By Komate Amphawan, Philippe Lenca (auth.), Borworn Papasratorn, Nipon Charoenkitkarn, Vajirasak Vanijja, Vithida Chongsuphajaisiddhi (eds.)
This booklet constitutes the court cases of the sixth foreign convention on Advances in details expertise, IAIT 2013, held in Bangkok, Thailand, in December 2013. The 23 revised papers offered during this quantity have been rigorously reviewed and chosen from various submissions. They care for all parts with regards to utilized details technology.
Read Online or Download Advances in Information Technology: 6th International Conference, IAIT 2013, Bangkok, Thailand, December 12-13, 2013. Proceedings PDF
Similar international_1 books
We're happy to offer the lawsuits of the 2003 Atlantic net Intelligence C- ference, AWIC 2003. The convention used to be situated in Madrid, Spain in the course of might 5–6, 2003, geared up in the community by way of the Technical collage of Madrid. AWIC 2003 aimed to be the rst of a chain of meetings on internet Intelligence, to be celebrated each year, then again in Europe and the US, beginning in Madrid.
"Intelligent keep watch over and Automation" constitutes the result of the foreign convention on clever Computing, ICIC 2006, held in Kunming, China, in August 2006. The rigorously reviewed contributions are incorporated in 5 volumes of edited books, together with one quantity of Lecture Notes in machine technology (LNCS), one quantity of Lecture Notes in man made Intelligence (LNAI), one quantity of Lecture Notes in Bioinformatics (LNBI), and volumes of Lecture Notes up to the mark and knowledge Sciences (LNCIS).
Real-world cost-of-capital information from throughout industries and all over the world 2015 overseas Valuation Handbook—Industry expense of Capital is the fundamental reference for valuation pros, delivering country-level rate of fairness capital estimates for greater than one hundred fifty nations. up-to-date every year via the valuation specialists at Duff & Phelps, this authoritative consultant permits easy access to the knowledge and adjustable capital versions required to competently verify corporation hazard.
- Quality Assurance in LIS Education: An International and Comparative Study
- Channels and Channel Control Structures: Proceedings of the 1st International Conference on Hydraulic Design in Water Resources Engineering: Channels and Channel Control Structures, University of Southampton, April 1984
- Self-Organizing Systems: 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers
- Intelligent Computer Mathematics: 9th International Conference, CICM 2016, Bialystok, Poland, July 25-29, 2016, Proceedings
Extra resources for Advances in Information Technology: 6th International Conference, IAIT 2013, Bangkok, Thailand, December 12-13, 2013. Proceedings
Churin, J. Preechasuk, and C. Chantrapornchai After embedding, the indices are kept in a file separately from the stego video. We keep the frame number, the row and column positions etc. They are also encrypted. For example, (1,5,5) means we keep the position at frame1, row5 and column5. Then perform the inverse transform back for all the stego video frames. On the decryption side, Fig. 4 presents the steps which are described as follows: Doff pixel of the each frame of video file using the lifting discrete wavelet transforms.
Bit-plane decomposition steganography using wavelet compressed video. In: Proceedings of the 2003 Information, Communications and Signal Processing, and Fourth Pacific Rim Conference on Multimedia, vol. 2, pp. 970–974. IEEE (2003) 11. : Introduction to Wavelets in Engineering. International Journal for Numerical Methods in Engineering 37(14), 2365–2388 (1994) 12. : Lossless Steganography on AVI File Using Swapping Algorithm. In: Conference on Computational Intelligence and Multimedia Applications, vol.
Steganography is one possible method to protect digital assets, and the technology of steganography has extended its applications from copyright protection to content indexing, secret communication, fingerprinting, and many others. The steganography techniques are classified based on the cover media and secret message type. The possible secret message types are text, images and audios while the cover media can be text, image, video and audio files. For example, with the text file cover media, methods usually relate to the coding scheme such as line-shifting, word-shifting, feature coding.
Advances in Information Technology: 6th International Conference, IAIT 2013, Bangkok, Thailand, December 12-13, 2013. Proceedings by Komate Amphawan, Philippe Lenca (auth.), Borworn Papasratorn, Nipon Charoenkitkarn, Vajirasak Vanijja, Vithida Chongsuphajaisiddhi (eds.)