Loading...
Search for: heidelberg--co
0.009 seconds

    Introducing a two dimensional measure for watermarking capacity in images

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 25 June 2008 through 27 June 2008, Povoa de Varzim ; Volume 5112 LNCS , 2008 , Pages 213-220 ; 03029743 (ISSN) ; 9783540698111 (ISBN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2008
    Abstract
    One of the most important parameters in evaluating a watermarking algorithm is its capacity. Of course capacity has a paradoxical relation with two other important parameters: image quality and robustness. Generally, watermarking capacity is expressed by bit per pixel (bpp) unit measure. This measure does not show what the side effects would be on image quality and capacity. Therefore, we proposed a two dimensional measure named capacity curve which shows the effects of capacity on visual quality. In this measure we can find the amount of degradation by a numerical value for each modification in pixels. Our experimental results are compatible with previous works in this field. © 2008... 

    Visiting a polygon on the optimal way to a query point

    , Article 2nd International Frontiers in Algorithmics Workshop, FAW 2008, Changsha, 19 June 2008 through 21 June 2008 ; Volume 5059 LNCS , 2008 , Pages 245-251 ; 03029743 (ISSN); 3540693106 (ISBN); 9783540693109 (ISBN) Khosravi, R ; Ghodsi, M ; Sharif University of Technology
    2008
    Abstract
    We study a constrained version of the shortest path problem in polygonal domains, in which the path must visit a given target polygon. We provide an efficient algorithm for this problem based on the wavefront propagation method and also present a method to construct a subdivision of the domain to efficiently answer queries to retrieve the constrained shortest paths from a single-source to the query point. © 2008 Springer-Verlag Berlin Heidelberg  

    Computer-aided method engineering: An analysis of existing environments

    , Article 20th International Conference on Advanced Information Systems Engineering, CAiSE 2008, Montpellier, 16 June 2008 through 20 June 2008 ; Volume 5074 LNCS , 2008 , Pages 525-540 ; 03029743 (ISSN) ; 3540695338 (ISBN) Niknafs, A ; Ramsin, R ; Sharif University of Technology
    2008
    Abstract
    Analogous to Computer-Aided Software Engineering (CASE), which aims to facilitate Software Engineering through specialized tools, Computer-Aided Method Engineering (CAME) strives to support a wide range of activities carried out by method engineers. Although there is consensus on the importance of tool support in method engineering, existing CAME environments are incomplete prototypes, each covering just a few steps of the method engineering process. This paper summarizes the history and the state of the practice in CAME technology, and provides criteria-based critique on existing CAME environments, thus highlighting their strengths and weaknesses. © 2008 Springer-Verlag Berlin Heidelberg  

    Parallel algorithm to find minimum vertex guard set in a triangulated irregular network

    , Article 7th International Conference on Parallel Processing and Applied Mathematics, PPAM 2007, Gdansk, 9 September 2007 through 12 September 2007 ; Volume 4967 LNCS , 2008 , Pages 239-248 ; 03029743 (ISSN); 3540681051 (ISBN); 9783540681052 (ISBN) Taghinezhad Omran, M ; Sharif University of Technology
    2008
    Abstract
    This paper presents a new serial algorithm for selecting a nearly minimum number of vertex-guards so that all parts of a geographical surface modeled by a TIN (Triangulated Irregular Networks) is covered. Our algorithm selects fewer guards than the best existing algorithms on the average. Based on this approach, a new coarse-grain parallel algorithm for this problem is proposed. It has been showed that the upper bound for total number of guards, selected by this algorithm, is where n is number of vertices in the TIN. Average case analysis and implementation results show that in real TINs even fewer than guards (proved upper bound of needed guards in worse-case) are selected by our serial and... 

    Secure steganography using Gabor filter and neural networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 4920 LNCS , 2008 , Pages 33-49 ; 03029743 (ISSN); 3540690166 (ISBN); 9783540690160 (ISBN) Jamzad, M ; Zahedi Kermani, Z ; Sharif University of Technology
    2008
    Abstract
    The main concern of steganography (image hiding) methods is to embed a secret image into a host image in such a way that it causes minimum distortion to the host; to make it possible to extract a version of secret image from the host in such a way that the extracted version of secret image be as similar as possible to its original version (this should be possible even after usual attacks on the host image), and to provide ways of embedding secret images with larger size into a given host image. In this paper we propose a method that covers all above mentioned concerns by suggesting the idea of finding from an image data base, the most suitable host for a given secret image. In our method,...