{"title":"Evaluation of error metric for image registration of multiple images","authors":"P. Duraisamy","doi":"10.1109/icccnt.2010.5591799","DOIUrl":"https://doi.org/10.1109/icccnt.2010.5591799","url":null,"abstract":"When one image is to be registered with multiple images of the same scene, one would like to know the accuracy of the registered image. In this paper we define the comparison of different error metrics based on the No-reference method (no true value) and reference method (true value) which evaluates the performances of image registration algorithms for sequences of images. This analysis will be a useful tool for quantifying the image registration algorithm and for tuning the parameters of the registration algorithm.","PeriodicalId":134352,"journal":{"name":"2010 Second International conference on Computing, Communication and Networking Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130932365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secret sharing scheme for data encryption based on polynomial coefficient","authors":"M. Sathik, A. Selvi","doi":"10.1109/icccnt.2010.5591565","DOIUrl":"https://doi.org/10.1109/icccnt.2010.5591565","url":null,"abstract":"In recent years, there has been increasing trend for multimedia applications to use delegate service providers for content distributions. These delegate services have brought new challenges to the protection of multimedia content confidentiality. Encryption can be used to hide information from unauthorized individuals, either in transit or in storage. This technique transforms the content into unintelligible and unviewable format. This paper proposes data encryption and decryption process using secret sharing scheme. According to this process there are two levels of encryption. The first level, generates the random polynomial of degree (t-1), where t is a threshold value. The second level, evaluates the mean value of the polynomial's coefficients. The mean value is added with the ASCII value of the plain text to get the cipher text. Next the secret value of the polynomial for participant's ID values is generated. This secret is shared among ‘n’ participants. Each one gets their share. The participants reconstruct the polynomial from the shares. Then the cipher text is decrypted to get the original plain text. The comparison of the proposed method with Samier Secret Sharing method reveals that the size of the share is smaller and the protection level is high.","PeriodicalId":134352,"journal":{"name":"2010 Second International conference on Computing, Communication and Networking Technologies","volume":"427 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122723156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}