Advances in Intelligent Data Analysis and Applications : Proceeding of the Sixth Euro-China Conference on Intelligent Data Analysis and Applications, 15-18 October 2019, Arad, Romania
| Advances in Intelligent Data Analysis and Applications : Proceeding of the Sixth Euro-China Conference on Intelligent Data Analysis and Applications, 15-18 October 2019, Arad, Romania |
| Autore | Pan Jeng-Shyang |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2022 |
| Descrizione fisica | 1 online resource (379 pages) |
| Altri autori (Persone) |
BalasValentina Emilia
ChenChien-Ming |
| Collana | Smart Innovation, Systems and Technologies Ser. |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9789811650369
9789811650352 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Keynotes -- Contents -- About the Editors -- 1 Analysis of Power Grid Security Access Protection Based on Internet Technology -- Abstract -- 1 Introduction -- 2 Risk Analysis -- 3 Security -- 3.1 Border Security -- 3.2 Host Security -- 3.2.1 User Security Policy -- 3.2.2 Risk Assessment -- 3.2.3 Access Control -- 3.2.4 Third-Party Component Security -- 3.2.5 Host Virus Protection -- 3.2.6 Security Audit -- 3.2.7 Resource Control -- 3.3 Cyber Security -- 3.3.1 APN Line -- 3.3.2 Wired Private Network Plus 4G-LTE Network -- 3.4 Terminal Security -- 3.4.1 Terminal Equipment Security Hardening -- 3.4.2 Identification -- 3.4.3 Secure Access -- 3.4.4 Safety Supervision -- 4 Conclusion -- Acknowledgements -- References -- 2 Design of UHV Transmission Line Selection Line -- Abstract -- 1 Introduction -- 2 UHV Line Selection Model and Objective Function Establishment -- 3 Optimization of Line Selection Design Mode -- 4 Analysis of Experimental Results -- 5 Conclusion -- Acknowledgements -- References -- 3 Experimental Investigation on Warm Incremental Sheet Forming Assisted with Oil Bath Heating -- Abstract -- 1 Introduction -- 2 Experimental Principles -- 3 Experimental Set-Up and Procedure -- 4 Experimental Plan and Results -- 5 The Analysis of Variance (ANOVA) of Experimental Results -- 6 Response Surface Results and Interaction Effects -- 7 Conclusion -- Acknowledgements -- References -- 4 The Effect of Process Parameters on the Springback of AZ31B Mg Alloy in Warm Incremental Sheet Forming Assisted with Oil Bath Heating -- Abstract -- 1 Introduction -- 2 Springback Analyses and Measurement -- 3 Experimental Set-Up and Procedure -- 4 Experimental Plan and Results -- 5 The Statistical Analysis and Model Fitting -- 6 The Effect of One Factor Involved Multiple Interactions -- 7 Conclusion -- Acknowledgements -- References.
5 Distributed Finite-Time Consistent Tracking Control for Multi-agent Systems Based on the Fixed Directed Topology -- Abstract -- 1 Introduction -- 2 Model Description -- 3 Main Results -- 4 Numerical Simulation -- 5 Conclusion -- References -- 6 Inner Mongolia Big Data Industry's Development Status and Its Active Promotion to the Construction of China-Mongolia-Russia Economic Corridor -- Abstract -- 1 Introduction -- 2 Overview of Big Data Industry in Inner Mongolia and Its Promoting Role in the Construction of China-Mongolia-Russia Economic Corridor -- 2.1 Overview of the Development of Big Data Industry in Inner Mongolia -- 2.2 The Promoting Role of Inner Mongolia Big Data Industry in the Construction of China-Mongolia-Russia Economic Corridor -- 3 Inner Mongolia Big Data Industry and Its Path and Countermeasure to Realize the Innovative Driving Role in the Construction of China-Mongolia-Russia Economic Corridor -- 4 Conclusion -- References -- 7 An Improved Median Filter Method Based on Multi-directional Template Combined with Image Feature -- Abstract -- 1 Introduction -- 2 Improved Median Filter Algorithm Based on Multi-directional Templates -- 2.1 Suspicious Noise Pixels Extraction Based on Adaptive Median Filtering -- 2.2 Median Filter Method with Multi-directional Templates -- 3 Experiment and Analysis -- 3.1 Evaluation Index -- 3.2 Analysis of PCB Image Denoising -- 4 Conclusion -- Acknowledgements -- References -- 8 Using Support Vector Machine for Option Trading on Settlement Day -- Abstract -- 1 Introduction -- 2 Background and Preliminaries -- 2.1 Kelly Criterion -- 2.2 Ralph Vince's Optimal Fraction -- 2.3 Support Vector Machine -- 2.4 Price Fluctuation of Options on Settlement Date -- 3 Using Technical Indicators as Feature -- 4 Using Money Management on the Option Settlement Date -- 5 Conclusions -- References. 9 An Evolutionary-Based Game Model of Honest and Dishonest Sellers -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Game Model of Sellers -- 3.1 Model Framework -- 3.2 Theoretical Analysis of the Model -- 4 Experimental -- 4.1 The Influence of Honest Non-monopoly Sellers on the Credit Evolution -- 4.2 The Influence of Honest Monopoly Sellers on the Credit Evolution -- 4.3 The Influence of Award and Punishment on the Credit Evolution -- 5 Conclusion -- Acknowledgements -- References -- 10 A Case Knowledge Extraction Method for Chinese Legal Texts -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Domain Based Named Entity Recognition -- 2.2 Research on Knowledge Extraction of Legal Texts -- 3 Case Knowledge Extraction Model -- 3.1 Entity Labeling -- 3.2 Knowledge Extraction on Legal Document -- 3.3 Case Fact Extraction Based on Dependency Syntax -- 4 Experiment and Results -- 4.1 Data Acquisition and Preprocessing -- 4.2 Results on Named Entity Recognition -- 4.3 Performance on Knowledge Extraction -- 4.4 Case Fact Extraction Result Based on Dependency Syntax -- 5 Conclusion -- References -- 11 Hand Detection Based on YOLOv3 -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Hand Detection Model -- 3.1 YOLOv3 -- 3.2 Darknet-53 -- 3.3 Dataset -- 3.4 Experiments -- 4 Conclusion -- References -- 12 Lung Detection Based on YOLOv3 -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Lung Detection Model -- 3.1 YOLOv3 -- 3.2 Darknet-53 -- 3.3 Dataset -- 3.4 Experiments -- 4 Conclusion -- References -- 13 A Fuzzy Creative Works Generation Algorithm Based on Graph Neural Network -- Abstract -- 1 Introduction -- 2 The Fuzzy Creative Works Generation Algorithm Based on GNN -- 2.1 Construction of Multi-Label Fuzzy Creative Data Set -- 2.2 Calculation of Fuzzy Logic Relationships Between Creative Entities -- 2.3 Generation of Fuzzy Creative Works. 3 Evaluation of the Fuzzy Creative Works Generation Results -- 3.1 Realization of Creative Generating Environment -- 3.2 The Comparison Between the Fuzzy Creative Works Generation Algorithm Based on GNN and Manual Selection -- 4 Conclusion -- Acknowledgement -- References -- 14 A Sensitivity Analysis Method of Soil Erosion Based on Land Use Type -- Abstract -- 1 Introduction -- 2 Data Source and Processing -- 2.1 Data Source -- 2.2 Data Preprocessing -- 2.3 Generation of Soil Erosion Sensitivity Distribution Map -- 3 Sensitivity Analysis of Soil Erosion -- 3.1 Relationship Between Soil Erosion and Land Use -- 3.2 Comprehensive Evaluation of Soil Erosion Sensitivity -- 4 Summary -- Acknowledgements -- References -- 15 Land Use Classification Based on Maximum Likelihood Method -- Abstract -- 1 Introduction -- 2 Data Source and Processing -- 2.1 Research Area Survey -- 2.2 Data Source -- 2.3 Data Processing -- 3 Analysis of Land Used Status -- 3.1 Land Used Classification Map -- 3.2 Distribution of Different Land Use Types -- 4 Summary -- Acknowledgements -- References -- 16 Spatial Distribution of Heavy Metals in Soil Based on Kriging Interpolation -- Abstract -- 1 Introduction -- 2 Materials and Methods -- 2.1 Introduction to Research Areas -- 2.2 Sample Collection and Processing -- 2.3 Data Processing and Analysis -- 3 Result Analysis -- 3.1 Description of Spatial Variation Structure -- 3.2 Kriging Interpolation of Heavy Metals in Soil -- 4 Summary -- Acknowledgements -- References -- 17 Temporal and Spatial Changes of Forest Leaf Area Index Based on MODIS: A Case Study of Fujian Province -- Abstract -- 1 Introduction -- 2 Data Source and Data Processing -- 2.1 Data Source -- 2.2 Data Processing -- 3 Experimental Analysis and Conclusions -- 3.1 Analysis of LAI Spatial Change -- 3.2 Time Variation Analysis of LAI -- 4 Summary -- Acknowledgements. References -- 18 A Meteorological Public Opinion Method Research Base on Deep Random Forest -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Public Opinion Analysis Method -- 3.1 Public Opinion Analysis Framework -- 3.2 Feature Extraction by Vectorization -- 3.3 Build Classifiers -- 3.4 Deep Random Forest -- 4 Experiment and Results -- 4.1 Corpus -- 4.2 Data Preprocessing -- 4.3 Design -- 4.4 Analysis of Experimental Results -- 5 Conclusion -- References -- 19 A New Approach of Intrusion Detection with Command Sequence-To-Sequence Model -- Abstract -- 1 Introduction -- 2 Related Works -- 3 User Command Sequence-To-Sequence Model -- 3.1 Overview of Our Approach -- 3.2 Prediction Model -- 4 Experiment and Evaluation -- 4.1 Dataset -- 4.2 Result Analysis -- 5 Conclusion -- References -- 20 A Survey of Anomaly Traffic Detection Based on Machine Learning -- Abstract -- 1 Introduction -- 2 Machine Learning Methods in Anomaly Traffic -- 2.1 Hierarchical Clustering -- 2.2 Enhanced SVM -- 2.3 Machine Learning Based on SDN -- 2.4 LSTM Model -- 3 Conclusion and Future Work -- References -- 21 Application of Fuzzy Neural Network in Chromatographic Separation -- Abstract -- 1 Introduction -- 2 Mathematical Model of Chromatographic Separation -- 3 Simulation and Prediction -- 3.1 Experimental Environment -- 3.2 FNN Training -- 4 Conclusion -- Acknowledgements -- References -- 22 Concentration Control of SMB System Based on Hierarchical Fuzzy Controller -- Abstract -- 1 Introduction -- 2 Related Model and Method -- 2.1 TMB and SMB Equation Model -- 2.2 Using Forward Difference Method to Numerate Partial Differential Equations -- 3 Simulation -- 3.1 Experimental Environment and Data -- 3.2 Sensitivity Analysis of the Parameters -- 4 Hierarchical Fuzzy Controls -- 4.1 Fuzzy Rule and Controller Structure -- 4.2 Concentration Control Result -- 5 Conclusion. Acknowledgements. |
| Record Nr. | UNINA-9910510561903321 |
Pan Jeng-Shyang
|
||
| Singapore : , : Springer Singapore Pte. Limited, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Intelligent Information Hiding and Multimedia Signal Processing : Proceeding of the IIH-MSP 2021 & FITAT 2021, Kaohsiung, Taiwan, Volume 2 / / edited by Jeng-Shyang Pan, Zhenyu Meng, Jianpo Li, Maria Virvou
| Advances in Intelligent Information Hiding and Multimedia Signal Processing : Proceeding of the IIH-MSP 2021 & FITAT 2021, Kaohsiung, Taiwan, Volume 2 / / edited by Jeng-Shyang Pan, Zhenyu Meng, Jianpo Li, Maria Virvou |
| Autore | Pan Jeng-Shyang |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (355 pages) |
| Disciplina | 005.8 |
| Collana | Smart Innovation, Systems and Technologies |
| Soggetto topico |
Computational intelligence
Artificial intelligence Multimedia systems Data protection Computational Intelligence Artificial Intelligence Multimedia Information Systems Data and Information Security |
| ISBN | 981-19-1053-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Speech Manipulation Detection Method Using Speech Fingerprints and Timestamp Data -- Chapter 2. A PHR sharing model based on Tangle and PRE -- Chapter 3. A Novel Motor Task Classification Scheme in Magnetoencephalography based on CNN -- Chapter 4. Cooperative Search of UAV Formation Guided by Probability Graph -- Chapter 5. Design of encryption system based on state machine optimization scheme and FPGA implementation -- Chapter 6. Unscented Kalman Filter for UAV Real-time Localizating Dynamic Target on the Ground -- Chapter 7. A Novel Fish Migration Optimization with QUasi-A ne TRansformation Evolutionary for Numerical Optimization and Application -- Chapter 8. Face Virtual Sample Generation with 3D Model Based on Generative Adversarial Networks -- Chapter 9. Deep Learning-based Helmet Wearing Detection for Safety Surveillance -- Chapter 10. Pattern Matching Method for Q&A Information Retrieval System -- Chapter 11. Research on Evaluation Method of Network Vulnera-bility in Power Monitoring System -- Chapter 12. The Clustering Algorithm Based on Improved Antlion Optimization Algorithm with K-means Concepts -- Chapter 13. Reversible data hiding based on multiple strategies -- Chapter 14. A Fully Restored Quantum Progressive Visual Secret Sharing Scheme -- Chapter 15. Construction of Interface Evaluation System in Internet-connected Vehicle Oriented to Automation Trust Calibration. etc. |
| Record Nr. | UNINA-9910584486003321 |
Pan Jeng-Shyang
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Genetic and Evolutionary Computing : Proceedings of the Sixteenth International Conference on Genetic and Evolutionary Computing, August 28-30, 2024, Miyazaki, Japan (Volume 1) / / edited by Jeng-Shyang Pan, Thi Thi Zin, Tien-Wen Sung, Jerry Chun-Wei Lin
| Genetic and Evolutionary Computing : Proceedings of the Sixteenth International Conference on Genetic and Evolutionary Computing, August 28-30, 2024, Miyazaki, Japan (Volume 1) / / edited by Jeng-Shyang Pan, Thi Thi Zin, Tien-Wen Sung, Jerry Chun-Wei Lin |
| Autore | Pan Jeng-Shyang |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (712 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
ZinThi Thi
SungTien-Wen LinJerry Chun-Wei |
| Collana | Lecture Notes in Electrical Engineering |
| Soggetto topico |
Computational intelligence
Mathematical optimization Computational complexity Computational Intelligence Optimization Computational Complexity |
| ISBN |
9789819615315
9819615313 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Swarm Intelligence and Its Applications -- Operational Technologies and Networked Multimedia Applications -- Wearable Computing and Intelligent Data Hiding -- Image Processing and Intelligent Applications -- Intelligent Multimedia Tools and Applications -- Technologies for Next-Generation Network Environments -- Recent Progress in Computational Electromagnetic Dynamics -- Future Cyber Security, Privacy and Forensics for Advanced systems -- Data Mining Techniques and its Applications -- Optimization Models in Deep Learning/Machine Learning. |
| Record Nr. | UNINA-9910983395503321 |
Pan Jeng-Shyang
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Genetic and Evolutionary Computing : Proceedings of the Sixteenth International Conference on Genetic and Evolutionary Computing, August 28-30, 2024, Miyazaki, Japan (Volume 2) / / edited by Jeng-Shyang Pan, Thi Thi Zin, Tien-Wen Sung, Jerry Chun-Wei Lin
| Genetic and Evolutionary Computing : Proceedings of the Sixteenth International Conference on Genetic and Evolutionary Computing, August 28-30, 2024, Miyazaki, Japan (Volume 2) / / edited by Jeng-Shyang Pan, Thi Thi Zin, Tien-Wen Sung, Jerry Chun-Wei Lin |
| Autore | Pan Jeng-Shyang |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (587 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
ZinThi Thi
SungTien-Wen LinJerry Chun-Wei |
| Collana | Lecture Notes in Electrical Engineering |
| Soggetto topico |
Computational intelligence
Mathematical optimization Computational complexity Computational Intelligence Optimization Computational Complexity |
| ISBN |
9789819615353
9819615356 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Swarm Intelligence and Its Applications -- Operational Technologies and Networked Multimedia Applications -- Wearable Computing and Intelligent Data Hiding -- Image Processing and Intelligent Applications -- Intelligent Multimedia Tools and Applications -- Technologies for Next-Generation Network Environments -- Recent Progress in Computational Electromagnetic Dynamics -- Future Cyber Security, Privacy and Forensics for Advanced systems -- Data Mining Techniques and its Applications -- Optimization Models in Deep Learning/Machine Learning. |
| Record Nr. | UNINA-9910983071203321 |
Pan Jeng-Shyang
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Intelligent Watermarking Techniques [[electronic resource] ] : Series On Innovative Intelligence
| Intelligent Watermarking Techniques [[electronic resource] ] : Series On Innovative Intelligence |
| Autore | Pan Jeng-Shyang |
| Pubbl/distr/stampa | Singapore, : World Scientific Publishing Company, 2004 |
| Descrizione fisica | 1 online resource (852 p.) |
| Disciplina | 005.8/2 |
| Altri autori (Persone) |
HuangHsiang-Cheh
JainL. C |
| Collana | Series on innovative intelligence |
| Soggetto topico |
Digital watermarking
Cryptography Computer security Data protection |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-281-34766-3
9786611347666 981-256-252-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intelligent Watermarking Techniques; Preface; CONTENTS; Part I. Fundamentals of Watermarking and Intelligent Techniques; Chapter 1. An Introduction to Watermarking Techniques Hsiang-Cheh Huang, Hsueh-Ming Hang, and Jeng-Shyang Pan; 1 Introduction; 2 Some Terminology; 3 Applications; 4 Requirements; 1. Robustness; 2. Transparency; 3. Tamper resistance; 4. Information capacity; 5. Complexity; 5 Classifications; 5.1 Perceptible and Imperceptible Watermarks; 5.2 Robust, Fragile, and Semi-Fragile Watermarks; 5.2.1 Robust watermarks; 5.2.2 Fragile watermarks; 5.2.3 Semi-fragile watermarks
5.3 Algorithm Design Issues6 Watermark Embedding Schemes; 6.1 Spatial Domain Watermarking; 6.2 Transform Domain Watermarking; 6.3 QIM Watermarking; 7 Watermark Extraction Categories; 7.1 Extraction with/without The Original Multimedia Contents; 7.2 The Public/Secret Keys; 8 Attacking Schemes; 8.1 Image Compression; 8.1.1 VQ compression; 8.1.2 JPEG compression; 8.2 Image Cropping; 8.3 Spatial Filtering; 8.4 Image Rotation; 8.5 Image Shifting and Line Deletion; 9 Watermarking Benchmarks; 9.1 Stirmark; 9.2 Checkmark; 9.3 Opitmark; 9.4 CERTIMARK; 10 Activities with Watermarking Research 10.1 Internet Resources10.2 Special Issues in International Journals; 10.3 Books; 10.4 Related Sessions in International Conferences; 10.5 Companies and Products Relating to Watermarking; 11 Organization of This Book; 12 Summary; References; Chapter 2. Neuro-Fuzzy Learning Theory Yan Shi, Masaharu Mizumoto, and Peng Shi; 1 Introduction; 2 A Neuro-Fuzzy Learning Algorithm; 3 Extraction of Typical Data from Training Data Based on FCM; 4 Numerical Examples; 5 Conclusions; References; Chapter 3. Evolutionary Algorithms Wei-Po Lee and Chao-Hsing Hsu; 1 Evolutionary Computation 2 Genetic Algorithms2.1 Selection Methods; 2.2 Creating Offspring; 3 Other Evolution Algorithms; 3.1 Evolution Strategies and Evolutionary Programming; 3.2 Genetic Programming; 4 Parallelizing Simulated Evolution; 4.1 Coarse-Grain Models; 4.2 Fine-Grain Models; 5 Summary; References; Chapter 4. A Tutorial on Meta-Heuristics for Optimization Shu-Chuan Chu, Chin-Shiuh Shieh, and John F. Roddick; 1 Introduction; 2 Genetic Algorithms; 3 Ant Systems; 4 Particle Swarm Optimization; 5 Discussions and Conclusions; References; Part II. Watermarking Techniques Chapter 5. Watermarking Based on Spatial Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang1 Introduction; 2 General Embedding Structures in The Spatial Domain; 3 General Extraction Structures in The Spatial Domain; 4 Issues for Practical Implementations; 4.1 Bit Plane Manipulations of The LSB's; 4.2 Selecting The Embedding Positions; 5 Applications; 5.1 Video Watermarking Applications; 5.2 Frame Reordering and Dropping; 5.3 Combining Spatial-Domain Watermarking with Watermarking in Different Domains; 6 Conclusions; References Chapter 6. Watermarking Based on Transform Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang |
| Record Nr. | UNINA-9910450159203321 |
Pan Jeng-Shyang
|
||
| Singapore, : World Scientific Publishing Company, 2004 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Intelligent Watermarking Techniques [[electronic resource] ] : Series On Innovative Intelligence
| Intelligent Watermarking Techniques [[electronic resource] ] : Series On Innovative Intelligence |
| Autore | Pan Jeng-Shyang |
| Pubbl/distr/stampa | Singapore, : World Scientific Publishing Company, 2004 |
| Descrizione fisica | 1 online resource (852 p.) |
| Disciplina | 005.8/2 |
| Altri autori (Persone) |
HuangHsiang-Cheh
JainL. C |
| Collana | Series on innovative intelligence |
| Soggetto topico |
Digital watermarking
Cryptography Computer security Data protection |
| ISBN |
1-281-34766-3
9786611347666 981-256-252-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intelligent Watermarking Techniques; Preface; CONTENTS; Part I. Fundamentals of Watermarking and Intelligent Techniques; Chapter 1. An Introduction to Watermarking Techniques Hsiang-Cheh Huang, Hsueh-Ming Hang, and Jeng-Shyang Pan; 1 Introduction; 2 Some Terminology; 3 Applications; 4 Requirements; 1. Robustness; 2. Transparency; 3. Tamper resistance; 4. Information capacity; 5. Complexity; 5 Classifications; 5.1 Perceptible and Imperceptible Watermarks; 5.2 Robust, Fragile, and Semi-Fragile Watermarks; 5.2.1 Robust watermarks; 5.2.2 Fragile watermarks; 5.2.3 Semi-fragile watermarks
5.3 Algorithm Design Issues6 Watermark Embedding Schemes; 6.1 Spatial Domain Watermarking; 6.2 Transform Domain Watermarking; 6.3 QIM Watermarking; 7 Watermark Extraction Categories; 7.1 Extraction with/without The Original Multimedia Contents; 7.2 The Public/Secret Keys; 8 Attacking Schemes; 8.1 Image Compression; 8.1.1 VQ compression; 8.1.2 JPEG compression; 8.2 Image Cropping; 8.3 Spatial Filtering; 8.4 Image Rotation; 8.5 Image Shifting and Line Deletion; 9 Watermarking Benchmarks; 9.1 Stirmark; 9.2 Checkmark; 9.3 Opitmark; 9.4 CERTIMARK; 10 Activities with Watermarking Research 10.1 Internet Resources10.2 Special Issues in International Journals; 10.3 Books; 10.4 Related Sessions in International Conferences; 10.5 Companies and Products Relating to Watermarking; 11 Organization of This Book; 12 Summary; References; Chapter 2. Neuro-Fuzzy Learning Theory Yan Shi, Masaharu Mizumoto, and Peng Shi; 1 Introduction; 2 A Neuro-Fuzzy Learning Algorithm; 3 Extraction of Typical Data from Training Data Based on FCM; 4 Numerical Examples; 5 Conclusions; References; Chapter 3. Evolutionary Algorithms Wei-Po Lee and Chao-Hsing Hsu; 1 Evolutionary Computation 2 Genetic Algorithms2.1 Selection Methods; 2.2 Creating Offspring; 3 Other Evolution Algorithms; 3.1 Evolution Strategies and Evolutionary Programming; 3.2 Genetic Programming; 4 Parallelizing Simulated Evolution; 4.1 Coarse-Grain Models; 4.2 Fine-Grain Models; 5 Summary; References; Chapter 4. A Tutorial on Meta-Heuristics for Optimization Shu-Chuan Chu, Chin-Shiuh Shieh, and John F. Roddick; 1 Introduction; 2 Genetic Algorithms; 3 Ant Systems; 4 Particle Swarm Optimization; 5 Discussions and Conclusions; References; Part II. Watermarking Techniques Chapter 5. Watermarking Based on Spatial Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang1 Introduction; 2 General Embedding Structures in The Spatial Domain; 3 General Extraction Structures in The Spatial Domain; 4 Issues for Practical Implementations; 4.1 Bit Plane Manipulations of The LSB's; 4.2 Selecting The Embedding Positions; 5 Applications; 5.1 Video Watermarking Applications; 5.2 Frame Reordering and Dropping; 5.3 Combining Spatial-Domain Watermarking with Watermarking in Different Domains; 6 Conclusions; References Chapter 6. Watermarking Based on Transform Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang |
| Record Nr. | UNINA-9910783223203321 |
Pan Jeng-Shyang
|
||
| Singapore, : World Scientific Publishing Company, 2004 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||