نتایج جستجو برای: key image

تعداد نتایج: 909039  

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

2007
Ali Shojaee Bakhtiari Asghar Beheshti Babak Zamanlooy

A new and efficient method for combining iris biometrics with custom cryptographic schemes to obtain an efficient biocryptosystem is proposed in this paper. Though the method structure is basically derived from a previously described biocryptosystem scheme, the introduction of new image processing methods alongside with efficient utilization of traditional methods show promising developments co...

1999
Shingo Uchihashi Jonathan Foote

This paper presents methods of generating compact pictorial sum-marizations of video. By calculating a measure of shot importance video can be summarized by de-emphasizing or discarding less important information, such as repeated or common scenes. In contrast to other approaches that present keyframes for each shot, this measure allows summarization by presenting only the most important shots....

2003
Shinyoung Lim Sangseung Kang Joo-Chan Sohn

When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the message need to be recovered. In this paper, we demonstrate how we have modeled and analyzed a new type of multiple agent based key recovery protocol. It is characterized by key encapsulation approach, protocol generalizatio...

, ,

Abstract: Background and purpose: The aim of this study was to determine the effectiveness of meta-cognitive therapy (MCT) at the level of sexual satisfaction, marital satisfaction and body image concern (BICI) married women with depression in employees working in Kerman University of Medical Sciences. Material and Method: This quasi-experimental study in which the pretest - posttest cont...

Journal: :Security and Communication Networks 2009
Panayiotis Kotzanikolaou Emmanouil Magkos Dimitrios D. Vergados Michalis Stefanidakis

Key establishment in sensor networks is a challenging task, due to the physical constraints of sensor devices and their exposure to several threats. Existing protocols based on symmetric cryptography are very efficient but they are weak against several node impersonation and insider attacks. On the other hand, asymmetric protocols are resilient to such attacks but unfortunately, they are not fe...

1998
Jiri Fridrich

We propose an oblivious watermarking technique for tamper detection in digital images. By comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing / adding features from nonmalicious changes resulting from common image processing operations. The technique can be implemented with small memory and computational...

Journal: :سنجش از دور و gis ایران 0
رضا حسینخانی دانشگاه خواجه نصیرالدین طوسی محمودرضا صاحبی دانشگاه خواجه نصیرالدین طوسی حمید عبادی دانشگاه خواجه نصیرالدین طوسی

remote sensing can be used as a powerful tool by using data from different sources and combine them for vegetation and land cover classification. pasture type classification provides key information for analysis of agricultural productivity, carbon accounting and biodiversity. the first data set that used in this study landsat tm (thematic mapper) optical image and the second envisat asar radar...

2004
Li Shijin Zhu Yuelong Yang Qian Liu Zhe

In this paper, we present a fully automatic digital chroma-keying system, which is based on the integration of color image segmentation algorithm and improved alpha estimation technique. Chroma-keying is a critical technology in virtual studio system. When used with cluttered background, it calls for much intelligence. According to the characteristics of frame images in the target application, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید