A {k, n}-secret Sharing Scheme for Color Images

Size: px
Start display at page:

Download "A {k, n}-secret Sharing Scheme for Color Images"

Transcription

1 A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University of Toronto, 10 King s College Road, Toronto, M5S 3G4, Canada {lukar,kostas,anv}@dsp.utoronto.a Abstrat. This paper introdues a new {k, n}-seret sharing sheme for olor images. The proposed method enrypts the olor image into n olor shares. The seret information is reovered only if the k (or more) allowed shares are available for deryption. The proposed method utilizes the onventional {k, n}-seret sharing strategy by operating at the bit-levels of the deomposed olor image. Modifying the spatial arrangements of the binary omponents, the method produes olor shares with varied both the spetral harateristis among the RGB omponents and the spatial orrelation between the neighboring olor vetors. Sine enryption is done in the deomposed binary domain, there is no obvious relationship in the RGB olor domain between any two olor shares or between the original olor image and any of the n shares. This inreases protetion of the seret information. Inverse ryptographi proessing of the shares must be realized in the deomposed binary domain and the proedure reveals the original olor image with perfet reonstrution. 1 Introdution Visual ryptography [2],[3],[4],[8],[11] is a popular ryptographi tool used for protetion of sanned douments and natural digital images whih are distributed via publi networks. These tehniques are based on the priniple of sharing seret information among a group of partiipants. The shared seret an be reovered only when a oalition of willing partiipants are polling their enrypted images, the so-alled shares, together. Seret sharing shemes are usually termed visual sine the seret (original) information an be diretly revealed from staked shares (e.g realized as transparenies) through simple visual inspetion, without any omputer-guided proessing [9],[11]. A {k, n}-threshold visual ryptography sheme [5],[6],[11] often alled {k, n}- visual seret sharing (VSS), is used to enrypt an input image by splitting the original ontent into n, seemingly random, shares. To reover the seret information, k (or more) allowed shares must be staked together. M. Bubak et al. (Eds.): ICCS 2004, LNCS 3039, pp , Springer-Verlag Berlin Heidelberg 2004

2 A {k, n}-seret Sharing Sheme for Color Images 73 (a) (b) () Fig. 1. Visual ryptography: (a) original binary image, (b,) share images, derypted, output image 2 {k, n}-seret Sharing Sheme Due to its algorithmi nature, onventional visual ryptography shemes operate on a binary input (Fig. 1) [10]. Assuming a K 1 K 2 binary image (blak and white image with 0 values denoting the blak and 1 values denoting the white), eah binary pixel r (i,j) determined by spatial oordinates i =1, 2,..., K 1 and j =1, 2,..., K 2 is replaed via an enryption funtion f e ( ) with a m 1 m 2 blok of blak and white pixels in eah of the n shares. Repeating the proess for eah input pixel, a K 1 K 2 input binary image is enrypted into n binary shares eah one with a spatial resolution of m 1 K 1 m 2 K 2 pixels. Sine the spatial arrangement of the pixels varies from blok to blok, the original information annot be revealed without aessing a predefined number of shares. Let as assume a basi {2, 2}-threshold struture whih is the basi ase designed within the {k, n}-vss framework [1],[7]. Assuming for simpliity a basi struture with 2 2 bloks s 1 =[s (2i 1,2j 1),s (2i 1,2j),s (2i,2j 1),s (2i,2j) ] S 1 and s 2 =[s (2i 1,2j 1),s (2i 1,2j),s (2i,2j 1),s (2i,2j) ] S 2, the enryption proess is defined as follows: f e (r (i,j) )= { [s1, s 2 ] T C 0 for r (i,j) =0 [s 1, s 2 ] T C 1 for r (i,j) =1 (1) where C 0 and C 1 are the sets obtained by permuting the olumns of the n m 1 m 2 basis matries A 0 and A 1, respetively [10]. Sine m 1 m 2 represents the fator by whih eah share is larger than the original image, it is desirable to make m 1 m 2 as small as possible. In the ase of the {2, 2}-VSS the optimal hoie m 1 and m 2 leads to m 1 = 2 and m 2 = 2 resulting in 2 2 bloks s 1 and s 2.

3 74 R. Luka, K.N. Plataniotis, and A.N. Venetsanopoulos (a) (b) (e) () Fig. 2. Halftoning-based seret sharing of olor images: (a) original olor image, (b) halftone image obtained using Floyd-Steinberg filter [12], (,d) share images, (e) derypted, output image Assuming the {2, 2}-VSS the sets { } C 0 = [ 0,1,0,1 1,0,1,0 0,0,1,1 1,1,0,0 1,0,0,1 0,1,1,0 1,0,1,0 0,1,0,1 1,1,0,0 0,0,1,1 0,1,1,0 1,0,0,1 ] (2) { } C 1 = [ 0,1,0,1 1,0,1,0 0,0,1,1 1,1,0,0 1,0,0,1 0,1,1,0 0,1,0,1 1,0,1,0 0,0,1,1 1,1,0,0 1,0,0,1 0,1,1,0 ] (3) inlude all matries obtained by permuting the olumns of the 2 4 basis matries A 0 and A 1, respetively [10],[11]. The basi matries onsidered here are defined as follows: [ ] [ ] A 0 =,A = (4) 0101 If a seret pixel is white, i.e. r (i,j) = 1, then eah pixel in s 1 is equivalent to eah pixel in s 2, and thus, [s 1, s 2 ] T an be any member of set C 1. If a seret pixel is blak, i.e. r (i,j) = 0, then eah pixel in s 1 should omplement eah pixel in s 2 and thus, [s 1, s 2 ] T should be seleted from set C 0. The hoie of [s 1, s 2 ] T is guided by a random number generator, whih determines the random harater of the shares. The derypted blok is produed through a deryption funtion f d ( ). In the ase of the {2, 2}-sheme based on the basis matries of (4), f d ( ) an be defined as follows: { s1 for s y 2 2 = f d (s 1, s 2 )= 1 = s 2 (5) [0, 0, 0, 0] for s 1 s 2

4 A {k, n}-seret Sharing Sheme for Color Images 75 (a) (b) (e) () Fig. 3. Halftoning-based seret sharing of olor images: (a) original olor image, (b) halftone image obtained using Floyd-Steinberg filter [12], (,d) share images, (e) derypted, output image where s 1 =[s (u,v),s (u,v+1),s (u+1,v),s (u+1,v+1) ] S 1 and s 2 =[s (u,v),s s (u+1,v),s (u,v+1), (u+1,v+1) ] S 2, for u = 1, 3,..., 2K 1 1 and v = 1, 3,..., 2K 2 1, are 2 2 share bloks whih are used to reover the output blok y 2 2 = y (u,v),y (u,v+1),y (u+1,v),y (u+1,v+1) as s (u,v) or blak pixels desribed as [0, 0, 0, 0]. The appliation of a onventional {k, n}-vss sheme to a K 1 K 2 natural image requires halftoning [7],[10]. The image is first transformed into a K 1 K 2 halftone image by using the density of the net dots to simulate the intensity levels [12]. Applying the proedure for eah olor hannel of the original image ( Fig. 2a) independently, eah olor hannel of the halftone image (Fig. 2b) is a binary image and thus appropriate for the VSS. Assuming {2, 2}-VSS, the two olor shares obtained by the proedure are depited in Fig. 2,d. Figure 2e shows the 2K 1 2K 2 derypted image (result) obtained by staking the two shares together.

5 76 R. Luka, K.N. Plataniotis, and A.N. Venetsanopoulos Visual inspetion of both the original image ( Fig. 1a and Fig. 2a) and the reovered image (Fig. 1d and Fig. 2e) indiates that: i) the derypted image is darker, and ii) the input image is of quarter size ompared to the derypted output. Moreover, the derypted olor image depited in Fig. 2e ontains a number of olor artifats due to nature of the algorithm. To end this, the onventional {k, n}-threshold visual ryptography i) annot provide perfet reonstrution, either in terms of pixel intensity or spatial resolution, and ii) is not appropriate for real-time appliations. Figure 3 shows the images obtained using the onventional {2, 2}-seret sharing sheme applied to the image with the different olor senario ompared to Fig. 2. It an be again observed that the derypted image depited in Fig. 3e ontains shifted olors whih often prohibit orret pereption of fine image details. Is has to be mentioned that the halftoning-based {k, n}-visual seret sharing shemes are the most popular hoie for natural image seret sharing. Another seret sharing approah for olor images is based on mean olor-mixing [8]. However, this method is not appropriate for pratial appliations due to signifiant redution of olor gamut and the extreme inrease in the spatial resolution of the shares. Other works, e.g. [9],[13] deals with analytial onstrution of the seret sharing shemes for olor images. 3 {k, n}-color Seret Sharing Let x : Z 2 Z 3 be a K 1 K 2 Red-Green-Blue (RGB) olor image representing a two-dimensional matrix of the three-omponent olor vetors (pixels) x (i,j) = [x (i,j)1,x (i,j)2,x (i,j)3 ] loated at the spatial position (i, j), for i =1, 2,..., K 1 and j =1, 2,..., K 2. Assuming that desribes the olor hannel (i.e. = 1 for Red, = 2 for Green, and = 3 for Blue) and the olor omponent x (i,j) is oded with B bits allowing x (i,j) to take an integer value between 0 and 2 B 1, the olor vetor x (p,q) an be equivalently expressed in a binary form as follows: x (i,j) = B b=1 xb (i,j) 2B b (6) where x b (i,j) =[xb (i,j)1,xb (i,j)2,xb (i,j)3 ] {0, 1}3 denotes the binary vetor at the b-bit level, with b = 1 denoting the most signifiant bits (MSB). 3.1 Enryption If the -th omponent of the binary vetor x b (i,j) is white (xb (i,j) = 1), enryption is performed through [s 1, s 2 ] T C 1 replaing x b (i,j) by binary bloks s 1 and s 2 in eah of the two shares. Otherwise, the referene binary omponent is blak (x b (p,q) = 0), and enryption is defined via [s 1, s 2 ] T C 0. This forms an enryption funtion defined as follows: f e (x b (i,j) )= { [s1, s 2 ] T C 0 for x b (i,j) =0 [s 1, s 2 ] T C 1 for x b (i,j) =1 (7)

6 A {k, n}-seret Sharing Sheme for Color Images 77 (a) (b) () Fig. 4. Proposed {2, 2}-seret sharing sheme for olor images: (a) original olor image, (b,) share images, derypted, output image By replaing the binary omponents x b (i,j) with binary bloks s 1 and s 2 for one partiular b, the proess generates two 2K 1 2K 2 vetor-valued binary shares S1 b and S2, b respetively. A random number generator guides the hoie of [s b 1, s b 2] T and determines the random harater of S1 b and S2. b Thus, the proess modifies both the spatial orrelation between spatially neighboring binary vetors s b (u,v) = [s b (u,v)1,s b (u,v)2,s b (u,v)3 ] Sb 1 or s b (u,v) = [s b (u,v)1,s b (u,v)2,s b (u,v)3 ] Sb 1, for u = 1, 2,..., 2K 1 and v =1, 2,..., 2K 2, and the spetral orrelation among omponents s b (u,v) or s b (u,v), for =1, 2, 3, of the individual binary vetors s b (u,v) or s b (u,v), respetively. Bit-level staking of the enrypted bit-levels produes the olor vetors s (u,v) S 1 and s (u,v) S 2 as s (u,v) = B b=1 s b (u,v) 2B b and s (u,v) = B b=1 s b (u,v) 2B b (8) Due to random proessing taking plae at the bit-levels, S 1 and S 2 ontain only random, olor noise like information (Fig. 4b,). Sine enryption is realized in the deomposed binary vetor spae, no detetable relationship between the original olor vetors x (p,q) and the olor noise of S 1 or S 2 an be found in the RGB olor domain. This onsiderably inreases seurity and prevents unauthorized deryption through brute-fore enumeration. 3.2 Deryption The deryption proedure is designed to satisfy the perfet reonstrution property. The original olor data must be reovered from the olor shares S 1 and S 2 using inverse algorithmi steps. Therefore, the deryption proedure is applied to the deomposed binary vetor arrays of the olor shares. Assuming that (i, j), for i =1, 2,..., K 1 and j =1, 2,..., K 2, denotes the spatial position in the original image and denotes the olor hannel, the orresponding 2 2 binary share bloks are s b = {s b (2i 1,2j 1),s b (2i 1,2j),s b (2i,2j 1),s b (2i,2j) } and s b = {s b (2i 1,2j 1),s b (2i 1,2j),s b (2i,2j 1),s b (2i,2j)}. Based on the arrangements of the basis matries A 0 and A 1 in (4) used in the proposed {2, 2}-seret sharing

7 78 R. Luka, K.N. Plataniotis, and A.N. Venetsanopoulos (a) (b) () Fig. 5. Proposed {2, 2}-seret sharing sheme for olor images: (a) original olor image, (b,) share images, derypted, output image sheme, if both bloks are onsistent, i.e. s b = s b, the derypted original bit x b (i,j) is assign white, i.e. xb (i,j) = 1. Otherwise, the bloks are inonsistent, i.e. s b s b and the original bit is reovered as blak, i.e. x b (i,j) omparison forms the following deryption funtion x b (i,j) = f d(s b, s b )= { 1 for s b 0 for s b = s b s b = 0. This logial whih is used to restore the binary vetors x b (i,j). The proedure ompletes with the bit-level staking (6) resulting in the original olor vetor x (i,j). Figure 4d shows the derypted olor output. Sine the proposed method satisfies the perfet reonstrution property, the output image is idential to the original depited in Fig 4a. Note that perfet reonstrution is demonstrated also in Fig 5, whih depits two full olor shares (Fig 5b,) and the derypted output ( Fig 5d) obtained by the proposed {2, 2}-seret sharing sheme applied to the test image Atlas ( Fig 5a). It has to be mentioned that (9), whih is defined for a {2, 2}-sheme, an be more generally desribed as follows: { 1 for [s b, s b ] T C 1 o b (i,j) = f d(s b 1, s b 2)= 0 for [s b, s b ] T (10) C 0 This onept an be further generalized for the share bloks {s b, s b, s b,...} defined in the speifi {k, n}-threshold shemes. 4 Conlusion A {k, n} seret sharing sheme with perfet reonstrution of the olor inputs was introdued. The method ryptographially proesses the olor images replaing (9)

8 A {k, n}-seret Sharing Sheme for Color Images 79 the bit omponents with a blok of bits for eah of the n shares. By separate enrypting eah bit plane of the deomposed olor image, the method produes olor shares with varied spetral and spatial harateristis. Sine enryption is realized in the deomposed binary domain, the proedure inreases protetion against attaks performed in the RGB olor domain. This makes the method attrative for seure transmission over the untrusted publi hannel. Moreover, the perfet reonstrution property allows to reveal the original olor image without visual impairments or olor shifts. Referenes 1. Adhikari, A., Sikdar, S.: A new (2,n)-visual threshold sheme for olor images. Pro. INDOCRYPT 2003, LNCS 2904 (2003) Ateniese, G., Blundo, C, de Santis, A., Stinson, D.G.: Visual ryptography for general aess strutures. Information and Computation 129 (1996) Ateniese, G., Blundo, C, de Santis, A., Stinson, D.G.: Extended apabilities for visual ryptography. Theoretial Computer Siene 250 (2001) Droste, S.: New results on visual ryptography. Pro. Advanes in Cryptology - CRYPTO 96, LNCS 1109 (1996) Eisen, P.A., Stinson, D.R.: Threshold visual ryptography shemes with speified levels of reonstruted pixels. Design, Codes and Cryptography 25 (2002) Hofmeister, T., Krause, M., Simon, H.U.: Contrast optimal k out of n seret sharing shemes in visual ryptography. Theoretial Computer Siene 240 (2000) Hou, J.C.: Visual ryptography for olor images. Pattern Reognition 36 (2003) Ishihara, T., Koga, H.: A visual seret sharing sheme for olor images based on meanvalue-olor mixing. IEICE Trans. Fundamentals E86-A (2003) Koga, H., Iwamoto, M., Yakamoto, H.: An analyti onstrution of the visual seret sharing sheme for olor images. IEICE Trans. Fundamentals E84-A (2001) Lin, C.C., Tsai, W.H.: Visual ryptography for gray-level images by dithering tehniques. Pattern Reognition Letters 24 (2003) Naor, M., Shamir, A.: Visual Cryptography. Pro. EUROCRYPT 94, LNCS 950 (1994) Ulihney, R.A.: Dithering with blue noise. Proeedings of the IEEE 76 (1988) Yang, C.N.: A note on olor visual enryption. Journal of Information Siene and Engineering 18 (2002)

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

Fast Elliptic Curve Algorithm of Embedded Mobile Equipment

Fast Elliptic Curve Algorithm of Embedded Mobile Equipment Send Orders for Reprints to reprints@benthamsiene.net 8 The Open Eletrial & Eletroni Engineering Journal, 0, 7, 8-4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment Open Aess Lihong Zhang *, Shuqian

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Dynamic Algorithms Multiple Choice Test

Dynamic Algorithms Multiple Choice Test 3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

Image Steganography Scheme using Chaos and Fractals with the Wavelet Transform

Image Steganography Scheme using Chaos and Fractals with the Wavelet Transform International Journal of Innovation, Management and Tehnology, Vol. 3, o. 3, June Image Steganography Sheme using Chaos and Fratals with the Wavelet Transform Yue Wu and Joseph P. oonan bstrat This paper

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

Robust Dynamic Provable Data Possession

Robust Dynamic Provable Data Possession Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

FUZZY WATERSHED FOR IMAGE SEGMENTATION

FUZZY WATERSHED FOR IMAGE SEGMENTATION FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Color Image Fusion for Concealed Weapon Detection

Color Image Fusion for Concealed Weapon Detection In: E.M. Carapezza (Ed.), Sensors, and ommand, ontrol, ommuniations, and intelligene (C3I) tehnologies for homeland defense and law enforement II, SPIE-571 (pp. 372-379). Bellingham, WA., USA: The International

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel

More information

Threshold Visual Cryptography Scheme for Color Images with No Pixel Expansion

Threshold Visual Cryptography Scheme for Color Images with No Pixel Expansion ISBN 978-952-5726-07-7 (Print), 978-952-5726-08-4 (CD-ROM) Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT 09) Huangshan, P. R. China, 26-28,Dec.

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5 Proven Professional Exam (CAT-480) Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Simulation of Crystallographic Texture and Anisotropie of Polycrystals during Metal Forming with Respect to Scaling Aspects

Simulation of Crystallographic Texture and Anisotropie of Polycrystals during Metal Forming with Respect to Scaling Aspects Raabe, Roters, Wang Simulation of Crystallographi Texture and Anisotropie of Polyrystals during Metal Forming with Respet to Saling Aspets D. Raabe, F. Roters, Y. Wang Max-Plank-Institut für Eisenforshung,

More information

Machine Vision. Laboratory Exercise Name: Student ID: S

Machine Vision. Laboratory Exercise Name: Student ID: S Mahine Vision 521466S Laoratory Eerise 2011 Name: Student D: General nformation To pass these laoratory works, you should answer all questions (Q.y) with an understandale handwriting either in English

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

Measurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method

Measurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method Measurement of the stereosopi rangefinder beam angular veloity using the digital image proessing method ROMAN VÍTEK Department of weapons and ammunition University of defense Kouniova 65, 62 Brno CZECH

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

A Dictionary based Efficient Text Compression Technique using Replacement Strategy

A Dictionary based Efficient Text Compression Technique using Replacement Strategy A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India

More information

Improved Circuit-to-CNF Transformation for SAT-based ATPG

Improved Circuit-to-CNF Transformation for SAT-based ATPG Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

We P9 16 Eigenray Tracing in 3D Heterogeneous Media

We P9 16 Eigenray Tracing in 3D Heterogeneous Media We P9 Eigenray Traing in 3D Heterogeneous Media Z. Koren* (Emerson), I. Ravve (Emerson) Summary Conventional two-point ray traing in a general 3D heterogeneous medium is normally performed by a shooting

More information

Evolutionary Feature Synthesis for Image Databases

Evolutionary Feature Synthesis for Image Databases Evolutionary Feature Synthesis for Image Databases Anlei Dong, Bir Bhanu, Yingqiang Lin Center for Researh in Intelligent Systems University of California, Riverside, California 92521, USA {adong, bhanu,

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation

More information

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering

More information

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW

FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW FOREGROUND OBJECT EXTRACTION USING FUZZY C EANS WITH BIT-PLANE SLICING AND OPTICAL FLOW SIVAGAI., REVATHI.T, JEGANATHAN.L 3 APSG, SCSE, VIT University, Chennai, India JRF, DST, Dehi, India. 3 Professor,

More information

Simultaneous image orientation in GRASS

Simultaneous image orientation in GRASS Simultaneous image orientation in GRASS Alessandro BERGAMINI, Alfonso VITTI, Paolo ATELLI Dipartimento di Ingegneria Civile e Ambientale, Università degli Studi di Trento, via Mesiano 77, 38 Trento, tel.

More information

(2, n)-visual Cryptographic Schemes For Color Images With Low Pixel Expansion

(2, n)-visual Cryptographic Schemes For Color Images With Low Pixel Expansion (2, n)-visual Cryptographic Schemes For Color Images With Low Pixel Expansion Bhaswar B. Bhattacharya, Abhishek Chakrabortty, Shirshendu Ganguly, Shyamalendu Sinha Indian Statistical Institute, Kolkata

More information

Reduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes

Reduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes Redued-Complexity Column-Layered Deoding and Implementation for LDPC Codes Zhiqiang Cui 1, Zhongfeng Wang 2, Senior Member, IEEE, and Xinmiao Zhang 3 1 Qualomm In., San Diego, CA 92121, USA 2 Broadom Corp.,

More information

Comprehensive Quantification of Signal-to-Noise Ratio and g-factor for Image-Based and k-space-based Parallel Imaging Reconstructions

Comprehensive Quantification of Signal-to-Noise Ratio and g-factor for Image-Based and k-space-based Parallel Imaging Reconstructions Magneti Resonane in Mediine 60:895 907 (2008) Comprehensive Quantifiation of Signal-to-Noise Ratio and g-fator for Image-Based and k-spae-based Parallel Imaging Reonstrutions Philip M. Robson, 1 * Aaron

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Comparison of Zero Knowledge Authentication Protocols SUBHASISH PARAMANIK (110CS0371)

Comparison of Zero Knowledge Authentication Protocols SUBHASISH PARAMANIK (110CS0371) NATIONAL INSTITUTE OF TECHNOLOGY ROURKELA Comparison of Zero Knowledge Authentiation Protools By SUBHASISH PARAMANIK (110CS0371) A THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2) SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat

More information

Preliminary investigation of multi-wavelet denoising in partial discharge detection

Preliminary investigation of multi-wavelet denoising in partial discharge detection Preliminary investigation of multi-wavelet denoising in partial disharge detetion QIAN YONG Department of Eletrial Engineering Shanghai Jiaotong University 8#, Donghuan Road, Minhang distrit, Shanghai

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

ALPHA-TRIMMED MEAN RADIAL BASIS FUNCTIONS AND THEIR APPLICATION IN OBJECT MODELING

ALPHA-TRIMMED MEAN RADIAL BASIS FUNCTIONS AND THEIR APPLICATION IN OBJECT MODELING ALPHA-TRIMMED MEAN RADIAL BASIS FUNCTIONS AND THEIR APPLICATION IN OBJECT MODELING Adrian G. Boq Ioannis Pitas Department University Thessaloniki of Informatis of Thessaloniki 54006, Greee ABSTRACT In

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Recursion examples: Problem 2. (More) Recursion and Lists. Tail recursion. Recursion examples: Problem 2. Recursion examples: Problem 3

Recursion examples: Problem 2. (More) Recursion and Lists. Tail recursion. Recursion examples: Problem 2. Recursion examples: Problem 3 Reursion eamples: Problem 2 (More) Reursion and s Reursive funtion to reverse a string publi String revstring(string str) { if(str.equals( )) return str; return revstring(str.substring(1, str.length()))

More information

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0; Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;

More information

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

A PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE CAMERAS

A PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE CAMERAS INTERNATIONAL JOURNAL OF INFORMATION AND SYSTEMS SCIENCES Volume 1, 3, Number 1, 3, Pages 1-22 365-382 2007 Institute for Sientifi Computing and Information A PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

A Unified Subdivision Scheme for Polygonal Modeling

A Unified Subdivision Scheme for Polygonal Modeling EUROGRAPHICS 2 / A. Chalmers and T.-M. Rhyne (Guest Editors) Volume 2 (2), Number 3 A Unified Subdivision Sheme for Polygonal Modeling Jérôme Maillot Jos Stam Alias Wavefront Alias Wavefront 2 King St.

More information

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper

More information

Parallelization and Performance of 3D Ultrasound Imaging Beamforming Algorithms on Modern Clusters

Parallelization and Performance of 3D Ultrasound Imaging Beamforming Algorithms on Modern Clusters Parallelization and Performane of 3D Ultrasound Imaging Beamforming Algorithms on Modern Clusters F. Zhang, A. Bilas, A. Dhanantwari, K.N. Plataniotis, R. Abiprojo, and S. Stergiopoulos Dept. of Eletrial

More information

Adobe Certified Associate

Adobe Certified Associate Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals

More information

Abstract. We describe a parametric hybrid Bezier patch that, in addition. schemes are local in that changes to part of the data only aect portions of

Abstract. We describe a parametric hybrid Bezier patch that, in addition. schemes are local in that changes to part of the data only aect portions of A Parametri Hyrid Triangular Bezier Path Stephen Mann and Matthew Davidhuk Astrat. We desrie a parametri hyrid Bezier path that, in addition to lending interior ontrol points, lends oundary ontrol points.

More information

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G.

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G. Colouring ontat graphs of squares and retilinear polygons de Berg, M.T.; Markovi, A.; Woeginger, G. Published in: nd European Workshop on Computational Geometry (EuroCG 06), 0 Marh - April, Lugano, Switzerland

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement

More information

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0 Exam (CAT-720) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

Cell Projection of Convex Polyhedra

Cell Projection of Convex Polyhedra Volume Graphis (2003) I. Fujishiro, K. Mueller, A. Kaufman (Editors) Cell Projetion of Convex Polyhedra Stefan Roettger and Thomas Ertl Visualization and Interative Systems Group University of Stuttgart

More information

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0 Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1 Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

One Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs?

One Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs? One Against One or One Against All : Whih One is Better for Handwriting Reognition with SVMs? Jonathan Milgram, Mohamed Cheriet, Robert Sabourin To ite this version: Jonathan Milgram, Mohamed Cheriet,

More information