توجه: محتویات این صفحه به صورت خودکار پردازش شده و مقاله‌های نویسندگانی با تشابه اسمی، همگی در بخش یکسان نمایش داده می‌شوند.
۱Fuzzy Clustering of Multispectral Images Based on Morphological Operators and Gustafson–Kessel Clustering
نویسنده(ها): ، ،
اطلاعات انتشار: چهارمین کنفرانس مهندسی برق و الکترونیک ایران، سال
تعداد صفحات: ۵
The noise reduces certitude in the results obtained of processing on the multispectral remote sensing images. Hence, the clustering of these images is very difficult due to noise. In this paper, a fuzzy clustering technique for this images that the morphological operators and median filter is used to reduce noise is offered. In this approach, at first, opening and closing morphological operators are used until tiny points that are similar noise and small holes in the image are exist. Thus, multispectral image is improved and boundary betweendifferent regions of image is preserved. Then, the bandsobtained of this operations algorithm are clustered by FCMclustering and the membership matrix obtained by using Gustafsson–Kessel clustering algorithm to detect clusters withdifferent shapes be improved. Finally, using the median filter, noise remains in the clustered image by selection anappropriate window is reduced. The proposed clustering algorithm has been done on the FLC1 multispectral image that has 12 bands. The results of experiment the proposed algorithm and compare with conventional fuzzy clustering methods, shows the feasibility and efficiency the proposed algorithm<\div>

۲Data Hiding in video H.264 by motion vectors
نویسنده(ها): ،
اطلاعات انتشار: دومین کنفرانس بین المللی پژوهش در علوم و تکنولوژی، سال
تعداد صفحات: ۱۵
Currently, data transmission over the internet is safe from all directions and are vulnerable to various attacks. So in order to prevent access to valuable information, we need to have special security measures. A method for secure transmission of data, steganography method, which we attribute to hide his message in this way can we create more secure. data steganography is one of the ways that a message can be in the picture , audio , video, text, etc. hidden. In this project we will use the H.264 video stream watermarking algorithm. Unlike previous watermarking methods, the spatial domain, or become used to hide data, we compress the video to hide the secret data we use, so that the motion vectors for encoding and the reconstruction of both the predicted P frames and B frames in video compression used. Where the motion vector using macroblock prediction error is calculated, and then the method based on motion vector features such as measure and angle can be used. Finally, all candidates for the embedded data, and then using the LSB bits of the secret message is replaced. And at the same time each GOP, the control information for the data embedded in the frame are done. At the end of the control information in each frame, we extract the secret message. The algorithm is tested on different types of films based on the above criteria, the proposed method is well done.<\div>
نمایش نتایج ۱ تا ۲ از میان ۲ نتیجه