7 Hits in 5.9 sec

A fast-blind IP watermark detection scheme based on position fuzzification

Weihong Huang, Renfa Li, Jianbo Xu, Yin Huang, Yong Sheng
2019 International Journal of Embedded Systems  
To address this issue, we propose a position fuzzification-based IP watermark detection scheme mainly aiming to reduce the rounds of inquiry.  ...  Existing zero-knowledge-based IP watermark detection schemes have low performance in real-time detection.  ...  In this paper, we propose a fast blind watermark detection scheme based on position fuzzification.  ... 
doi:10.1504/ijes.2019.097575 fatcat:krjuu374orbutmrqoiw2g33dzy

Optimal fuzzy system design for additive noise removal in color images

Snekha Snekha
2013 IOSR Journal of Electronics and Communication Engineering  
We tested the proposed method on color images that are corrupted with mixed noise both Gaussian and Salt & Pepper noise.  ...  use pixel similarity based concept.The Gaussian noise will be removed by using weighted mean filtering of peer group members.  ...  Acknowledgements The authors thank the reviewers for their valuable comments and suggestions that helped us to make the paper in its present form Speed and Position Control of Train System Using GPS  ... 
doi:10.9790/2834-560107 fatcat:hhbke72jsrcuxhvryf777lq3ja

Surveillance on Manycasting Over Optical Burst Switching (OBS) Networks under Secure Sparse Regeneration

C.Veera lakshmi
2013 IOSR Journal of Electronics and Communication Engineering  
Manycasting is a communication paradigm to implement the distributed applications. In manycasting, destinations can join or exit the group, depending on the service requirements imposed on them.  ...  Each application requires its own QoS threshold attributes like physical layer properties, delay as a result of transmission and reliability of the link.  ...  To avoid blind point, which may appear when two neighbouring nodes expect each other"s sponsoring, a back off-based scheme is introduced to let each node delay its decision with a random period of time  ... 
doi:10.9790/2834-0460108 fatcat:5qasfbq4n5cbpln42h3pa3cucq

Image Steganography Using HBC and RDH Technique

Hemalatha M, Prasanna A, Dinesh Kumar R, Vinothkumar D
2014 International Journal of Computer Applications Technology and Research  
The proposed scheme treats the image as a whole. Here Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency.  ...  Hide Behind Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo Random Numbers. The Secret keys are used for corner parts.  ...  We can correlate the watermark signatures and identify it's the positive or negative correlation, if positive occurs it detect it is the authenticated user otherwise, if negative occurs it detect it is  ... 
doi:10.7753/ijcatr0303.1001 fatcat:4i6tujs4oje2tnxf5c25eh26x4

Microcontroller Implementation of Rule-based Inference System for Smart Home

BonJae Koo, Young Soo Park, SungHyun Yang
2014 International Journal of Smart Home  
The smart home is one of the best context aware application areas.  ...  Abstract: Context aware application is the autonomous service that adapt to changing environment on the basis of individuals' preferences.  ...  In synopsis, Pakistani firms employed 57% leverage in their capital structure that builds financial stress on firms.  ... 
doi:10.14257/ijsh.2014.8.6.19 fatcat:eiaeqnd4kfhznpn5r6fgffneq4


2021 2021 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)  
, Taiwan) Nowadays, indoor positioning systems (IPS) have gained popularity for offering location-based services.  ...  Previously, we have proposed the fingerprint-based indoor positioning system using IEEE 802.15.4. By limiting the positioning resolution by one room, it can detect the current position accurately.  ... 
doi:10.1109/icce-tw52618.2021.9602919 fatcat:aetmvxb7hfah7iuucbamos2wgu

Apect-Based Opinion Extraction From Customer Reviews

Amani K Samha, Yuefeng Li, Jinglan Zhang
2014 Computer Science & Information Technology ( CS & IT )   unpublished
The conferences attracted many local and international delegates, presenting a balanced mixture of intellect from the East and from the West.  ...  The goal of this conference series is to bring together researchers and practitioners from academia and industry to focus on understanding computer science and information technology and to establish new  ...  This scheme is a non-blind and the transparency of the watermarked image is weak. Makhloghi et al.  ... 
doi:10.5121/csit.2014.4413 fatcat:kln57k7f25dl3hx6ml43a7btfq