1. Trang chủ
  2. » Giáo Dục - Đào Tạo

forensics in telecommunications, information and multimedia

230 398 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 230
Dung lượng 13,94 MB

Nội dung

[...]... aiming to model the brain ANNs are popular within artificial intelligence applications such as function approximation, regression analysis, time series prediction and modeling, data processing, filtering and clustering, classification, pattern and sequence recognition, medical diagnosis, financial applications, data mining and achieving fine tuning parameters e.g in faulttolerant stream processing... training phase The network training is by entering all samples of one set handwritten letters in one step and the entire set in next steps It should be noted that in training every step the order in which the letters are fed into the network must be different from the order of entered letters in the previous training step Simulations are based on division of data set as 70% of all data used for training... of the network in training and correct classification of letters Moreover, by using image centroid in dividing network input image into subsections, the whole system is invariant to translation, rotation, and scaling of input letters Since these deformities are very common in handwritten texts, this approach demonstrates a promising property in real world applications A Novel Handwritten Letter Recognizer... Hand Tracking Algorithms In: IEEE Proc Geometric Modeling and Imaging–New Trends, pp 228–232 (July 2006) 2 Meinagh, M.A., Isazadeh, A., Ayar, M., Mahmoudi, F., Zareie, B.: Database Replication with Availability and Consistency Guarantees through Failure-Handling In: IEEE Proc International Multi-Conference on Computing in the Global Information Technology (ICCGI 2007), p 14 (2007) 3 Mangal, M., Singh,... encoders for steganalysis In: International Multimedia conference, workshop on Multimedia and security, pp 25–34 Magdeburg, Germany (2004) 12 Fake MP3 detector, http://www.sharewareconnection.com/fake-MP3-detector.htm 13 Mee, J., Watters, P.A.: Detecting and Tracing Copyright Infringements in P2P Networks In: International Conference on Networking, International Conference on Systems and International Conference... originated from a P2P network We had six examinees We developed software, which can run on an examinee’s PCs and recorded the results of the indicators for 12 H Kokkinen and J Nöyränen each MP3 file The examinees ran the software and classified the origin of the files We used three types of indicators: file specific indicators, directory specific indicators, and album specific indicators 2.1 File Indicators... numbers of pixels in each gray scale of an image In fig 4, the original image is seen in frame (a) and the histogram of the image in red, green and blue scales are seen in frames (b), (c) and (d), respectively Also, in frame (e), the encrypted image (using key ABCDEF0123456789ABCD in a 16-scale) can be seen In frames (f), (g) and (h), the histogram of the encrypted image in red, green and blue scales... algorithm In: IEEE Proc of the 2000 Congress on Evolutionary Computation (2000) 11 Murthy, B.V.S.: Handwriting Recognition Using Supervised Neural Networks In: Joint Conference on Neural network vol 4 (1999) Forensics for Detecting P2P Network Originated MP3 Files on the User Device Heikki Kokkinen and Janne Nöyränen Nokia Research Center, Itämerenkatu 11-13, 00180 Helsinki, Finland {heikki.kokkinen,janne.noyranen}@nokia.com... where balancing the trade off between consistency and availability is crucial [1, 2, 3, 4] Within machine vision and image processing field, ANNs have been mostly applied to classification and pattern recognition [5] Their special characteristics in being highly adaptive and learning make them suitable for comparing data sets and extracting patterns Pattern recognition with neural networks includes a... copyright infringements in the user device is watermarking [8] Koso et al apply Digital Signatures to watermarking [9] The watermarking is a technology to embed information to content so that it does not alter the human perception of the content and so that the information is difficult to remove The watermark is at investigation time used to track the source of the content Digital Time Warping achieves independence . (Ed.) Forensics in Telecommunications, Information and Multimedia Second International Conference, e -Forensics 2009 Adelaide, Australia, January 19-21, 2009 Revised Selected Papers 13 Volume Editor Matthew. Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e -Forensics 2009) took place in Adelaide, South Australia during January. prediction and modeling, data processing, filtering and clustering, classification, pattern and sequence recognition, medical diagnosis, financial applications, data mining and achieving fine tuning

Ngày đăng: 29/05/2014, 18:55

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN