期刊:
COMPUTATIONAL INTELLIGENCE: FOUNDATIONS AND APPLICATIONS: PROCEEDINGS OF THE 9TH INTERNATIONAL FLINS CONFERENCE,2010年4:980-983
通讯作者:
Wang, Runqi
作者机构:
[Li, Yihua; Wang, Runqi; Pang, Yan] Cent S Univ Forestry & Technol, Sch Logist, Changsha 410004, Peoples R China.
通讯机构:
[Wang, Runqi] C;Cent S Univ Forestry & Technol, Sch Logist, Changsha 410004, Peoples R China.
会议名称:
9th International FLINS Conference on Computational Intelligence: Foundations and Applications
会议时间:
AUG 02-04, 2010
会议地点:
Emei, PEOPLES R CHINA
会议主办单位:
[Wang, Runqi;Li, Yihua;Pang, Yan] Cent S Univ Forestry & Technol, Sch Logist, Changsha 410004, Peoples R China.
会议论文集名称:
World Scientific Proceedings Series on Computer Engineering and Information Science
摘要:
This paper makes use of multi-agent system technology to automate the management of traffic control system. Since there is no available platform supporting traffic control system's application, we introduce a general design framework of traffic control system and attempt to implement it by object-oriented methods. It is a good way for decentralized traffic control field.
期刊:
Journal of Multimedia,2010年5(3):290-297 ISSN:1796-2048
通讯作者:
Shengbing, C.(cheshengbing727@tom.com)
作者机构:
[Zuguo Che; Xu Shu; Shengbing Che] College of computer and information engineering, Central South University of Forestry and Technology, Hunan Changsha 410004, China
摘要:
Image compression operator based on discrete cosine transform was brought up. A securer scrambling locational operator was put forward based on the concept of anti-tamper radius. The basic idea of the algorithm is that it first combined image block compressed data with eigenvalue of image block and its offset block, then scrambled or encrypted and embeded them into least significant bit of corresponding offset block. This algorithm could pinpoint tampered image block and tampering type accurately. It could recover tampered block with good image quality when tamper occured within the limits of the anti-tamper radius. It could effectively resist vector quantization and synchronous counterfeiting attacks on self-embedding watermarking schemes.