首页 > 最新文献

Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)最新文献

英文 中文
An Integration of Fuzzy theory and ISM for Concept Structure Analysis with Application of Learning MATLAB 模糊理论与ISM在概念结构分析中的集成及MATLAB学习应用
J. Yih, Yuan-Horng Lin
The purpose of this study is to provide an integrated method of fuzzy approach for individualized concept structure analysis. This method integrates algorithm of fuzzy logic model of perception (FLMP) and interpretive structural modeling (ISM). The combined algorithm could analyze the individualized concepts structure based on comparisons with expert. The authors provide the empirical data analysis of concepts on using MATLAB for university students. The results show that students with different response patterns and total score own varied concept structures. Based on the findings and results, some suggestions and recommendations for future research are provided.
本研究的目的是提供一种综合模糊方法来分析个体化概念结构。该方法将模糊感知逻辑模型(FLMP)算法与解释结构建模(ISM)算法相结合。该组合算法可以在与专家比较的基础上分析出个性化的概念结构。作者对大学生使用MATLAB进行概念的实证数据分析。结果表明,不同反应方式和总分的学生具有不同的概念结构。在此基础上,对今后的研究提出了一些建议。
{"title":"An Integration of Fuzzy theory and ISM for Concept Structure Analysis with Application of Learning MATLAB","authors":"J. Yih, Yuan-Horng Lin","doi":"10.1109/IIH-MSP.2007.329","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.329","url":null,"abstract":"The purpose of this study is to provide an integrated method of fuzzy approach for individualized concept structure analysis. This method integrates algorithm of fuzzy logic model of perception (FLMP) and interpretive structural modeling (ISM). The combined algorithm could analyze the individualized concepts structure based on comparisons with expert. The authors provide the empirical data analysis of concepts on using MATLAB for university students. The results show that students with different response patterns and total score own varied concept structures. Based on the findings and results, some suggestions and recommendations for future research are provided.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Multi-agent System for the Flexible Resource Constrained Project Scheduling 柔性资源约束下项目调度的多智能体系统
Jingjing Liu, Bing Wu
The resource constrained project scheduling problem (RCPSP) is extended to flexible resource constrained project scheduling problem (FRCPSP) in this paper. Resources are assumed to have certain capabilities demanded by project activities, but not necessarily all of them. Resource capability matrix (RCM) is proposed to represent flexible resources. A multi-agent system composed of resource agent, activity agent, and service agent is put forward as an information infrastructure to support flexible resource constrained project management in a highly distributed environment. The definitions of component agents and the strategies of flexible resource allocation are discussed.
本文将资源约束项目调度问题推广为柔性资源约束项目调度问题(FRCPSP)。资源被假定具有项目活动所需的某些能力,但不一定是全部。提出了资源能力矩阵(RCM)来表示柔性资源。提出了一种由资源代理、活动代理和服务代理组成的多agent系统,作为支持高度分布式环境下灵活的资源约束项目管理的信息基础设施。讨论了构件代理的定义和柔性资源分配策略。
{"title":"A Multi-agent System for the Flexible Resource Constrained Project Scheduling","authors":"Jingjing Liu, Bing Wu","doi":"10.1109/IIH-MSP.2007.33","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.33","url":null,"abstract":"The resource constrained project scheduling problem (RCPSP) is extended to flexible resource constrained project scheduling problem (FRCPSP) in this paper. Resources are assumed to have certain capabilities demanded by project activities, but not necessarily all of them. Resource capability matrix (RCM) is proposed to represent flexible resources. A multi-agent system composed of resource agent, activity agent, and service agent is put forward as an information infrastructure to support flexible resource constrained project management in a highly distributed environment. The definitions of component agents and the strategies of flexible resource allocation are discussed.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115659546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Eyes Tracking in a Video Sequence Based-On Haar-like Features and Skin Color 基于haar样特征和肤色的视频序列眼动追踪
Q. Han, Qiong Li, Xiongdong Huang, Tong Zhou, X. Niu
This paper presents a method of face and eyes locating and tracking in a video sequence based on haar-like feature and face skin color. This method first extracts the haar-like feature of face and utilize adaboost algorithm to detect face in image. Then a appropriate skin-model is employed to dispose and locate the eyes based on the geometrical model. Finally the face and eyes tracking in the video sequence is achieved. Testing with a general PC camera in the laboratory environment shows that the method provides high precision and speed.
本文提出了一种基于haar-like feature和人脸肤色的视频序列中人脸和眼睛的定位与跟踪方法。该方法首先提取人脸的haar-like特征,利用adaboost算法对图像中的人脸进行检测。然后根据所建立的几何模型,采用合适的皮肤模型对眼睛进行处理和定位。最后实现了视频序列中人脸和眼睛的跟踪。在实验室环境下用普通PC摄像机进行了测试,结果表明该方法具有较高的精度和速度。
{"title":"Eyes Tracking in a Video Sequence Based-On Haar-like Features and Skin Color","authors":"Q. Han, Qiong Li, Xiongdong Huang, Tong Zhou, X. Niu","doi":"10.1109/IIH-MSP.2007.401","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.401","url":null,"abstract":"This paper presents a method of face and eyes locating and tracking in a video sequence based on haar-like feature and face skin color. This method first extracts the haar-like feature of face and utilize adaboost algorithm to detect face in image. Then a appropriate skin-model is employed to dispose and locate the eyes based on the geometrical model. Finally the face and eyes tracking in the video sequence is achieved. Testing with a general PC camera in the laboratory environment shows that the method provides high precision and speed.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116046921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sending Mobile Software Activation Code by SMS Using Steganography 使用隐写技术发送手机软件激活码
M. Shirali-Shahreza, M. Shirali-Shahreza
Now we are able to offer numerous softwares for mobile phones after the advances in mobile phone industry. Most of these softwares should be bought in order that we can use them. Some of these softwares are sharewares and after buying them you have to insert an activation code given by the manufacturing company based on your mobile IMEI code in order to activate the software. In this paper a new method is introduced for sending the mobile software activation code by SMS (Short Message Service). In this method the activation code is hidden in an SMS picture message by steganography method and sent to the user. The software extracting the activation code from the picture and compare it with the code which is generated based on the user's mobile phone IMEI code. If the codes are the same, the software is activated. Therefore the security of transferring the activation code is increased and if the SMS message is stolen, nobody can inform the activation code. This project is implemented in J2ME (Java 2 Micro Edition) language and tested on a Nokia N71 mobile phone.
随着手机行业的发展,现在我们能够为手机提供大量的软件。大多数这些软件应该购买,以便我们可以使用它们。其中一些软件是共享软件,在购买它们之后,你必须根据你的手机IMEI代码插入制造公司给出的激活码,以激活软件。介绍了一种通过短信发送手机软件激活码的新方法。该方法通过隐写法将激活码隐藏在短信图片消息中发送给用户。软件从图片中提取激活码,并与基于用户手机IMEI码生成的激活码进行比对。如果代码相同,则表示软件激活。因此,增加了传输激活码的安全性,如果短信被盗,没有人可以通知激活码。本项目采用J2ME (Java 2 Micro Edition)语言实现,并在诺基亚N71手机上进行了测试。
{"title":"Sending Mobile Software Activation Code by SMS Using Steganography","authors":"M. Shirali-Shahreza, M. Shirali-Shahreza","doi":"10.1109/IIH-MSP.2007.279","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.279","url":null,"abstract":"Now we are able to offer numerous softwares for mobile phones after the advances in mobile phone industry. Most of these softwares should be bought in order that we can use them. Some of these softwares are sharewares and after buying them you have to insert an activation code given by the manufacturing company based on your mobile IMEI code in order to activate the software. In this paper a new method is introduced for sending the mobile software activation code by SMS (Short Message Service). In this method the activation code is hidden in an SMS picture message by steganography method and sent to the user. The software extracting the activation code from the picture and compare it with the code which is generated based on the user's mobile phone IMEI code. If the codes are the same, the software is activated. Therefore the security of transferring the activation code is increased and if the SMS message is stolen, nobody can inform the activation code. This project is implemented in J2ME (Java 2 Micro Edition) language and tested on a Nokia N71 mobile phone.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115585540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Animation Generation and Retargeting Based on Physics Characteristics 基于物理特性的动画生成和重定位
Y. Tsai, Hung-Kuo Chu, K. Cheng, Tong-Yee Lee, Chen-Lan Yen
Motion retargeting can be achieved by direct shape deformation transfer but may be visually unrealistic and physically incorrect. The purpose of this study is to include the consideration of physical properties for more realistic target motion synthesis. After partitioning source and target objects into segments, each segment mass and center of mass (COM) position/velocity are estimated. The target animation is generated by minimizing the difference in total linear momentum between source and target. Weighting functions for addressing the importance of segment motion and constraints on unrealistic segment length/velocity are also included. The results show that target movement amplitude and velocity are generally smaller than those of the source animation and with less seemly unrealistic motion. Thus, plausible animation can be generated by the retargeting procedures proposed in this study. The same methods may be applied to a variety of different target models for realistic motion synthesis.
运动重定向可以通过直接的形状变形转移来实现,但可能在视觉上不现实,在物理上不正确。本研究的目的是为了更真实的目标运动合成考虑物理特性。将源、目标物体分割成段后,估计每段质量和质心位置/速度。目标动画是通过最小化源和目标之间的总线性动量差来生成的。还包括处理分段运动重要性的加权函数和对不切实际的分段长度/速度的约束。结果表明,目标的运动幅度和速度一般小于源动画的运动幅度和速度,运动不真实的情况较少。因此,本研究提出的重定向程序可以生成可信的动画。同样的方法可以应用于各种不同的目标模型,以实现逼真的运动合成。
{"title":"Animation Generation and Retargeting Based on Physics Characteristics","authors":"Y. Tsai, Hung-Kuo Chu, K. Cheng, Tong-Yee Lee, Chen-Lan Yen","doi":"10.1109/IIH-MSP.2007.336","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.336","url":null,"abstract":"Motion retargeting can be achieved by direct shape deformation transfer but may be visually unrealistic and physically incorrect. The purpose of this study is to include the consideration of physical properties for more realistic target motion synthesis. After partitioning source and target objects into segments, each segment mass and center of mass (COM) position/velocity are estimated. The target animation is generated by minimizing the difference in total linear momentum between source and target. Weighting functions for addressing the importance of segment motion and constraints on unrealistic segment length/velocity are also included. The results show that target movement amplitude and velocity are generally smaller than those of the source animation and with less seemly unrealistic motion. Thus, plausible animation can be generated by the retargeting procedures proposed in this study. The same methods may be applied to a variety of different target models for realistic motion synthesis.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115590406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious Transactions 恶意交易检测中交易轮廓图的自动生成方法
Jinfu Chen, Yansheng Lu, Xiaodong Xie
The malicious transactions intrusion is the dominant cause that demolishes database system. DBMS is a key part in the security of database system. Enhancing the ability of detecting malicious transactions is very important in DBMS. Based on a detecting approach of malicious transactions in DBMS, an auto-generating approach of legal transactions Profile and generating algorithm are proposed in this paper. Experiment proved that the approach had good performance and accuracy. Intuitionistic Transactions profile was generated. The improved detecting approach of malicious transactions was more automatic and effective, and it had better detection ability.
恶意事务入侵是破坏数据库系统的主要原因。数据库管理系统是数据库系统安全的关键部分。增强对恶意事务的检测能力在数据库管理系统中是非常重要的。在数据库管理系统中恶意事务检测方法的基础上,提出了一种自动生成合法事务概要文件的方法和生成算法。实验证明,该方法具有良好的性能和精度。生成了直觉事务配置文件。改进后的恶意交易检测方法更加自动化和有效,具有更好的检测能力。
{"title":"An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious Transactions","authors":"Jinfu Chen, Yansheng Lu, Xiaodong Xie","doi":"10.1109/IIH-MSP.2007.76","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.76","url":null,"abstract":"The malicious transactions intrusion is the dominant cause that demolishes database system. DBMS is a key part in the security of database system. Enhancing the ability of detecting malicious transactions is very important in DBMS. Based on a detecting approach of malicious transactions in DBMS, an auto-generating approach of legal transactions Profile and generating algorithm are proposed in this paper. Experiment proved that the approach had good performance and accuracy. Intuitionistic Transactions profile was generated. The improved detecting approach of malicious transactions was more automatic and effective, and it had better detection ability.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115070971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Distance-Guided Particle Swarm Optimizer with Dynamic Mutation 具有动态变异的距离引导粒子群优化算法
Chunhe Song, Hai Zhao, Wei Cai, Haohua Zhang, Ming Zhao, Wei Gao, Xuanjie Ning, Xudong Han, Peng Zhu, Jie Gao, Tianyu Qi, Hongyan Gong
This paper presents a distance-guided particle swarm optimizer with dynamic mutation (PSODM). Two characteristics are proposed in the PSODM: distance-guided and dynamic mutation. The goal of these characteristics is to overcome premature convergence of the swarm and accelerating the convergence velocity. With distance-guided operation, some particles too intense can be separated, while with dynamic mutation operation, the particles mutated can find a better position more easily by effectively using the foregone experience. The PSODM is compared to other four types of improved PSO, and the experimental results show that the PSODM performances better on a six-function test suite with different dimensions.
提出了一种带动态变异的距离引导粒子群优化算法(PSODM)。提出了PSODM的两个特征:距离引导和动态突变。这些特性的目的是克服群体的过早收敛,加快收敛速度。距离引导操作可以分离一些强度过大的粒子,而动态突变操作可以有效地利用先验经验,使突变的粒子更容易找到更好的位置。将改进的PSODM与其他四种改进的PSODM进行了比较,实验结果表明,PSODM在不同维度的六功能测试套件上表现更好。
{"title":"The Distance-Guided Particle Swarm Optimizer with Dynamic Mutation","authors":"Chunhe Song, Hai Zhao, Wei Cai, Haohua Zhang, Ming Zhao, Wei Gao, Xuanjie Ning, Xudong Han, Peng Zhu, Jie Gao, Tianyu Qi, Hongyan Gong","doi":"10.1109/IIH-MSP.2007.292","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.292","url":null,"abstract":"This paper presents a distance-guided particle swarm optimizer with dynamic mutation (PSODM). Two characteristics are proposed in the PSODM: distance-guided and dynamic mutation. The goal of these characteristics is to overcome premature convergence of the swarm and accelerating the convergence velocity. With distance-guided operation, some particles too intense can be separated, while with dynamic mutation operation, the particles mutated can find a better position more easily by effectively using the foregone experience. The PSODM is compared to other four types of improved PSO, and the experimental results show that the PSODM performances better on a six-function test suite with different dimensions.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Knowledge Management Technologies to Develop Reflective Learning 运用知识管理技术发展反思性学习
Mingzhang Zuo, Ling-yun Yi, Gan-nian Zhang
This article has discussed three knowledge management technologies which can be used to develop reflective learning. This paper will explore the definition of reflective learning. The components related to the process of reflective learning are discussed in six areas: (1) self-examination (2) estimate if it is effective, (3) give birth to questions (4) analyze the difficulties and the gaps, (5) Give strategies, and (6) evaluate if it is effective. Based on the components, the following analyzes and demonstrates how and why they are relevant to each other. A model is provided to illustrate using three knowledge management technologies to develop reflective learning. Finally, an example is given to indicate the strategies applied to answer specific practical problem.
本文讨论了三种可用于开展反思性学习的知识管理技术。本文将探讨反思性学习的定义。与反思性学习过程相关的组成部分在六个方面进行了讨论:(1)自我检查(2)评估是否有效,(3)提出问题(4)分析困难和差距,(5)给出策略,(6)评估是否有效。基于这些组件,下面将分析并演示它们如何以及为什么彼此相关。本文提供了一个模型来说明如何利用三种知识管理技术发展反思性学习。最后,通过一个实例说明了针对具体实际问题所采用的策略。
{"title":"Using Knowledge Management Technologies to Develop Reflective Learning","authors":"Mingzhang Zuo, Ling-yun Yi, Gan-nian Zhang","doi":"10.1109/IIH-MSP.2007.319","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.319","url":null,"abstract":"This article has discussed three knowledge management technologies which can be used to develop reflective learning. This paper will explore the definition of reflective learning. The components related to the process of reflective learning are discussed in six areas: (1) self-examination (2) estimate if it is effective, (3) give birth to questions (4) analyze the difficulties and the gaps, (5) Give strategies, and (6) evaluate if it is effective. Based on the components, the following analyzes and demonstrates how and why they are relevant to each other. A model is provided to illustrate using three knowledge management technologies to develop reflective learning. Finally, an example is given to indicate the strategies applied to answer specific practical problem.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123695146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secret Image Sharing Using Quadratic Residues 基于二次残数的秘密图像共享
Chang-Chu Chen, Chinchen Chang
Secret image sharing is a technique for protecting image by splitting secret image into many shadow images that are transmitted and stored separately. In the scheme proposed in this paper, each pixel of secret image is encrypted using quadratic residues, and the cipher text is split into two bytes which are shared into two shadow images. According to the restriction of grey level images, we design two methods, namely lossy method and lossless method. The lossy method maintains the size of shadow images and the experimental results show that this method achieves high PSNR values. The lossless method enlarges shadow images to hold the overflow information. Furthermore, with quadratic residues, it is difficult to find square roots modulo a composite number, so the proposed scheme achieves image transmission secrecy.
秘密图像共享是一种通过将秘密图像分割成多个单独传输和存储的阴影图像来保护图像的技术。在本文提出的方案中,使用二次残数对秘密图像的每个像素进行加密,并将密文分割成两个字节,共享到两个阴影图像中。根据灰度图像的限制,我们设计了两种方法,即有损法和无损法。实验结果表明,该方法能够保持阴影图像的大小,达到较高的PSNR值。无损方法放大阴影图像以保存溢出信息。此外,由于存在二次残差,很难找到对合数取模的平方根,因此该方案实现了图像传输的保密性。
{"title":"Secret Image Sharing Using Quadratic Residues","authors":"Chang-Chu Chen, Chinchen Chang","doi":"10.1109/IIH-MSP.2007.274","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.274","url":null,"abstract":"Secret image sharing is a technique for protecting image by splitting secret image into many shadow images that are transmitted and stored separately. In the scheme proposed in this paper, each pixel of secret image is encrypted using quadratic residues, and the cipher text is split into two bytes which are shared into two shadow images. According to the restriction of grey level images, we design two methods, namely lossy method and lossless method. The lossy method maintains the size of shadow images and the experimental results show that this method achieves high PSNR values. The lossless method enlarges shadow images to hold the overflow information. Furthermore, with quadratic residues, it is difficult to find square roots modulo a composite number, so the proposed scheme achieves image transmission secrecy.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Colour Contrast Enhancement on Preselected Cervical Cell for ThinPrep® Images 颜色对比度增强预选宫颈细胞ThinPrep®图像
N. Mustafa, N. Isa, M. Y. Mashor, N. Othman
ThinPrepreg monolayer cytology was introduced to overcome the limitations of conventional Pap smear test for screening of cervical cancer. The cytological features in ThinPrepreg images could be improved if unwanted background information and poor contrast could be eliminated. This study proposes a contrast enhancement technique, which is only applied on the cervical cell of interest. The proposed technique is divided into two stages. Firstly, the cervical cells of interest will be selected using the modified seed based region growing algorithm. Then, the contrast of cervical cell of interest in the ThinPrepreg will be enhanced by using three contrast enhancement algorithms. The cervical cell of interest will be applied with linear contrast algorithm and the proposed nonlinear algorithms namely non-linear bright and nonlinear dark contrast to enhance the contrast of the ThinPrepreg images. The results show that the proposed technique improves the image quality. Hence, the resultant image would be rendered more useful for further analysis by pathologists.
为了克服传统巴氏涂片检查筛查子宫颈癌的局限性,引入了薄胎膜单层细胞学。如果消除不必要的背景信息和对比度差,可以改善ThinPrepreg图像的细胞学特征。本研究提出了一种对比度增强技术,仅适用于感兴趣的宫颈细胞。所提出的技术分为两个阶段。首先,使用改进的基于种子的区域生长算法选择感兴趣的子宫颈细胞;然后,使用三种对比度增强算法增强ThinPrepreg中感兴趣的宫颈细胞的对比度。将感兴趣的宫颈细胞应用线性对比度算法和所提出的非线性算法,即非线性亮对比度和非线性暗对比度来增强ThinPrepreg图像的对比度。结果表明,该方法提高了图像质量。因此,结果图像将呈现更有用的进一步分析病理学家。
{"title":"Colour Contrast Enhancement on Preselected Cervical Cell for ThinPrep® Images","authors":"N. Mustafa, N. Isa, M. Y. Mashor, N. Othman","doi":"10.1109/IIH-MSP.2007.363","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.363","url":null,"abstract":"ThinPrepreg monolayer cytology was introduced to overcome the limitations of conventional Pap smear test for screening of cervical cancer. The cytological features in ThinPrepreg images could be improved if unwanted background information and poor contrast could be eliminated. This study proposes a contrast enhancement technique, which is only applied on the cervical cell of interest. The proposed technique is divided into two stages. Firstly, the cervical cells of interest will be selected using the modified seed based region growing algorithm. Then, the contrast of cervical cell of interest in the ThinPrepreg will be enhanced by using three contrast enhancement algorithms. The cervical cell of interest will be applied with linear contrast algorithm and the proposed nonlinear algorithms namely non-linear bright and nonlinear dark contrast to enhance the contrast of the ThinPrepreg images. The results show that the proposed technique improves the image quality. Hence, the resultant image would be rendered more useful for further analysis by pathologists.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123436225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1