The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The proposed encryption method manipulates sub-divided blocks using modified bit position to replace a secret bit. The sub-divided block contains three or more pixels of the host binary image. For every block decides to hide a secret bit. By finding the pixel position to insert a secret bit for each block, the image quality of the overt binary image can be improved. The method is fast calculation,...
Compressive sensing is a new technique in signal processing which can recover a sparse signal vector via a much smaller of non-adaptive, linear measurements than the dimension of the signal vector. In this paper, we applied compressive sensing to a joint source compression-channel coding scheme. With analysis of the reconstruction error of the sparse representation of natural image signals, we argue...
Text data hiding is a steganographic technique different from the secrets hiding in multimedia, such as images, audio and video. Sun et al. proposed a text data hiding scheme to divide the Chinese character into left and right parts for enhancing the capacity, which is called L-R scheme. Adopting the concepts of Sun et al.¡¦s scheme, Wang et al. proposed an improved version to incorporate the up and...
The visual secret sharing is a method of safely transmitting and storing images. There are a lot of papers emphasis it¡¦s safety and decoding with pure eye. But the quality of recovery image is not good. However, it is a good property to prevent attack from robot by recognizing the secret image. It is necessary to decrease the decoding time when apply visual secret sharing in online application. Base...
Recently, the falsification attack to bury an illegal script under the Web site by using SQL injection becomes a problem. Authors previously proposed the detection method by the algorithm made based on the site title actually obtained through the survey of a falsification site and an illegal script and the analysis data of the description pattern of the script. In this study, we improved the method...
This paper proposes a novel kind of graph-based features for image retrieval. For each color image, we divide it into R, G, B component images. For each component image, we view the 256 gray-levels as nodes and construct the Gray-level Co-occurrence Graph (GCG) by counting the number of occurrences for each possible gray-level pair as neighbors in the image. Based on the generated three directed weighted...
This paper explains post processing techniques used in random number generators. Popular post processing techniques have been reviewed and integrated by using HHNEC's 0.25 um eFlash process with a supply voltage of 2.5V. Furthermore these post processing techniques are compared with each other in point of throughput, simplicity, area occupation and power consumption. An alternative design methodology...
As the prevalence of broadband coherent sources, a novel algorithm for the direction of arrival (DOA) estimation of coherent signals based on DPT and virtual array is introduced. And one of the algorithms is to be done a comparison, analysis and improvement. It can settle the problem of not finding coherent signals in routine algorithm. This approach can estimate accurately and do not decrease effective...
Reversible data hiding method enables to recover the cover image after the secret data were extracted. Recently, a reversible data hiding method based on image interpolation has been proposed. It can contain high capacity and keep good visual quality. In this study, an improved method has proposed to refine the interpolation image based method. Experimental results revealed that the proposed method...
Most VQ based reversible data hiding schemes in the literature generate non-legitimate codes as output. Therefore such schemes are not suitable for some applications. In this paper a reversible data hiding scheme for VQ-compressed images based on search order coding (SOC) is proposed. The output of the proposed scheme is legitimate SOC code. Moreover the proposed scheme doesn't need any side information...
we present an improved algorithm for the multiple closed contour detection in the multi-object scene, especially for the contours partly occluded by some others. Our method formulates the boundary fragments detected by edge detector from nature image as a graph represented by a reversal symmetry matrix, which incorporates the Gestalt principles of proximity and good continuity as the transition probability...
In the process of video transmission, packets loss may lead to the reconstruction distortion. When network coding is used for video transmission, the original error will cause propagation in the following nodes. To reduce the impact of error propagation, a random linear network coding (RLNC) based on the rate distortion is proposed to realize reliable video transmission. The method finds out the optimal...
Previously, we compared several objective measures to estimate the subjective speech intelligibility scores of the Japanese Diagnostic Rhyme Test (DRT). PESQ-derived MOS, segmental SNR (SNRseg), frequency-weighed segmental SNR (fwSNRseg), and composite measures were tested. We mapped these measures to its corresponding intelligibility scores using quadratic equations trained on one speaker and one...
In this paper, we propose an error concealment algorithm based on non-uniform Lagrange interpolation for H.264 standard. To increase the accuracy of error concealment algorithm we utilize the 4 4 pixel block interpolation mode supported by H.264 standard, each of 4 4 pixel block has several directional interpolation modes, total MV (Motion Vector) directional histogram of all candidate interpolation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.