The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Now-a-day, there are many devices are used to show video and images. The properties of the devices are different. People use different devices for different situations. For example, people watch movies with smart phone when they are moving. If people are in house, they watch movies with television. People use projector to watch a concert or presentation in a classroom. If a speaker is in front of...
This paper proposes a simple method for establishing a visual cryptographic (VC) scheme with the ability to prevent cheating. Given the n base-shares generated in a conventional (t,n), 2⩽t⩽n, VC scheme, an authentication pattern stamping process was designed to encode the n base-shares to get n verifiable shares that exhibit the following properties: (1) knowledge of less than t verifiable-shares...
With regards to significant images, famous painting or military image, most of they are not allowed with any loss, thus, they cannot be used for hiding secret data in order to preserve their completeness. Recently, lossless data hiding is a solution for overcoming the situation when the original cover image is very significant. A high-payload lossless data hiding scheme with block statistics characteristics...
This paper proposed a transmission system for mobile device. Different from traditional transmission methods which connect smart phone by wireless network, universal serial bus or blue tooth, the proposed method transmit information in audio by headset. To protect the company's right, the proposed method verify data by audio hiding. If the signal has not been verified, the program will not decode...
A multi-sink wireless sensor network (WSN) is composed of a large number of sensors deployed in a wide area and there are some special sensors referred as sinks which play the role of data collector. Since sensors located in different positions may bear different communication responsibilities, e.g. forwarding the data generated by some other sensors, the loading of each sensor in network is heterogeneous...
This paper proposes a video retargeting method. The method makes multimedia more suitable for ubiquitous video access, including comfortable watching, interesting region detection and safety transmitting. Because of the rapid progress of electronic commercial product, video service needs to adapt different device. There are some challenges: First at all, the resolution, aspect ratio and size of display...
This paper proposed a real-time streaming module for Android system. This module can transmit streaming data by wireless. The different from traditional transmission module is that it transmits video bi-direction and change mode automatically. The result of this paper can be used in smart-home device and the product of Sound Win Corp.
Through most of captcha images all said that their system can defense the external attacking, many corresponding researches are still presented to examine the captcha systems in the current internet platforms. The safety of captcha image can be decided by the complexity of imaging structures. Therefore, different captcha recognition methods are proposed to apply into different captcha images. In this...
This paper proposes an novel idea to develop application. Different from traditional programming methods, users can design their application without long term training. The tool prevents syntax and semantic errors during design the application. Based on the proposed idea a total solution to develop application for android system is established. The system includes a cloud system, user management system,...
The chest computed tomography (CT) is the most commonly used imaging technique for the inspection of lung lesions. In order to provide the physician more valuable preoperative opinions, a powerful computer-aided diagnostic (CAD) system is indispensable. In this paper, we aim to develop an efficient tracking framework to extract the lobe fissures by the proposed modified ant colony optimization (ACO)...
This paper proposes a hand gesture extraction method. Based on motion detection and feature recognition, an intelligent hand gesture extraction method is achieved. It is possible to apply in most of homecare system, especially those patients without the ability to speak well. the system is also can apply in intelligent commercial devices control, such as television and light.
The visual secret sharing is a method of safely transmitting and storing images. There are a lot of papers emphasis it¡¦s safety and decoding with pure eye. But the quality of recovery image is not good. However, it is a good property to prevent attack from robot by recognizing the secret image. It is necessary to decrease the decoding time when apply visual secret sharing in online application. Base...
It is popular to use mobile phone daily in modern life. Among the numerous applications provided by mobile phone, barcode utility is one of the important branches. Many companies supply barcode tools for mobile phones. For example, Google's mobile Android operating system supports QR codes by natively including the barcode scanner in some models, and the browser supports URI redirection function which...
All over the world, there are many people need to improve their basic capacity. For example, some kids can not tie their shoelace. Some people are learning disabilities. One of the reasons for these situations is lacking good sensory integration. This paper proposes a method to improve this problem. The method is to design mobile phone base software which can stimulate users.
This paper proposes a reversible visible watermarking method which are contour style. According to the fact that it has informational redundancy in a nature images usually, it is possible to embed watermarking image in the corresponding area of original image. Based on the cryptography method, users can view the original image after remove the visible watermarking by the proposed method. The proposed...
Secret image sharing is a sharing method to transmit and store images with fault tolerance property. The paper proposes a recursive method to extend conventional secret image sharing more general in application which is named multi-layer secret image sharing. It enables users more controllability to secret images than conventional secret image sharing. Moreover, a useful application is also introduced...
Secret image sharing is a method to transmit and store an image safely. The security of secret image sharing is based on the fact that the values are operated in the finite field and the number of pixels is high enough to ensure security. However, the time complexity to encode and decode a secret image is not acceptable in real-time application. There are some papers discussing how to upgrade the...
The paper presents a visual secret sharing scheme, which not only shares an image of moderate confidentiality between two noisy transparencies, but also hides in these two transparencies another secret image. None of the transparencies alone can reveal anything about the image. Later, people can view the image by simply stacking the two transparencies; on the other hand, after change the stack location...
This study presents a novel e-learning system, which automatically adjusts the content of the presentation. In contrast, a traditional learning system supplies the same content to all users, or supplies content based only on the behavior of users when learning. Based on the user's psychological analysis, study habits and characteristics of the use of the keyboard behavior analysis, this study presents...
This paper proposed a two layer authorization mechanism, including traditional password system and rhythm recognition. The whole system includes two phases: preprocessing and usual operation for users. In preprocessing phase, users type password in a specific rhythm in order to record and analyse the characteristics of behaviour of users. In the second phase, how to verify a user in usual operation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.