection and recovery using block-based watermarking. Firstly, in our watermark embedding, each color channel (R, G, and B) is divided into 2??2 non-overlapping blocks. The embedding space is created by setting the three LSBs (least significant bits) of selected each block to zero, which will hold the authentication...
Perceptual image hashing maps an image to a fixed length binary string based on the image's appearance to the human eye, and has applications in content authentication, watermarking and anti-piracy search. In this paper, we present a hash scheme that is robust and secure to non-malicious manipulation and sensitive to the malicious tampering. The algorithm is based on contourlet transform and singular...
In this paper, we propose a scheme can be divided into two parts: one is about robust embedding of dual visual watermarks using DWT and Singular Value Decomposition (SVD), the other part is about tamper detection and self-recovery algorithm of color image. We stress on the latter part. Dual visual watermarks are original image watermark which is color scale image the same as original image and ownership...
Subspace methods have been successfully applied to face recognition tasks. It is well-studied in both unsupervised learning and supervised learning, such as Eigenface and Fisherface. In practice, besides abundant unlabeled examples, domain knowledge in the form of pairwise constraints is commonly available, which specifies whether a pair of instances belong to the same class or different classes....
Noise is a pivotal factor that reduces recognition accuracy of a speech recognition system. So how to extract effective speech characters is very important for a speech recognition system to increase accuracy. The paper analyses speech feature extraction and improves it. The experiments indicate that the algorithm combination LDA+MLLT+CMS has a better robustness than other combinations. Average syllable...
For the novelties or anomalies of faulty signals occur in a damage circuit and fault signals vary with different circuit damages. To ensure the accuracy and reliability of diagnosis, it is very important to extract the characteristic features of fault signals. Two feature extraction methods based on wavelet packet transform is proposed to treat transient signals: optimal wavelet packet transform (OWPT)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.