Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2471882guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
ICGEC '12: Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing
2012 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
August 25 - 28, 2012
ISBN:
978-0-7695-4763-3
Published:
25 August 2012

Reflects downloads up to 14 Dec 2024Bibliometrics
Abstract

No abstract available.

Article
Article
Article
Article
Article
Preface
Article
Stereo Matching with Semi-limited Belief Propagation

In this paper, we present an effective scheme with semi-limited belief propagation to improve the performance of stereo matching. the mean shift segmentation is first introduced to decompose both reference image and target image of stereo pair into ...

Article
A Testing Method for the Image Crosstalk of Stereoscopic Television

Cross talk is the key factor in determining the quality of stereoscopic television image. There is no normal distribution law of the stereoscopic television image cross talk value, so the traditional black and white image signal is not suitable for this ...

Article
Advance on Trust Model and Evaluation Method in Social Networks

With the rapid development of electronics, communication networks and information technologies, there are emerging more and more open Internet-based web services and versatile applications. Users or agent entities accomplish their effective interactions ...

Article
Application of Belief Learning Model Based Socio-rational Secret Sharing Scheme on Cloud Storage

In this paper, we present a hybrid socio-rational secret sharing scheme, which is based on a belief learning model. Using this model, the player can learn the probabilities of the other players' likely action, upon which the player can responsively ...

Article
Target-Preserving Content-Aware Image Resizing

This paper presents an automatic target-preserving content-aware image resizing method for displaying image with different aspect ratios. the method computes a saliency map which describes the attractive and unattractive regions in an image by the ...

Article
Improved Reversible Data Hiding Based on Residue Histogram Shifting

This paper proposes an improved reversible data hiding method for grayscale images. Specifically, this method integrates the superiority of two existing schemes to improve secret data capacity. the main idea of this method is to classify image blocks ...

Article
Joint Fingerprinting and Decryption for VQ Images through Bipartite Matching

The legality of redistribution of digital content over the Internet has become critical in commerce. the goal of the traitor tracing problem is to find out the traitor who illegally distributes the digital content. in this paper, a joint fingerprinting ...

Article
Analyze the Digital Watermarking Security Demands for the Facebook Website

When a digital service wants to protect its service quality, it needs to focus on the importance of copyright. Digital watermarking is commonly used as a protection mechanism for files posted on the Internet. in recent years, the launching of social ...

Article
Extraction and Analysis of Structural Features of Lateral Ventricle in Brain Medical Images

Structural characteristics of lateral ventricle in brain medical images from CT scan can be helpful for distinguishing between normal brain structure and abnormal brain structure. This paper presents image processing algorithms for automatic ...

Article
An Image Hiding Method by Linking Multiple Pixels with XOR Operator

In 2006, Mielikaine s method partitioned pixels into pixel pairs. Two secret bits are embedded to a pixel pair through modifying only one pixel. after that, Chan s method linked bits of two continuous pixels by using XOR operator to further reduce the ...

Article
Directional Discriminant Analysis for Image Feature Extraction

In this paper, two novel image feature extraction algorithms base on Directional Filter Banks are proposed, which are named Single Directional Two-Dimensional Linear Discriminant Analysis (SD2DLDA) and Multiple Directional Two-Dimensional Linear ...

Article
An Information Hiding Method Based on Grouping Color Palette Indices by K-means Clustering and Similar Pairs

We propose a data hiding method with color image palette. Many previous authors often embed data into the index table of the color palette or into the color palette directly. Those data hiding methods will change the color palette into a difference one. ...

Article
The Study of Automate Locate Special Fiducial Marks

This study proposed an automatic positioning technology for the precision special fiducial mark(SFM). It divided the precision SFM into the fiducial mark of double circle and the fiducial mark of corner before positioning according to SFM. First, a ...

Article
Enhancement of Dynamic ID Based User Authentication for Multi-server Environment

User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. for user authentication, in 2011, Lee et al. proposed a dynamic user authentication scheme for multi-server environments. ...

Article
Comments on a Dynamic-ID-Based Remote User Authentication Scheme for Multi-server Environment Using Smart Cards

User authentication prevents unauthorized users from accessing resources or getting applications illegally. Due to the rapid development of computer network technologies, users may gain the desired services in a multi-server environment. Recently, Lee ...

Article
An Efficient and Flexible Mobile Payment Protocol

With the development of the mobile networks, mobile payment provides a convenient way for the transactions in e-commerce. in this paper, we propose an efficient mobile payment model and its two applications. in the proposed model, mobile operator ...

Article
Payment Status and Service Level Agreement Based Access Control Method in Cloud Service Business

Cloud computing for personal use is emerging as a trend in computer industries. Service providers of cloud computing needs to control user access from business perspective. the essential business characteristics of cloud computing are payment status and ...

Article
A Security Flaw of a Bilinear-Pairing-Based Electronic Cash Scheme with Trustee-Based Anonymity Revocation

Untraceable electronic cash (e-cash) provides anonymity to ensure the privacy of payers for electronic commerce. to prevent this anonymity property from being abused by criminals, Chen et al. proposed an electronic cash scheme with trustee-based ...

Article
The Case Study of Adaptive Network-Based Fuzzy Inference System Modeling for TAIEX Prediction

The purpose of this research is to investigate the relation between international stock markets and Taiwan's stock market, and use the statistical method to identify international markets of high correlation with Taiwan's stock market as the input ...

Article
An Improvement to Lee and Hwang's Scheme

There are many key agreement schemes or key exchange schemes to help two parties to allow both parties computing a common session key in a public network. However, some of schemes can result these two parties compute no common session key. for instance, ...

Article
Analysis to Wen and Li's Scheme

In 2012, Wen and Li pointed out the weaknesses of Wang et al. s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the ...

Article
On Decoding of Binary Cyclic Codes up to Error-Correcting Capacity Five

In this paper, a simplified decoding algorithm of the binary cyclic codes with error-correcting capacity less than or equal to 5 is proposed. the simulation result of the decoding algorithm is shown that all correctable error patterns are decoded ...

Article
Semantic Clustering-Based Community Detection in an Evolving Social Network

Classic community detection methods in social networks are usually based on graph clustering algorithms which employ the structural information for group identification. They cluster nodes into groups topologically. These methods count purely on the ...

Article
The Relevant Research of Mobile Learning Mode and Information Ability Indicator in Countrified Area

This study examines the utility of mobile learning mode and information ability indicator for bridging the digital divide in countrified area based on technology acceptance model (TAM). Using the TAM as a research fram work, 247 learners from urban or ...

Article
Design of Document Access Control Mechanism on Cloud Services

In recently, due to fast development of the cloud computing, a lot of cloud applications have been developed continuously. However, users of cloud applications can easily and quickly access and share their information by their terminal devices which ...

Index Terms

  1. Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing
      Index terms have been assigned to the content through auto-classification.
      Please enable JavaScript to view thecomments powered by Disqus.

      Recommendations