نتایج جستجو برای: key image
تعداد نتایج: 909039 فیلتر نتایج به سال:
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
A new and efficient method for combining iris biometrics with custom cryptographic schemes to obtain an efficient biocryptosystem is proposed in this paper. Though the method structure is basically derived from a previously described biocryptosystem scheme, the introduction of new image processing methods alongside with efficient utilization of traditional methods show promising developments co...
This paper presents methods of generating compact pictorial sum-marizations of video. By calculating a measure of shot importance video can be summarized by de-emphasizing or discarding less important information, such as repeated or common scenes. In contrast to other approaches that present keyframes for each shot, this measure allows summarization by presenting only the most important shots....
When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the message need to be recovered. In this paper, we demonstrate how we have modeled and analyzed a new type of multiple agent based key recovery protocol. It is characterized by key encapsulation approach, protocol generalizatio...
Abstract: Background and purpose: The aim of this study was to determine the effectiveness of meta-cognitive therapy (MCT) at the level of sexual satisfaction, marital satisfaction and body image concern (BICI) married women with depression in employees working in Kerman University of Medical Sciences. Material and Method: This quasi-experimental study in which the pretest - posttest cont...
Key establishment in sensor networks is a challenging task, due to the physical constraints of sensor devices and their exposure to several threats. Existing protocols based on symmetric cryptography are very efficient but they are weak against several node impersonation and insider attacks. On the other hand, asymmetric protocols are resilient to such attacks but unfortunately, they are not fe...
We propose an oblivious watermarking technique for tamper detection in digital images. By comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing / adding features from nonmalicious changes resulting from common image processing operations. The technique can be implemented with small memory and computational...
remote sensing can be used as a powerful tool by using data from different sources and combine them for vegetation and land cover classification. pasture type classification provides key information for analysis of agricultural productivity, carbon accounting and biodiversity. the first data set that used in this study landsat tm (thematic mapper) optical image and the second envisat asar radar...
Hybrid Color Image Segmentation Based Fully Automatic Chroma-Keying System with Cluttered Background
In this paper, we present a fully automatic digital chroma-keying system, which is based on the integration of color image segmentation algorithm and improved alpha estimation technique. Chroma-keying is a critical technology in virtual studio system. When used with cluttered background, it calls for much intelligence. According to the characteristics of frame images in the target application, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید