873 resultados para SYMMETRIC-SPACES
Resumo:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
Resumo:
Virtual Reality is a relatively new technology in the relatively young field of computer science. The design of Virtual Reality has only recently come into discussion, as well as the implications for this sort of design. I hope to determine how a user can work most efficiently and accurately in a Virtual World. By studying this, I hope to help in the standardization of Virtual Reality design.
Resumo:
In this paper I obtain the mixed strategy symmetric equilibria of the first-price auction for any distribution. The equilibrium is unique. The solution turns out to be a combination of absolutely continuous distributions case and the discrete distributions case.
Resumo:
In this paper I obtain the mixed strategy symmetric equilibria of the first-price auction for any distribution. The equilibrium is unique. The solution turns out to be a combination of absolutely continuous distributions case and the discrete distributions case.
Resumo:
We study Hardy spaces on the boundary of a smooth open subset or R-n and prove that they can be defined either through the intrinsic maximal function or through Poisson integrals, yielding identical spaces. This extends to any smooth open subset of R-n results already known for the unit ball. As an application, a characterization of the weak boundary values of functions that belong to holomorphic Hardy spaces is given, which implies an F. and M. Riesz type theorem. (C) 2004 Elsevier B.V. All rights reserved.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
We present a new procedure to construct the one-dimensional non-Hermitian imaginary potential with a real energy spectrum in the context of the position-dependent effective mass Dirac equation with the vector-coupling scheme in 1 + 1 dimensions. In the first example, we consider a case for which the mass distribution combines linear and inversely linear forms, the Dirac problem with a PT-symmetric potential is mapped into the exactly solvable Schrodinger-like equation problem with the isotonic oscillator by using the local scaling of the wavefunction. In the second example, we take a mass distribution with smooth step shape, the Dirac problem with a non-PT-symmetric imaginary potential is mapped into the exactly solvable Schrodinger-like equation problem with the Rosen-Morse potential. The real relativistic energy levels and corresponding wavefunctions for the bound states are obtained in terms of the supersymmetric quantum mechanics approach and the function analysis method.
Resumo:
Some kinks for non-Hermitian quantum field theories in 1+1 dimensions are constructed. A class of models where the soliton energies are stable and real are found. Although these kinks are not Hermitian, they are symmetric under PT transformations.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
We present a new method to construct the exactly solvable PT-symmetric potentials within the framework of the position-dependent effective mass Dirac equation with the vector potential coupling scheme in 1 + 1 dimensions. In order to illustrate the procedure, we produce three PT-symmetric potentials as examples, which are PT-symmetric harmonic oscillator-like potential, PT-symmetric potential with the form of a linear potential plus an inversely linear potential, and PT-symmetric kink-like potential, respectively. The real relativistic energy levels and corresponding spinor components for the bound states are obtained by using the basic concepts of the supersymmetric quantum mechanics formalism and function analysis method. (C) 2007 Elsevier B.V. All rights reserved.
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
The play operator has a fundamental importance in the theory of hysteresis. It was studied in various settings as shown by P. Krejci and Ph. Laurencot in 2002. In that work it was considered the Young integral in the frame of Hilbert spaces. Here we study the play in the frame of the regulated functions (that is: the ones having only discontinuities of the first kind) on a general time scale T (that is: with T being a nonempty closed set of real numbers) with values in a Banach space. We will be showing that the dual space in this case will be defined as the space of operators of bounded semivariation if we consider as the bilinearity pairing the Cauchy-Stieltjes integral on time scales.