The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intelligent empty bottle inspection system is an indispensable inspection equipment of empty bottle before filling beer. It is a blend of machine vision, precision machine and real-time control. Machine vision is the hard core, which affect the speed and accuracy of the inspection. In this paper, the machine vision technology used in intelligent empty bottle inspection system is introduced, and the...
A computational framework for 3D volume reconstruction from 2D histological slices using registration algorithms in feature space is proposed. To improve the quality of reconstructed 3D volume, first, intensity variations in images are corrected by an intensity standardization process which maps image intensity scale to a standard scale where similar intensities correspond to similar tissues. Second,...
Distributed image steganography (DIS) (Y.S. Wu et al., 2004) is a new method of concealing secret information in several host images, leaving smaller traces than conventional steganographic techniques, and requiring a collection of affected images for secret information retrieval. Fusion system designs of the future will require enhanced security measures for distributed data communication. DIS, compared...
This paper presents a reliable image secret sharing method which incorporates two k-out-of-n secret sharing schemes: i) Shamir's secret sharing scheme and ii) matrix projection secret sharing scheme. The technique allows a colored secret image to be divided as n image shares so that: i) any k image shares (k les n) are sufficient to reconstruct the secret image in the lossless manner and ii) any (k...
This paper presents an image secret sharing method which essentially incorporates two k-out-of-n secret sharing schemes: i) Shamir's secret sharing scheme and ii) matrix projection secret sharing scheme. The technique allows a secret image to be divided as n image shares so that: i) any k image shares (klesn) can be used to reconstruct the secret image in lossless manner and ii) any (k-1) or fewer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.