Search results: Found 2

Listing 1 - 2 of 2
Sort by
Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings

Authors: ---
Book Series: Security and Cryptology ISBN: 9783319897219 9783319897226 Year: Volume: 10804 Pages: 347 DOI: https://doi.org/10.1007/978-3-319-89722-6 Language: English
Publisher: Springer Grant: ETAPS e.V.
Subject: Computer Science
Added to DOAB on : 2018-06-29 14:49:22
License:

Loading...
Export citation

Choose an application

Abstract

This book constitutes the proceedings of the 7th International Conference on Principles of Security and Trust, POST 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The 13 papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections named: information flow and non-intereference; leakage, information flow, and protocols; smart contracts and privacy; firewalls and attack-defense trees.

Entropy in Image Analysis

Author:
ISBN: 9783039210923 / 9783039210930 Year: Pages: 456 DOI: 10.3390/books978-3-03921-093-0 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2019-06-26 08:44:06
License:

Loading...
Export citation

Choose an application

Abstract

Image analysis is a fundamental task for extracting information from images acquired across a range of different devices. Since reliable quantitative results are requested, image analysis requires highly sophisticated numerical and analytical methods—particularly for applications in medicine, security, and remote sensing, where the results of the processing may consist of vitally important data. The contributions to this book provide a good overview of the most important demands and solutions concerning this research area. In particular, the reader will find image analysis applied for feature extraction, encryption and decryption of data, color segmentation, and in the support new technologies. In all the contributions, entropy plays a pivotal role.

Keywords

image retrieval --- multi-feature fusion --- entropy --- relevance feedback --- chaotic system --- image encryption --- permutation-diffusion --- SHA-256 hash value --- dynamic index --- entropy --- keyframes --- Shannon’s entropy --- sign languages --- video summarization --- video skimming --- image encryption --- multiple-image encryption --- two-dimensional chaotic economic map --- security analysis --- image encryption --- chaotic cryptography --- cryptanalysis --- chosen-plaintext attack --- image information entropy --- blind image quality assessment (BIQA) --- information entropy, natural scene statistics (NSS) --- Weibull statistics --- discrete cosine transform (DCT) --- ultrasound --- hepatic steatosis --- Shannon entropy --- fatty liver --- metabolic syndrome --- multi-exposure image fusion --- texture information entropy --- adaptive selection --- patch structure decomposition --- image encryption --- time-delay --- random insertion --- information entropy --- chaotic map --- uncertainty assessment --- deep neural network --- random forest --- Shannon entropy --- positron emission tomography --- reconstruction --- field of experts --- additive manufacturing --- 3D prints --- 3D scanning --- image entropy --- depth maps --- surface quality assessment --- machine vision --- image analysis --- Arimoto entropy --- free-form deformations --- normalized divergence measure --- gradient distributions --- nonextensive entropy --- non-rigid registration --- pavement --- macrotexture --- 3-D digital imaging --- entropy --- decay trend --- discrete entropy --- infrared images --- low contrast --- multiscale top-hat transform --- image encryption --- DNA encoding --- chaotic cryptography --- cryptanalysis --- image privacy --- computer aided diagnostics --- colonoscopy --- Rényi entropies --- structural entropy --- spatial filling factor --- binary image --- Cantor set --- Hénon map --- Minkowski island --- prime-indexed primes --- Ramanujan primes --- Kapur’s entropy --- color image segmentation --- whale optimization algorithm --- differential evolution --- hybrid algorithm --- Otsu method --- image encryption --- dynamic filtering --- DNA computing --- 3D Latin cube --- permutation --- diffusion --- fuzzy entropy --- electromagnetic field optimization --- chaotic strategy --- color image segmentation --- multilevel thresholding --- contrast enhancement --- sigmoid --- Tsallis statistics --- q-exponential --- q-sigmoid --- q-Gaussian --- ultra-sound images --- person re-identification --- image analysis --- hash layer --- quantization loss --- Hamming distance --- cross-entropy loss --- image entropy --- Shannon entropy --- generalized entropies --- image processing --- image segmentation --- medical imaging --- remote sensing --- security

Listing 1 - 2 of 2
Sort by
Narrow your search

Publisher

MDPI - Multidisciplinary Digital Publishing Institute (1)

Springer (1)


License

CC by (1)

CC by-nc-nd (1)


Language

eng (1)

english (1)


Year
From To Submit

2019 (1)

2018 (1)