The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a novel depth map generation method based on geometric information. Our method divides a 2d image into two parts—the foreground and the background. Through extracting the predominant lines and vanishing point of the background, the background depth map is determined. Then we use this depth map as a ‘scalar’ to measure the depth value of the foreground object. Finally, the depth...
Knowledge-based Fuzzing technology successfully applies in software vulnerability mining, however, current Fuzzing technology mainly focuses on fuzzing target software based on single data sample and thus the vulnerability mining results are not stable, false negatives of vulnerability are high and the selection of data sample depends on people's analysis. To solve these problems, this paper proposes...
Blind source separation (BSS) has been of great interest in many areas such as wireless communications and biomedical imaging. Since many of the existing BSS methods are based on a successive cancellation procedure for extracting all the unknown sources, they suffer not only from the error propagation accumulated at each stage but also from a long processing latency. Chen et al. recently proposed...
A novel watermarking method using singular value decomposition (SVD) is presented in this paper. In this algorithm, a 3D model is taken as a model that consists of triangular meshes, and we select some triangles called independent triangles set (ITS) to generate a Hankel matrix and apply SVD on it, then watermarks are embedded through modulating singular values. The watermarks that embedded by this...
In the paper, the original image is divided into four parts by two different methods, which are taken as the observation signals in Independent Component Analysis (ICA) model. Then the watermark is embedded into DCT domain of the feature with the largest variance using iterative Adaptive Quantization Index Modulation (AQIM) and AQIM algorithms respectively. By comparing the performance of four kinds...
Recent studies have shown that BitTorrent, one of the most popular peer-to-peer file-sharing systems, is confronted with two serious problems: robustness and fairness. In this paper, a partially decentralized trust management system for BitTorrent is presented to deal with the two problems. By extending and modifying the functionality of the tracker in BitTorrent swarm, the extended tracker serves...
An independent triangles set-based watermarking algorithm using singular value decomposition (SVD) is presented in this paper. In this algorithm, a 3D model is taken as a model that consists of triangular meshes, and we select the triangles called independent triangles set (ITS) to generate a Hankel matrix and apply SVD on it, then watermarks are embedded by modulating singular values. The watermarks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.