No abstract available.
Stereo Matching with Semi-limited Belief Propagation
In this paper, we present an effective scheme with semi-limited belief propagation to improve the performance of stereo matching. the mean shift segmentation is first introduced to decompose both reference image and target image of stereo pair into ...
A Testing Method for the Image Crosstalk of Stereoscopic Television
Cross talk is the key factor in determining the quality of stereoscopic television image. There is no normal distribution law of the stereoscopic television image cross talk value, so the traditional black and white image signal is not suitable for this ...
Advance on Trust Model and Evaluation Method in Social Networks
With the rapid development of electronics, communication networks and information technologies, there are emerging more and more open Internet-based web services and versatile applications. Users or agent entities accomplish their effective interactions ...
Application of Belief Learning Model Based Socio-rational Secret Sharing Scheme on Cloud Storage
In this paper, we present a hybrid socio-rational secret sharing scheme, which is based on a belief learning model. Using this model, the player can learn the probabilities of the other players' likely action, upon which the player can responsively ...
Target-Preserving Content-Aware Image Resizing
This paper presents an automatic target-preserving content-aware image resizing method for displaying image with different aspect ratios. the method computes a saliency map which describes the attractive and unattractive regions in an image by the ...
Improved Reversible Data Hiding Based on Residue Histogram Shifting
This paper proposes an improved reversible data hiding method for grayscale images. Specifically, this method integrates the superiority of two existing schemes to improve secret data capacity. the main idea of this method is to classify image blocks ...
Joint Fingerprinting and Decryption for VQ Images through Bipartite Matching
The legality of redistribution of digital content over the Internet has become critical in commerce. the goal of the traitor tracing problem is to find out the traitor who illegally distributes the digital content. in this paper, a joint fingerprinting ...
Analyze the Digital Watermarking Security Demands for the Facebook Website
When a digital service wants to protect its service quality, it needs to focus on the importance of copyright. Digital watermarking is commonly used as a protection mechanism for files posted on the Internet. in recent years, the launching of social ...
Extraction and Analysis of Structural Features of Lateral Ventricle in Brain Medical Images
Structural characteristics of lateral ventricle in brain medical images from CT scan can be helpful for distinguishing between normal brain structure and abnormal brain structure. This paper presents image processing algorithms for automatic ...
An Image Hiding Method by Linking Multiple Pixels with XOR Operator
In 2006, Mielikaine s method partitioned pixels into pixel pairs. Two secret bits are embedded to a pixel pair through modifying only one pixel. after that, Chan s method linked bits of two continuous pixels by using XOR operator to further reduce the ...
Directional Discriminant Analysis for Image Feature Extraction
In this paper, two novel image feature extraction algorithms base on Directional Filter Banks are proposed, which are named Single Directional Two-Dimensional Linear Discriminant Analysis (SD2DLDA) and Multiple Directional Two-Dimensional Linear ...
An Information Hiding Method Based on Grouping Color Palette Indices by K-means Clustering and Similar Pairs
We propose a data hiding method with color image palette. Many previous authors often embed data into the index table of the color palette or into the color palette directly. Those data hiding methods will change the color palette into a difference one. ...
The Study of Automate Locate Special Fiducial Marks
This study proposed an automatic positioning technology for the precision special fiducial mark(SFM). It divided the precision SFM into the fiducial mark of double circle and the fiducial mark of corner before positioning according to SFM. First, a ...
Enhancement of Dynamic ID Based User Authentication for Multi-server Environment
User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. for user authentication, in 2011, Lee et al. proposed a dynamic user authentication scheme for multi-server environments. ...
Comments on a Dynamic-ID-Based Remote User Authentication Scheme for Multi-server Environment Using Smart Cards
User authentication prevents unauthorized users from accessing resources or getting applications illegally. Due to the rapid development of computer network technologies, users may gain the desired services in a multi-server environment. Recently, Lee ...
An Efficient and Flexible Mobile Payment Protocol
With the development of the mobile networks, mobile payment provides a convenient way for the transactions in e-commerce. in this paper, we propose an efficient mobile payment model and its two applications. in the proposed model, mobile operator ...
Payment Status and Service Level Agreement Based Access Control Method in Cloud Service Business
Cloud computing for personal use is emerging as a trend in computer industries. Service providers of cloud computing needs to control user access from business perspective. the essential business characteristics of cloud computing are payment status and ...
A Security Flaw of a Bilinear-Pairing-Based Electronic Cash Scheme with Trustee-Based Anonymity Revocation
Untraceable electronic cash (e-cash) provides anonymity to ensure the privacy of payers for electronic commerce. to prevent this anonymity property from being abused by criminals, Chen et al. proposed an electronic cash scheme with trustee-based ...
The Case Study of Adaptive Network-Based Fuzzy Inference System Modeling for TAIEX Prediction
The purpose of this research is to investigate the relation between international stock markets and Taiwan's stock market, and use the statistical method to identify international markets of high correlation with Taiwan's stock market as the input ...
An Improvement to Lee and Hwang's Scheme
There are many key agreement schemes or key exchange schemes to help two parties to allow both parties computing a common session key in a public network. However, some of schemes can result these two parties compute no common session key. for instance, ...
Analysis to Wen and Li's Scheme
In 2012, Wen and Li pointed out the weaknesses of Wang et al. s scheme, then, they proposed a dynamic ID-based remote user authentication scheme to improve it. They claimed the proposed scheme having fixed it the weaknesses pointed to. However, the ...
On Decoding of Binary Cyclic Codes up to Error-Correcting Capacity Five
In this paper, a simplified decoding algorithm of the binary cyclic codes with error-correcting capacity less than or equal to 5 is proposed. the simulation result of the decoding algorithm is shown that all correctable error patterns are decoded ...
Semantic Clustering-Based Community Detection in an Evolving Social Network
Classic community detection methods in social networks are usually based on graph clustering algorithms which employ the structural information for group identification. They cluster nodes into groups topologically. These methods count purely on the ...
The Relevant Research of Mobile Learning Mode and Information Ability Indicator in Countrified Area
This study examines the utility of mobile learning mode and information ability indicator for bridging the digital divide in countrified area based on technology acceptance model (TAM). Using the TAM as a research fram work, 247 learners from urban or ...
Design of Document Access Control Mechanism on Cloud Services
In recently, due to fast development of the cloud computing, a lot of cloud applications have been developed continuously. However, users of cloud applications can easily and quickly access and share their information by their terminal devices which ...
Index Terms
- Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing