Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Discovering program behaviors and functionalities can ease program comprehension and verification. Existing program analysis approaches have used text mining algorithms to infer behavior patterns or formal models from program execution. When one tries to identify the hierarchical composition of a program behavior at different abstraction levels, textual descriptions are not informative and expressive...
In this paper, we present a novel content-based information hiding scheme which analyse the association between cover image and secret image. In order to increase the hiding capacity and imperceptibility, we plan to embed a less energy image called residual image instead of the original image by a spatial domain method least signification bit (LSB), which obtained from the statistical method-partial...
Neighborhood selection is one of the most important link in low-dimensional representations of high-dimensional data sets. Also, a good distance measure among the data points is where the shoe pinches. In this paper, we use the cam weighted distance to find a more flexible neighborhood of a data point in a newly-created space of r-isomap algorithm. It is a major advantage of r-isomap to optimize the...
Characteristic marks on the cartridge can be viewed as a ??fingerprint?? for identification of a firearm. Sometimes, however, not all information can be obtained from just one image due to the limitations of microscope and the unsmoothed specimen surface in the cartridge case image detection. Image mosaic that refers to the combination of two or more images into a single composite image is precisely...
This paper presents a novel hidden transmission method of biometric images base on chaos and image content to improve the security and secrecy of biometric verification. In our scheme, chaos is used to encrypt the watermark. The secret keys which called biokey are generated from the biometric image and used as the parameter value and initial condition of the chaotic map. The digital watermark embedded...
This paper presents a novel content-based hidden transmission method for secret data to improve the security and secrecy. In the proposed method, the secret data is encrypted by chaotic map before embedding. Then the cover image is segmented by watershed algorithm and fuzzy c-means clustering. At last we extract the feature of each region and embed the secret data into the cover image according to...
The method of the shadow detection and remove which has application value is proposed based on analyzing visual surveillance purposes. The method proposed is essentially based on linear ratio and shadow direction angle threshold to locate the rough shadow regions, considering the relationship of the probability whether it is a shadow pixels and distances which between the shadow pixels and the centroids...
This paper presents a novel lossless and content-based hidden transmission method of biometric images to improve the security and secrecy of biometric verification. Chaos is used to encrypt the watermark. The secret keys which called biokey are generated from the biometric image and used as the parameter value and initial condition of the chaotic map. The digital watermark embedded losslessly in the...
Frequent patterns in program executions represent recurring sequences of events. These patterns can be used to reveal the hidden structures of a program, and ease the comprehension of legacy systems. Existing grammar-induction approaches generally use sequential algorithms to infer formal models from program executions, in which program executions are represented as strings. Software developers, however,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.