The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To avoid the drawbacks, namely low security level, of Ni's algorithm, this paper proposed a secure and reversible data hiding method based on odd-even interleaving embedding. This algorithm first constructed the gray level histogram of the cover image, and then used the pixels in peak point set to embed information. In the embedding process, this method embedded information in odd-even interleaving...
A new structure road detection algorithm based on open uniform B-spline curve model is proposed. Firstly, Canny edge detection algorithm is used to extract the road edge. Then road markings are gotten from the edge map by the least square method. Lastly, the road model (B-spline model) is fitted after the central points of the road are gotten from the lane markings. In order to accurate the position...
A new adaptive rational image interpolation algorithm is proposed.For a natural image, according to the difference information of the local pixel gray value in the vertical and horizonal direction, a conic blending spline with large weight parameters is employed to reconstruct sharp edges and image details within the interpolated image, and one with small weight is used to reduced the blocking artifacts...
This paper proposes the design and implementation of image compression comparator (ICC) in a digital image processing simulation system (DIPSS) based on components in detail. The ICC is designed as a component in the form of Java Beans, which improves the developing efficiency, reuses software, and make the system maintainable and expanding. In this paper, we also give an example of comparing results...
Advancements in the application of underground pipeline information have led to the increased complexity in the design and implementation of the information management system. With the underground pipelines data being managed by many different government agencies, it becomes increasing more difficult to ensure their integrity, accuracy and timeliness. In this paper, based on our practice on building...
In this paper, an integer pixel search algorithm based on prediction (PIS) is proposed. The primary characteristic of this algorithm is using quadrangle and flat hexagon as search pattern. To strengthen the flexibility and precision of this algorithm, early termination strategy is adopted. And to prove the validity of the PIS algorithm, besides some theories and computation analysis, several experiments...
In traditional symmetric watermarking schemes, the key used for watermark embedding must be available at the watermark detector. This leads to a security problem if the detectors are implemented in consumer devices that are spread all over the world. So asymmetric watermarking schemes, also named public key digital watermarking schemes attract more and more attentions. In such a public key watermarking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.