1,506 research outputs found

    Steganography: a class of secure and robust algorithms

    Full text link
    This research work presents a new class of non-blind information hiding algorithms that are stego-secure and robust. They are based on some finite domains iterations having the Devaney's topological chaos property. Thanks to a complete formalization of the approach we prove security against watermark-only attacks of a large class of steganographic algorithms. Finally a complete study of robustness is given in frequency DWT and DCT domains.Comment: Published in The Computer Journal special issue about steganograph

    Modern optical astronomy: technology and impact of interferometry

    Get PDF
    The present `state of the art' and the path to future progress in high spatial resolution imaging interferometry is reviewed. The review begins with a treatment of the fundamentals of stellar optical interferometry, the origin, properties, optical effects of turbulence in the Earth's atmosphere, the passive methods that are applied on a single telescope to overcome atmospheric image degradation such as speckle interferometry, and various other techniques. These topics include differential speckle interferometry, speckle spectroscopy and polarimetry, phase diversity, wavefront shearing interferometry, phase-closure methods, dark speckle imaging, as well as the limitations imposed by the detectors on the performance of speckle imaging. A brief account is given of the technological innovation of adaptive-optics (AO) to compensate such atmospheric effects on the image in real time. A major advancement involves the transition from single-aperture to the dilute-aperture interferometry using multiple telescopes. Therefore, the review deals with recent developments involving ground-based, and space-based optical arrays. Emphasis is placed on the problems specific to delay-lines, beam recombination, polarization, dispersion, fringe-tracking, bootstrapping, coherencing and cophasing, and recovery of the visibility functions. The role of AO in enhancing visibilities is also discussed. The applications of interferometry, such as imaging, astrometry, and nulling are described. The mathematical intricacies of the various `post-detection' image-processing techniques are examined critically. The review concludes with a discussion of the astrophysical importance and the perspectives of interferometry.Comment: 65 pages LaTeX file including 23 figures. Reviews of Modern Physics, 2002, to appear in April issu

    Use of colour for hand-filled form analysis and recognition

    Get PDF
    Colour information in form analysis is currently under utilised. As technology has advanced and computing costs have reduced, the processing of forms in colour has now become practicable. This paper describes a novel colour-based approach to the extraction of filled data from colour form images. Images are first quantised to reduce the colour complexity and data is extracted by examining the colour characteristics of the images. The improved performance of the proposed method has been verified by comparing the processing time, recognition rate, extraction precision and recall rate to that of an equivalent black and white system

    VI Workshop on Computational Data Analysis and Numerical Methods: Book of Abstracts

    Get PDF
    The VI Workshop on Computational Data Analysis and Numerical Methods (WCDANM) is going to be held on June 27-29, 2019, in the Department of Mathematics of the University of Beira Interior (UBI), CovilhĂŁ, Portugal and it is a unique opportunity to disseminate scientific research related to the areas of Mathematics in general, with particular relevance to the areas of Computational Data Analysis and Numerical Methods in theoretical and/or practical field, using new techniques, giving especial emphasis to applications in Medicine, Biology, Biotechnology, Engineering, Industry, Environmental Sciences, Finance, Insurance, Management and Administration. The meeting will provide a forum for discussion and debate of ideas with interest to the scientific community in general. With this meeting new scientific collaborations among colleagues, namely new collaborations in Masters and PhD projects are expected. The event is open to the entire scientific community (with or without communication/poster)

    Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection

    Full text link
    Communication channel established from a display to a device's camera is known as visual channel, and it is helpful in securing key exchange protocol. In this paper, we study how visual channel can be exploited by a network terminal and mobile device to jointly verify information in an interactive session, and how such information can be jointly presented in a user-friendly manner, taking into account that the mobile device can only capture and display a small region, and the user may only want to authenticate selective regions-of-interests. Motivated by applications in Kiosk computing and multi-factor authentication, we consider three security models: (1) the mobile device is trusted, (2) at most one of the terminal or the mobile device is dishonest, and (3) both the terminal and device are dishonest but they do not collude or communicate. We give two protocols and investigate them under the abovementioned models. We point out a form of replay attack that renders some other straightforward implementations cumbersome to use. To enhance user-friendliness, we propose a solution using visual cues embedded into the 2D barcodes and incorporate the framework of "augmented reality" for easy verifications through visual inspection. We give a proof-of-concept implementation to show that our scheme is feasible in practice.Comment: 16 pages, 10 figure

    Isolation and pathogenicity of Phytophthora species from declining Rubus anglocandicans

    Get PDF
    Rubus anglocandicans is the most widespread and abundant blackberry species within the European blackberry (Rubus fruticosus) aggregate in Western Australia (WA). European blackberry is also one of the 32 Weeds of National Significance in Australia. A disease recorded as 'blackberry decline' was first observed in some blackberry sites in WA in 2006. A disease survey was conducted in the Manjimup-Pemberton region along the Warren and Donnelly River catchments in WA between 2010 and 2012. Phytophthora amnicola, P. bilorbang, P. cryptogea, P. inundata, P. litoralis, P. multivora, P. taxon personii, P. thermophila and a P. thermophila Ă— amnicola hybrid were recovered from declining and adjacent decline-free sites, as well as from streams and rivers. Phytophthora cinnamomi was isolated from dying Banksia and Eucalyptus species from two non-decline sites. Of these species, P. bilorbang and P. cryptogea were more pathogenic than the others in under-bark inoculations using excised stems (primocanes), in planta primocane inoculations in blackberry growing wild in native forest stands, and in glasshouse pot trials. It was concluded that blackberry decline is a complex syndrome and Phytophthora species, in particular P. bilorbang and P. cryptogea, together with temporary inundation, are major biotic and abiotic factors contributing to blackberry decline
    • …
    corecore