Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, a watermarking approach for the 3D models is proposed by embedding double watermarks. It is designed for the sender to check the copyright ownership (robustness) and for the receiver to verify the authentication of the received data (frangibility). The watermark is embedded at one time to possess the robust and fragile attributes by perturbing the distance between the vertices of the...
This paper identifies new class of network steganography methods that utilize mechanisms for handling oversized IP packets: IP fragmentation, PMTUD (path MTU discovery) and PLPMTUD (packetization layer path MTU discovery). In particular, for these mechanisms we propose two new steganographic methods and three extensions of existing ones. We present how mentioned mechanisms can be used to enable hidden...
Network covert channel is a communication fashion that uses the redundancy in network protocols to transfer information. The goal of covert channel is reliably transmit more information undetectably. In this paper, a simple covert timing channel with distribution matching is proposed. The approach processes the network traffic as fixed-length fragment and obtains the histogram of the delays, then...
The paper presents an analysis of performance features of the HICCUPS (hidden communication system for corrupted networks) including the efficiency and the cost of the system in WLANs (wireless local area networks). The analysis relies on the original CSMA/CA (carrier sense multiple access with collision avoidance) 802.11 Markov chain-based model and proves that the HICCUPS is the efficient steganographic...
In 2007, Wang-Chen proposed a majority-voting based self-recovery watermarking scheme, in which the additional authentication watermark of each block was embedded in the less significant bits and used to examine the authenticity of the same block. In this paper we examine the security of the Wang-Chen self-recovery watermarking scheme and show that it is vulnerable to the proposed XOR-equivalent attack...
This paper proposes a new real-time information hiding algorithm on latest H.264/AVC video coding standard. The information is embedded into the trailing ones of 4??4 blocks during the context-based adaptive variable length coding (CAVLC) process. This algorithm is efficient with low computational complexity. The simulation results show that the degradation of video quality is negligible, and the...
This paper proposes a scheme that integrates error concealment and quality access control of digital image(s) in a single platform. The objective is achieved by embedding some important information extracted from the original image itself, to introduce sufficient redundancy in the transmitted image. The data embedding is done by modulating integer wavelet coefficients using quantization index modulation...
According to the need for having a confident and secure communication of satellite images with minimum tolerable delay, a novel method is presented here as a design and simulation of contemporary techniques. This paper turns around modern algorithms, building systems with higher grade-of-service using multi-resolution decomposition. We used Discrete Wavelet Transform (DWT) as a basic tool along by...
E-service composition is most impressing method for development and deployment of e-business. Description and modeling the behavior requirements of composite e-services for users is an important key in design of services. But most work does not address the issue of how to model the requirements that the BPEL4WS processes are supposed to satisfy. The specifications in verification works are general...
As a newly software delivery model, software as a service, SaaS for short, is the best way for small and medium enterprise to adopt the newly technology. However trustworthiness is greatest challenge in the wide acceptance of SaaS. In the absence of trustworthiness in SaaS applications, data privacy is the primary and the most important issue for tenants. How to protect the data privacy when software...
This paper proposes an algorithm for estimating available bandwidth of network nodes. The algorithm, based on statistical information of the network nodes, calculates link utilization and estimates the available bandwidth through the exponentially weighed moving average (EWMA) filter, and can thereby estimate precisely the available bandwidth of the link in the next time interval. Compared with conventional...
This paper introduced a new IP-storage protocol named Ata over Ethernet, then modeled and analyzed the performance of it by comparing with iSCSI. To prove the theoretical analysis, we tested both AoE and iSCSI under various system configurations, i.e., under different network layer parameters and physical layer parameters. We found that both of them can affect AoE performance at different levels....
With the development of the information and internet technology, Vendor-Managed-Inventory (VMI) has been adopted by more and more companies. In this paper, a two-echelon supply chain inventory decision model is discussed. The products are perishable and sold over a single selling season. First a VMI model is constructed, and the supply chain members' optimal decisions are gained. Under VMI, the supplier...
The ability to match user's goals with service offers is the key to service discovery. In this paper we present an ontology-based architecture for service discovery. In our architecture, ontologies are used to give machine-understandable descriptions, and there is a central discovery platform acting as a mediator for requesters and providers. Service offers are described by abstract services, general...
This paper proposes novel algorithms for color based segmentation and shape based matching of forest fires from video frames. Fire pixels from the sample images are collected and compose 3D point cloud in RGB color space, based on which Gaussian mixture model is used to build a more precise color model. According to new definition of flame pattern, possible fire region is further segmented with the...
The article proposes to improve the active basis model by incorporating both unaligned training examples and non-alignable sketches in images. EM-type algorithm can learn the objects appear at unknown orientations, locations and scales in the training images. And non-alignable sketches can be summarized in average sketches over the image lattice. This article proposes to add the score of the non-alignable...
Object reconstruction from images is an actual research topic in computer vision, photogrammetry and spatial information science. Ontology can provide all necessary support we needed for its natural language appearance and flexible hierarchy structure. However, most current relative studies on field ontology are deduced from philosophical theme and not applicable for the raster expression-which is...
The existing approaches for object detection from remote sensing images usually have the assumptions that the location is already known or determined manually. Our paper proposes an automatic and rapid method to detect objects from satellite image with large size, which is the precondition for detailed object recognition. Since feature based method usually performs better and faster than pixel based...
How to decrease false acceptance rate is an ever-lasting target in speaker identification system. This paper proposes a new method based on the thought of discriminative weighting, which is realized by previously distributing a discriminative weighted value vector between each two speakers. The improved algorithm means to calculate discriminative weighted values based on the difference between each...
We present a multi-level partition of unity algebraic set surfaces (MPU-APSS) for surface reconstruction which can be represented by either a projection or in an implicit form. A algebraic point set surface (APSS) defines a smooth surface from a set of unorganized points using local moving least-squares (MLS) fitting of algebraic spheres. However, due to the local nature, APSS does not work well for...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.