2013 International Conference on Information Systems and Computer Networks最新文献

筛选
英文 中文
Information hiding in gray scale images using pseudo-randomized visual cryptography algorithm for visual information security 利用伪随机视觉密码算法隐藏灰度图像中的信息,实现视觉信息安全
2013 International Conference on Information Systems and Computer Networks Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524202
C. Babu, M. Sridhar, B. Babu
{"title":"Information hiding in gray scale images using pseudo-randomized visual cryptography algorithm for visual information security","authors":"C. Babu, M. Sridhar, B. Babu","doi":"10.1109/ICISCON.2013.6524202","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524202","url":null,"abstract":"Security has gained a lot of importance as information technology is widely used. Cryptography refers to the study of mathematical techniques and related aspects of Information Security like data confidentiality, data Integrity, and of data authentication. Visual cryptography (VC) is a process where a secret image is encrypted into shares which refuse to divulge information about the original secret image. Its strength is a fact that the decryption of the secret image is through human visual system without computation. A basic model for visual cryptography for natural images was proposed by Naor and Shamir. In this paper, a novel method of VC is presented for halftone images which represent the resultant image in the same size as the original secret image. Hiding of the visual information based on pseudo randomization and pixel reversal is also proposed.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Application of computer vision and color image segmentation for yield prediction precision 应用计算机视觉和彩色图像分割提高成品率预测精度
2013 International Conference on Information Systems and Computer Networks Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524164
R. S. Sarkate, N. Kalyankar, P. Khanale
{"title":"Application of computer vision and color image segmentation for yield prediction precision","authors":"R. S. Sarkate, N. Kalyankar, P. Khanale","doi":"10.1109/ICISCON.2013.6524164","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524164","url":null,"abstract":"Precision agriculture is finding its roots in India. PA always deals with the accuracy and timely information about agriculture products. With the rapid development of computer hardware and software technology, the application of image processing technology in the agricultural research are playing key role [1]. Also, with the advantages of superior speed and accuracy, computer vision has attracted it as an alternative to human inspection [2]. In this paper, we have described a novel application of computer vision and color image segmentation for automating the precise yield prediction process of gerbera flower yield from the polyhouse images. The purpose of the present study is to design a decision support system that could generate flower yield information and serve as base for management & planning of flower marketing. Current study has applied the color image segmentation technique using threshold, to extract the flowers from the scene. Color is considered a fundamental physical property of agriculture products and foods in information analysis [3]. Using HSV color space and histogram analysis, flower color definition is done. Then by the image segmentation process, flowers were separated from the background & detected in the images. Image set with 75 images were tested with this technique.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"87 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Content Based Image Retrieval using Discrete Wavelet Transform and Edge Histogram Descriptor 基于离散小波变换和边缘直方图描述符的图像检索
2013 International Conference on Information Systems and Computer Networks Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524166
S. Agarwal, A. K. Verma, Pardeep Singh
{"title":"Content Based Image Retrieval using Discrete Wavelet Transform and Edge Histogram Descriptor","authors":"S. Agarwal, A. K. Verma, Pardeep Singh","doi":"10.1109/ICISCON.2013.6524166","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524166","url":null,"abstract":"This paper describes an efficient algorithm for Content Based Image Retrieval (CBIR) based on Discrete Wavelet Transform (DWT) and Edge Histogram Descriptor (EHD) feature of MPEG-7. The proposed algorithm is explained for image retrieval based on shape and texture features only not on the basis of color information. Here input image is first decomposed into wavelet coefficients. These wavelet coefficients give mainly horizontal, vertical and diagonal features in the image. After wavelet transform, Edge Histogram Descriptor is then used on selected wavelet coefficients to gather the information of dominant edge orientations. The combination of DWT and EHD techniques increases the performance of image retrieval system for shape and texture based search. The performance of various wavelets is also compared to find the suitability of particular wavelet function for image retrieval. The proposed algorithm is trained and tested for Wang image database. The results of retrieval are expressed in terms of Precision and Recall and compared with various other proposed schemes to show the superiority of our scheme.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122922120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Route planning via facilities with time dependent 有时间依赖性的设施路线规划
2013 International Conference on Information Systems and Computer Networks Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524163
P. S. Rathore, A. Chaudhary
{"title":"Route planning via facilities with time dependent","authors":"P. S. Rathore, A. Chaudhary","doi":"10.1109/ICISCON.2013.6524163","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524163","url":null,"abstract":"In today's century, people are looking for faster and efficient communication for travelling from source to destination via facilities. As the human tendency always try to go from source to cover or attend some facilities and then reach to destination within a required time. This paper focus on algorithm for optimal route planning via facility (i.e petrol, grocery etc) with time dependent shortest path. The algorithm proposed here to minimize the travel time and provide a optimal path from source to destination with the facilities come in our path. We present here an algorithm on route planning which minimize the distance as well as time from source to destination.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"499 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Android platform to detect free fall 利用Android平台检测自由落体
2013 International Conference on Information Systems and Computer Networks Pub Date : 2013-03-01 DOI: 10.1109/ICISCON.2013.6524194
R. Tiwari, Ashutosh Kumar Singh, S. N. Khan
{"title":"Using Android platform to detect free fall","authors":"R. Tiwari, Ashutosh Kumar Singh, S. N. Khan","doi":"10.1109/ICISCON.2013.6524194","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524194","url":null,"abstract":"Accidents are often accompanied by a condition of free fall where the person involved needs immediate medical help. In such situations every moment, while alerting appropriate authorities, can be very crucial. This paper presents a detection mechanism for free fall condition using common commercially available electronic devices. We utilize an Android based smart phone with an in-built tri-axial accelerometer for the purpose. Data obtained from accelerometer is analyzed to detect free fall condition using displacement based algorithms. In case a free fall is detected then the user is prompted to respond by touch or voice in order to eliminate any false positives. If there is no response from the user, the system alerts pre-specified contacts by SMS. Our system utilizes commonly used android smart phones without the need of any additional sensors, and hence it provides a feasible and cost effective solution to fall detection.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126465449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信