The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Canonical Correlation Analysis (CCA) is a standard tool in statistical analysis that measures the linear relationship between two data sets. In this paper, a multi-biometric approach which combines palm print feature and palm vein feature based on Canonical Correlation Analysis is proposed. First, using a series of pre-processing and extracted the ROI (Region of interest) which has enhanced of the...
Facial expression which carries rich information of body behavior is the leading carrier of human affective and the symbol of intelligence. The main purpose of this paper is to recognize 3D human facial expression. The research in this paper includes the expression feature extraction algorithm and fusion with different kinds of feature. To contain more local texture feature information, we proposed...
In this paper, a target sound enhancement method using two microphones under a nonstationary noise environment is described. In the method, a linear filter is connected to each microphone, and filter coefficients of linear filter are determined adaptively to enhance a target sound. Then, a supervised signal is required for learning the filter. However, the supervised signal is generally unknown. According...
An image structure provides the visual information of an image which plays an important role in visual perception. Visual Perception is considered as the end product of visual system. It can be described as the way the brain interprets what the eye sees. Human Visual System can easily extract the structure information and structure character is widely used in perception-oriented image processing tasks,...
In recent years, a lot of image encryption schemes based on chaotic systems have been extensively investigated to meet the increasing demand for real-time secure image transmission. In this paper, tent maps and swapping based confusion approach were applied to design an image encryption scheme so as to enhance the security and efficiency of chaos-based image cryptosystems. The security and performance...
While video watching is now an indispensable part of the general public media consumption, yet very little is knownabout the relationship between how users interact with each otherand how that affects video consumption patterns. In this paper, weexplore the relationship between user commenting behavior andhow that might or might not be predictive of video consumptionpatterns such as watch time. Contrary...
SIMPLE (Searching Images with MPEG-7 (& MPEG-7-like) Powered Localized dEscriptors) is a model that proposes the reuse of well-established global descriptors by localizing their description mechanism on image patches located by local features' detectors. Having displayed impressive retrieval results on two different databases, in this paper we extend the family by replacing the originally picked...
Visual cryptography is process to hide information of digital images which has become an active area of research during the last decades. Because of intrinsic features of images (i.e. bulk data capacity, high redundancy etc) encryption of images is different from that of texts and it is generally difficult to handle by traditional methods. Present study proposes a novel symmetric image encryption...
As an important visual characteristic, color has been widely applied in content based image retrieval. The paper adopted the RGB color model, wherein intersection distance method, Euclidean distance method and correlation distance method based on color histogram characteristics were applied respectively in the experiments of the same sample image and the same image database. Experimental results show...
To solve the problem of estimating the signal-to-noise ratio (SNR) of LFM signal with unknown parameters, an SNR estimation algorithm is presented in this paper, which is based on the Fourier series' fitting of the auto-correlation's main lobe in time domain. Firstly, the LFM signal's auto-correlation is analyzed to deduce the relationship between the SNR and the auto-correlation in the background...
Because the contrast of the image for guiding the high-speed infrared air-to-air missile is low, its signal to noise ratio is poor and the target and its background gray-scale coupling is strong, the paper analyzes the reasons why the threshold value segmentation method and the fuzzy C-means clustering method have the over-segmentation and under-segmentation in segmenting the above type of image....
The use of multi-parameter analysis of acoustic emission signals allows identifying destructive processes not only in prestressed concrete elements but also in classical concrete and reinforced concrete members. The analysis is not based on single descriptors but on destructive processes, which may be used to evaluate structural integrity of the elements. Therefore the key question is the minimum...
This paper presents a method for human action recognition from depth sequence. First, we subdivided the normalized motion energy vector into a set of segments, whose corresponding frame indices are used to partition a video. Then each sub-action is represented by three Depth Motion Maps (DMMs) to capture motion cues in three orthogonal projection views. Multi-scale Histogram of Oriented Gradients...
In this paper, we contribute to a self-adaptive approach, namely interaction-awareness which adopts self-aware principles to dynamically manage and maintain the knowledge on the interactions between volunteer services in the volunteer computing paradigm. Such knowledge can inform the adaptation decisions, leading to increase in the precision of selecting and composing services. We evaluate the approaches...
This paper presents an improved kernelized correlation filters method for implementation on embedded hardware platforms. A software realization of the improved tracking method is developed and tested. The proposed method implemented on a personal computer platform can easily track any objects in real-time, and the same opportunity exists for the ARM platform (CPU Cortex-A8, frequency 1 GHz), but for...
Pairwise prediction-error expansion (pairwise PEE) is an improvement of the conventional PEE and it can provide excellent performance for reversible data hiding (RDH). Unlike PEE in which the prediction-errors are modified individually, the correlation among prediction-errors is exploited in pairwise PEE by jointly modifying each prediction-error pair. In this paper, the idea of pairwise PEE is developed...
The least significant bit (LSB) matching is a steganographic method which embeds the stego signal into cover images in the spatial domain. However, the stego signal disturbs the correlation of neighboring pixels in cover image and this can be utilized for steganalysis. Local binary pattern (LBP) is an effective image texture descriptor, and it can summarize the correlation of neighboring pixels. In...
This paper proposes a novel Multiview Discriminative Analysis of Canonical Correlations (MDACC) for multiview learning. The proposed MDACC can capture discriminative features. Furthermore, we present a human action recognition framework by using MDACC to fuse multimodal features, which include the hierarchical Pyramid of Depth Motion Map (HP-DMM) for the depth images, the Histogram of Oriented Displacement...
In the field of image encryption, chaotic system is more and more used in the design of secure communication system because of its characteristics of similar noise and high sensitivity to the initial value. Image encryption methods based on high-dimensional chaotic has become research hotspots, and the development of combination chaos has become development trend of image encryption. The high dimensional...
Authentication and integrity are very essential security requirements for a secure transaction. To achieve these security goals, we use a combined technology of Rivest-Shamir-Adleman cryptosystem algorithm and digital watermarking. This work proposes the Rivest-Shamir-Adleman cryptosystem algorithm to work with quantum computing idea as simulation to encrypt the image and the goal of the quantum idea...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.