225 resultados para binary mask


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Efficient and effective feature detection and representation is an important consideration when processing videos, and a large number of applications such as motion analysis, 3D scene understanding, tracking etc. depend on this. Amongst several feature description methods, local features are becoming increasingly popular for representing videos because of their simplicity and efficiency. While they achieve state-of-the-art performance with low computational complexity, their performance is still too limited for real world applications. Furthermore, rapid increases in the uptake of mobile devices has increased the demand for algorithms that can run with reduced memory and computational requirements. In this paper we propose a semi binary based feature detectordescriptor based on the BRISK detector, which can detect and represent videos with significantly reduced computational requirements, while achieving comparable performance to the state of the art spatio-temporal feature descriptors. First, the BRISK feature detector is applied on a frame by frame basis to detect interest points, then the detected key points are compared against consecutive frames for significant motion. Key points with significant motion are encoded with the BRISK descriptor in the spatial domain and Motion Boundary Histogram in the temporal domain. This descriptor is not only lightweight but also has lower memory requirements because of the binary nature of the BRISK descriptor, allowing the possibility of applications using hand held devices.We evaluate the combination of detectordescriptor performance in the context of action classification with a standard, popular bag-of-features with SVM framework. Experiments are carried out on two popular datasets with varying complexity and we demonstrate comparable performance with other descriptors with reduced computational complexity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose a steganalysis method that is able to identify the locations of stego bearing pixels in the binary image. In order to do that, our proposed method will calculate the residual between a given stego image and its estimated cover image. After that, we will compute the local entropy difference between these two versions of images as well. Finally, we will compute the mean of residual and mean of local entropy difference across multiple stego images. From these two means, the locations of stego bearing pixels can be identified. The presented empirical results demonstrate that our proposed method can identify the stego bearing locations of near perfect accuracy when sufficient stego images are supplied. Hence, our proposed method can be used to reveal which pixels in the binary image have been used to carry the secret message.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose a new multi-class steganalysis for binary image. The proposed method can identify the type of steganographic technique used by examining on the given binary image. In addition, our proposed method is also capable of differentiating an image with hidden message from the one without hidden message. In order to do that, we will extract some features from the binary image. The feature extraction method used is a combination of the method extended from our previous work and some new methods proposed in this paper. Based on the extracted feature sets, we construct our multi-class steganalysis from the SVM classifier. We also present the empirical works to demonstrate that the proposed method can effectively identify five different types of steganography.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose a new blind steganalytic method to detect the presence of secret messages embedded in black and white images using the steganographic techniques. We start by extracting several sets of matrix, such as run length matrix, gap length matrix and pixel difference. We also apply characteristic function on these matrices to enhance their discriminative capabilities. Then we calculate the statistics which include mean, variance, kurtosis and skewness to form our feature sets. The presented empirical works demonstrate our proposed method can effectively detect three different types of steganography. This proves the universality of our proposed method as a blind steganalysis. In addition, the experimental results show our proposed method is capable of detecting small amount of the embedded message.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose a new steganalytic method to detect the message hidden in a black and white image using the steganographic technique developed by Liang, Wang and Zhang. Our detection method estimates the length of hidden message embedded in a binary image. Although the hidden message embedded is visually imperceptible, it changes some image statistic (such as inter-pixels correlation). Based on this observation, we first derive the 512 patterns histogram from the boundary pixels as the distinguishing statistic, then we compute the histogram difference to determine the changes of the 512 patterns histogram induced by the embedding operation. Finally we propose histogram quotient to estimate the length of the embedded message. Experimental results confirm that the proposed method can effectively and reliably detect the length of the embedded message.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Binary Ti vectors are the plasmid vectors of choice in Agrobacterium-mediated plant transformation protocols. The pGreen series of binary Ti vectors are configured for ease-of-use and to meet the demands of a wide range of transformation procedures for many plant species. This plasmid system allows any arrangement of selectable marker and reporter gene at the right and left T-DNA borders without compromising the choice of restriction sites for cloning, since the pGreen cloning sites are based on the well-known pBluescript general vector plasmids. Its size and copy number in Escherichia coli offers increased efficiencies in routine in vitro recombination procedures. pGreen can replicate in Agrobacterium only if another plasmid, pSoup, is co-resident in the same strain. pSoup provides replication functions in trans for pGreen. The removal of RepA and Mob functions has enabled the size of pGreen to be kept to a minimum. Versions of pGreen have been used to transform several plant species with the same efficiencies as other binary Ti vectors. Information on the pGreen plasmid system is supplemented by an Internet site (http://www.pgreen.ac.uk) through which comprehensive information, protocols, order forms and lists of different pGreen marker gene permutations can be found.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Agrobacterium-based plasmid vectors allow the transformation of a wide range of plant species by capitalizing on a natural bacterial system to introduce DNA into the nuclear genome of plants. It is often a complex task to consider fully all the possible plasmid vectors and Agrobacterium strains available, and it can thus be difficult to take full advantage of these research tools. This practical guide is a survey of the many binary Ti plasmid vectors and Agrobacterium strains available, and aims to help researchers to make an informed decision about the system that is best suited to their needs...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of the curse or cure dichotomy to frame a discussion around the impacts of mining is an oversimplification, not least in the emphasis on one or the other (as opposed to curse and cure). It is, however, a potent trope for engaging critically with the consequences of mining not only in narrow economic terms but also in regard to political, social and environmental costs and benefits. Further, as Goodman and Worth (2008: 201) point out, to engage with the resource curse or cure question is to also engage more broadly with “the internal contradictions of capitalist development” as evident, for example, in divisions “between those who benefit from and those who bear the costs of accumulation” and the many conflicts—political, social, economic, environmental—attending resource extraction. It is in this sense that this volume mobilises the ‘resource curse or cure?’ motif.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is a continuous quest for developing electrochromic (EC)transition metal oxides (TMOs) with increased coloration efficiency. As emerging TMOs, Nb2O5 films, even those of ordered anodized nanochannels, have failed to produce the required EC performance for practical applications. This is attributed to limitations presented by its relatively wide bandgap and low capacity for accommodating ions. To overcome such issues, MoO3 was electrodeposited onto Nb2O5 nanochannelled films as homogeneously conformal and stratified α-MoO3 coatings of different thickness. The EC performance of the resultant MoO3 coated Nb2O5 binary system was evaluated. The system exhibited a coloration efficiency of 149.0 cm2 C−1, exceeding that of any previous reports on MoO3 and Nb2O5 individually or their compounds. The enhancement was ascribed to a combination of the reduced effective bandgap of the binary system, the increased intercalation probability from the layered α-MoO3 coating, and a high surface-tovolume ratio, while the Nb2O5 nanochannelled templates provided stability and low impurity pathways for charge transfer to occur.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The possibility of initial stage control of the elemental composition and core/shell structure of binary SiC quantum dots by optimizing temporal variation of Si and C incoming fluxes and surface temperatures is shown via hybrid numerical simulations. Higher temperatures and influxes encourage the formation of a stoichiometric outer shell over a small carbon-enriched core, whereas lower temperatures result in a larger carbon-enriched core, Si-enriched undershell, and then a stoichiometric SiC outer shell. This approach is generic and is applicable to a broad range of semiconductor materials and nanofabrication techniques. © 2007 American Institute of Physics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Semiconductor III-V quantum dots (QDs) are particularly enticing components for the integration of optically promising III-V materials with the silicon technology prevalent in the microelectronics industry. However, defects due to deviations from a stoichiometric composition [group III: group V = 1] may lead to impaired device performance. This paper investigates the initial stages of formation of InSb and GaAs QDs on Si(1 0 0) through hybrid numerical simulations. Three situations are considered: a neutral gas environment (NG), and two ionized gas environments, namely a localized ion source (LIS) and a background plasma (BP) case. It is shown that when the growth is conducted in an ionized gas environment, a stoichiometric composition may be obtained earlier in the QD as compared to a NG. Moreover, the stoichiometrization time, tst, is shorter for the BP case compared to the LIS scenario. A discussion of the effect of ion/plasma-based tools as well as a range of process conditions on the final island size distribution is also included. Our results suggest a way to obtain a deterministic level of control over nanostructure properties (in particular, elemental composition and size) during the initial stages of growth which is a crucial step towards achieving highly tailored QDs suitable for implementation in advanced technological devices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In North America and Europe, the binary toxin positive Clostridium difficile strains of the ribotypes 027 and 078 have been associated with death, toxic megacolon and other adverse outcomes. Following an increase in C. difficile infections (CDIs) in Queensland, a prevalence study involving 175 hospitals was undertaken in early 2012, identifying 168 cases of CDI over a 2 month period. Patient demographics and clinical characteristics were recorded, and C. difficile isolates were ribotyped and tested for the presence of binary toxin genes. Most patients (106/168, 63.1%) were aged over 60 years. Overall, 98 (58.3%) developed symptoms after hospitalisation; 89 cases (53.0%) developed symptoms more than 48 hours after admission. Furthermore, 27 of the 62 (67.7%) patients who developed symptoms in the community ad been hospitalised within the last 3 months. Thirteen of the 168 (7.7%) cases identified had severe disease, resulting in admission to the Intensive Care Unit or death within 30 days of the onset of symptoms. The 3 most common ribotypes isolated were UK 002 (22.9%), UK 014 (13.3%) and the binary toxin-positive ribotype UK 244 (8.4%). The only other binary toxin positive ribotype isolated was UK 078 (n = 1). Of concern was the detection of the binary toxin positive ribotype UK 244, which has recently been described in other parts of Australia and New Zealand. No isolates were of the international epidemic clone of ribotype UK 027, although ribotype UK 244 is genetically related to this clone. Further studies are required to track the epidemiology of ribotype UK 244 in Australia and New Zealand. Commun Dis Intell 2014;38(4):E279–E284.