The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An important storage capacity is necessary for the growing information need in images processing applications. But, some applications like cartography and electronic surveillance can tolerate little distortion of this information. Thus, quantization algorithms have been proposed to reduce memory space occupied and processing time. Our quantization algorithm is based on the criterion of colorimetric...
Banks collect large amount of historical records corresponding to millions of credit cards operations, but, unfortunately, only a small portion, if any, is open access. This is because, e.g., the records include confidential customer data and banks are afraid of public quantitative evidence of existing fraud operations. This paper tackles this problem with the application of surrogate techniques to...
Covert channels exploit network resources never intended for the purpose of communication in order to transfer messages undetectable by conventional security measures like intrusion detection systems and firewalls. Since covert communication provides a means to secretly transfer messages they pose a grave cyber security threat. Most research in detecting covert timing channels are focused on detecting...
The most popular techniques in early breast cancer detection is using digital mammogram. However, the challenge lies in early and accurate detection the irregular masses with spiculated margin as the most common abnormality. This paper proposes an image classifier to classify the mammogram images. The abnormality that can be founded in mammogram image is classified into malignant, benign and normal...
The simultaneity of power produced by wind turbines (WTs) as a function of total power of the wind farm (WF) is investigated in the first part of this paper, and subsequently, a probabilistic approach to model the simultaneity of WT power in a WF is proposed. The investigation of the WT power simultaneity is carried out by analyzing measurement data sets. In this regard, the influence of the following...
In this paper image encryption and decryption using key sequence {Ki} generated by sequence {K1, i} of logistic map and sequence of states {K2, i} of Linear Feedback Shift Register (LFSR) is proposed. Initially one dimensional sequence is generated in the range of 0 to 1 using logistic map for the bifurcation parameter r and initial value X0. The generated sequences are multiplied with 255 and bit...
In content-based image retrieval, and for this critical issue of image feature fusion, paper proposes a new method to determine the weights for multi-feature fusion. In this paper, color histogram, color correlogram, gray level co-occurrence matrix, Tamura and Hu moments, this five kinds of feature extraction method was adopted. Firstly, use these five features conducted single feature retrieval on...
Indoor place categorization is an important capability for service robots working and interacting in human environments. This paper presents a new place categorization method which uses information about the spatial correlation between the different image modalities provided by RGB-D sensors. Our approach applies co-occurrence histograms of local binary patterns (LBPs) from gray and depth images that...
I frame or I slice which adopts the intra prediction is a key part of video coding. Intra prediction is important because the prediction accuracy directly affects the efficiency of the following transformation, quantization and entropy coding. According to the case of intra mode selection in HEVC, it is necessary to improve the prediction for the two most frequently used modes, DC and PLANAR. A significant...
Least significant bit (LSB) matching is a well-known steganographic method, which can embed large payload into cover data with good visual and statistical imperceptibility. However, it disturbs the correlation of adjacent pixels in smooth image regions as it randomly modifies half of the payload pixels by 1. Local binary patterns (LBPs) are first proposed as texture features, and can summarize local...
The popularization of the Internet made it a primary information source for many people. Unfortunately quality of information available on the Internet varies. Therefore, evaluation of credibility of web page content, especially while making important decisions like those concerning health care, medical information, and large purchases, is crucial, but users often lack a necessary knowledge. The main...
This paper presents a performance comparison between two validation methods developed specifically for the Computational Electromagnetics purposes: the Feature Selective Validation (FSV) and the Feature Selective Normalized Mutual Information (FSNMI) index. To achieve this goal, a statistical analysis of 40 different cases of study (pairs of data sets) is carried out covering a wide range of real-life...
Research in automated human gait recognition has largely focused on developing robust feature representation and matching algorithms. In this paper, we investigate the possibility of clustering gait patterns based on the features extracted by automated gait matchers. In this regard, a k-means based clustering approach is used to categorize the feature sets extracted by three different gait matchers...
Infrared face recognition, being light- independent, and not vulnerable to facial skin, expressions and posture, can avoid or limit the drawbacks of face recognition in visible light. To extract spatial relations among the local binary pattern (LBP), a new infrared face recognition method based on LBP co-occurrence matrix is proposed in this paper. In traditional LBP-based features such as LBP histogram,...
This paper details an approach for novel video viewing experience on small-screen mobile devices. Users are allowed to choose a region-of-interest via a touch-based gesture, following which a virtual camera algorithm takes control in order to automatically zoom and pan within the video scene. The selected region-of-interest is kept within a retargeted viewport despite change in the position of the...
With the growth of image processing applications, image segmentation has become an important part of image processing. The simplest method to segment an image is thresholding. Using the thresholding method, segmentation of an image is done by fixing all pixels whose intensity values are more than the threshold to a foreground value. The remaining pixels are set to a background value. Such technique...
Extraction of between-participants common patterns of brain activity is currently one of the most debated challenges in cognitive neuroscience. So far, by applying functional hyperalignment method [1] to functional magnetic resonance imaging (FMRI) data, relevant results have been obtained on datasets where different participants underwent the same stimulations. This challenge is however less explored...
Malicious information like harassment, slander or bogus news is becoming a serious problem on social networking sites, and solving it requires profound insight into user behaviors of malicious and victim accounts. In this paper, we conduct a preliminary study on a whistleblowing network, constructed from 328472 whistleblowing (complaining) reports. To evaluate its efficiency, we perform a series of...
Shot segmentation is an important preprocessing step towards content based video analysis. In this paper, we propose a Spatio-Temporal Fuzzy Hostility Index (STFHI) for determining the edges of objects present in the frames, composing the video. The edges present in the frames are treated as features of the frame. The correlation between the features is computed for successive frames of the video...
The vital role Supervisory Control And Data Acquisition (SCADA) systems play in controlling the modern infrastructure; along with the rapid evolution of these systems have turned them into one of the most desired targets for malicious attackers. Moreover, SCADA-specific attacks are becoming more sophisticated, and yet security measures are deployed at a very slow pace. In this work, we present a SCADA-specific...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.