نتایج جستجو برای: key image

تعداد نتایج: 909039  

1998
Nalini K. Ratha Jonathan H. Connell Ruud M. Bolle

With the use of inkless scanners as input devices for acquiring fingerprints of a person, the digital image of the finger is restricted to the area in contact with the sensor. The conventional method of fingerprint image acquisition involves obtaining a nail-to-nail image of the finger known as the rolled fingerprint impression. We present a method of constructing a rolled fingerprint from an i...

2011
Yutao Wu Wenzhu Yang Zhenbo Li Daoliang Li

Abstract. In the textile industry, different types of foreign fibers may be mixed in cotton, and the foreign fibers seriously affect the quality of cotton products. The step of image segmentation is of vital importance in the process of the foreign fibers identification, which is, in the same way, the foundation for cotton foreign fiber automated inspection. This paper presents a new approach ...

1998
David L. Mills

This memorandum describes extensions to the Network Time Protocol (NTP) version 3, described in RFC 1305 [MIL92], and the Simple Network Time Protocol (SNTP) version 4, described in RFC 2030 [MIL96a], to create a framework for interoperability and coexistence of various cryptographic signature and authentication schemes that have been suggested as enhancements to NTP/SNTP [MIL96b]. Without desc...

Journal: :J. Vis. Lang. Comput. 2014
Ya-Chi Hsu Bo-Chao Cheng Huan Chen Yuan-Sun Chu

This paper provides a novel method of reversible data hiding by adaptively adjusting the embedding level to achieve minimal distortion and to attain the embedded data confidentiality via data reversion key generation. The peak point queue (PPQ) is used to adaptively determine the embedding level and achieve superior quality in the marked image. In respect to data reversion key for the double pr...

Journal: :EURASIP Journal on Advances in Signal Processing 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید