نتایج جستجو برای: key image
تعداد نتایج: 909039 فیلتر نتایج به سال:
With the use of inkless scanners as input devices for acquiring fingerprints of a person, the digital image of the finger is restricted to the area in contact with the sensor. The conventional method of fingerprint image acquisition involves obtaining a nail-to-nail image of the finger known as the rolled fingerprint impression. We present a method of constructing a rolled fingerprint from an i...
Abstract. In the textile industry, different types of foreign fibers may be mixed in cotton, and the foreign fibers seriously affect the quality of cotton products. The step of image segmentation is of vital importance in the process of the foreign fibers identification, which is, in the same way, the foundation for cotton foreign fiber automated inspection. This paper presents a new approach ...
This memorandum describes extensions to the Network Time Protocol (NTP) version 3, described in RFC 1305 [MIL92], and the Simple Network Time Protocol (SNTP) version 4, described in RFC 2030 [MIL96a], to create a framework for interoperability and coexistence of various cryptographic signature and authentication schemes that have been suggested as enhancements to NTP/SNTP [MIL96b]. Without desc...
This paper provides a novel method of reversible data hiding by adaptively adjusting the embedding level to achieve minimal distortion and to attain the embedded data confidentiality via data reversion key generation. The peak point queue (PPQ) is used to adaptively determine the embedding level and achieve superior quality in the marked image. In respect to data reversion key for the double pr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید