The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Pixel expansion is a common drawback of traditional (2,2) visual secret sharing (VSS), unexpanded shares can decrease the bandwidth and save storage. In the literature, we introduce a novel (2,2) VSS scheme, that solved the pixel expansion and visual quality is almost equal with traditional (2,2) VSS. Our scheme not only can apply to (2,2) VSS, but also to (k, k) VSS. At last, analyse and experiment...
For the question of information security vulnerabilities discovery, the parallel vulnerabilities discovery method is given based on the CAPEC, CWE, CVE and other open source database and text mining. Firstly, we can extract the association vulnerability CWE under the same attack mode, then from CWE associated with CVE based on open source database. That can help us to analyze the potential parallel...
Ontology which defines a common vocabulary for researchers who need to share information in a domain is brought for convenience. However, because of human subjectivity, merely using ontology may raise the heterogeneity problem to a higher level. Therefore, it is necessary for us to find out the relationships that hold between two entities from two ontologies. The process of finding these correspondences...
Video annotation is a kind of "high-level feature extraction" or "semantic concept detection", which is a promising approach to bridging semantic gap between low-level features and user descriptions. In this paper we propose a two layer video annotation scheme based on video structure and the visual context information through the video clips. To improve the retrieval performance...
Internet of Vehicles is new concept proposed in recently year extended from Internet of Things. It plays an important role in improving traffic situation. This system is respected as a part of Internet of Vehicles aimed to identify road rage, fatigue driving or drunk driving and so on by recognizing drivers' facial expression. With Internet of Things architecture, this system has a multi-function...
Along with the rapid development of communication network construction, the operation energy consumption grows significantly in recent years, and the expensive electricity cost is hard to be ignored. Therefore, it is necessary to develop an operation energy anomaly detection mechanism to enhance the control ability of electricity cost. According to the practical distribution and data characteristic...
This paper deals with the pseudo noise (PN) generating method for digital audio watermarking using time-spread echo hiding. In time-spread echo based audio watermarking, the secret payload is embedded in the form of multiple echoes spread by a pseudo noise sequence and the pseudo noise sequence is used as secret key. Generally, the pseudo noise sequence is required to be uncorrelated with other sequence...
For audio signals, the sound quality of the stego signal should not deteriorate as much as host signal. With current methods, high sound quality means that the difference between the host and stego signals is small. We proposed a method with which high sound quality means that the sound quality of the stego signal is maintained as music even if another sound, except for host signal, is perceived....
This work proposes a novel Multiple Description Coding (MDC) method for encrypted images transmitted over unreliable networks. Here, a pseudorandom permutation is used to mask the original content to protect privacy. The encoder splits the encrypted data into two descriptions, and each description includes different rigid pixels and coefficients generated from orthogonal transform to the elastic pixels...
In this paper, a novel image steganographic method with four pixel-value-differencing and multiple-base notational is proposed. It processes non-overlapping 2 × 2 pixels blocks, and the features of edge can be considered sufficiently. Secret data, dynamically expressed as different digits in multiple-base, are embedded into each four-pixel block by adaptively applying exploiting modification direction...
With the rapid development of network instant messaging technology, data hiding based on text carrier is increasingly becoming an important means of covert communication. In this paper, a new data hiding algorithm based on dynamically generated text carrier is provided. First, it uses big data collection technology to get massive targeted corpus sample. Next, text carrier is dynamically generated...
This paper presents a reversible fragile watermarking scheme for the authentication of demosaicked images. Each authentication code is embedded into the two rebuilt components of each color pixel by using a designed authentication table (ACT). The utilization of ACT secures the watermarking procedure and the watermarked image can be recovered back to the original demosaicked image by the proposed...
Recently, the major challenge in the design of wireless sensor networks is to enhance the network lifetime. Many researchers have studied the problem of constructing virtual backbones, which are the backbones used for different time periods, in order to prolong the network lifetime. In this paper, we study the problem of constructing virtual backbones in dual-radio wireless sensor networks to maximize...
In this study, we propose a new fingertip detection algorithm using two-stage random decision forest (RDF). In the first stage, local depth difference pattern (LDDP) and 3D geodesic shortest path (GSP) are adopted for training a finger pixel classifier. Two spatial and temporal features are then added into RDF to further distinguish fingertip pixels from finger pixels in the second stage. Finally,...
The quality of images often is affected adversely by illumination and contrast,leading to the need for illumination compensation in image enhancement. The main objective of this paper is to describe how to correct the local contrast in different area of the image so that the invisible features in the dark and bright areas are brought out and made visible to the human eye. Considering the fact that...
In steganographic technique of "sum and difference covering set" (SDCS), an appropriate SDCS is used to embed data into pixel sequences of cover image. This technique extends the conventional LSB matching and matrix embedding to derive more secure steganography. In this paper, towards stego-security enhancement, a new SDCS-based contentadaptive steganography is proposed. The most noisy pixels...
Reversible data hiding has attracted more and more attention in recent years. With reversible data hiding, it requires embedding secret data into original image with devised algorithm at the encoder, and marked image can then be delivered to the decoder. At the decoder, both the secret data and original image should be perfectly separated from marked image to keep the reversibility. There are several...
It has been an important issue to improve learning quality. Traditional learning process has many problems in different areas such as teaching methods, material, examinations and etc. The teacher adjusts his teaching style only according experiences that sometimes is not sufficient. This research designs an Auxiliary Teaching Management System (ATMS) by applying Six Sigma Method. The system collects...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.