2012 Sixth International Conference on Genetic and Evolutionary Computing

25-28 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 155
  • [Front cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (522 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xvi
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (149 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s):xix - xxi
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s):xxii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • Stereo Matching with Semi-limited Belief Propagation

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    In this paper, we present an effective scheme with semi-limited belief propagation to improve the performance of stereo matching. the mean shift segmentation is first introduced to decompose both reference image and target image of stereo pair into regions with similar disparity. We use the regions as matching primitives, and figure out disparity range for each segment by applying a fast local met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Testing Method for the Image Crosstalk of Stereoscopic Television

    Publication Year: 2012, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Cross talk is the key factor in determining the quality of stereoscopic television image. There is no normal distribution law of the stereoscopic television image cross talk value, so the traditional black and white image signal is not suitable for this 3DTV cross talk test. in this paper, we select a few points as the measuring points and the 256 gray-scale changes of the image have been consider... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advance on Trust Model and Evaluation Method in Social Networks

    Publication Year: 2012, Page(s):9 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    With the rapid development of electronics, communication networks and information technologies, there are emerging more and more open Internet-based web services and versatile applications. Users or agent entities accomplish their effective interactions and transactions based on the essential trust relations, and the trust assessment would provide secure services, privacy protection and trustworth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Belief Learning Model Based Socio-rational Secret Sharing Scheme on Cloud Storage

    Publication Year: 2012, Page(s):15 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    In this paper, we present a hybrid socio-rational secret sharing scheme, which is based on a belief learning model. Using this model, the player can learn the probabilities of the other players' likely action, upon which the player can responsively choose his next counter action(s) with the expected probabilities. Finally, we exploit the application of our proposed scheme in secured cloud storage. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Target-Preserving Content-Aware Image Resizing

    Publication Year: 2012, Page(s):19 - 22
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    This paper presents an automatic target-preserving content-aware image resizing method for displaying image with different aspect ratios. the method computes a saliency map which describes the attractive and unattractive regions in an image by the saliency-based visual attention model. then a thresholding technique is applied to detect important target regions on the saliency map. the method uses ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Reversible Data Hiding Based on Residue Histogram Shifting

    Publication Year: 2012, Page(s):23 - 26
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    This paper proposes an improved reversible data hiding method for grayscale images. Specifically, this method integrates the superiority of two existing schemes to improve secret data capacity. the main idea of this method is to classify image blocks into smooth or complex ones and then to implement disparate reversible data hiding schemes on them. in data embedding process, our hybrid method uses... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint Fingerprinting and Decryption for VQ Images through Bipartite Matching

    Publication Year: 2012, Page(s):27 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    The legality of redistribution of digital content over the Internet has become critical in commerce. The goal of the traitor tracing problem is to find out the traitor who illegally distributes the digital content. In this paper, a joint fingerprinting and decryption (JFD) scheme based on vector quantization and bipartite matching for traitor tracing is proposed. Before transmission, the proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyze the Digital Watermarking Security Demands for the Facebook Website

    Publication Year: 2012, Page(s):31 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    When a digital service wants to protect its service quality, it needs to focus on the importance of copyright. Digital watermarking is commonly used as a protection mechanism for files posted on the Internet. in recent years, the launching of social networking websites has highlighted the importance of looking into digital content security. in this study, the characteristics of digital watermarkin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extraction and Analysis of Structural Features of Lateral Ventricle in Brain Medical Images

    Publication Year: 2012, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (817 KB) | HTML iconHTML

    Structural characteristics of lateral ventricle in brain medical images from CT scan can be helpful for distinguishing between normal brain structure and abnormal brain structure. This paper presents image processing algorithms for automatic segmentation and measurement of structural features of lateral ventricle in brain medical images. the effectiveness of such features on brain structure discri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Image Hiding Method by Linking Multiple Pixels with XOR Operator

    Publication Year: 2012, Page(s):39 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    In 2006, Mielikaine's method partitioned pixels into pixel pairs. Two secret bits are embedded to a pixel pair through modifying only one pixel. After that, Chan's method linked bits of two continuous pixels by using XOR operator to further reduce the pixel modifications. To generalize Chan's method, in this paper, the concept of linking multiple pixels by using XOR operator is introduced. This wa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Directional Discriminant Analysis for Image Feature Extraction

    Publication Year: 2012, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (749 KB) | HTML iconHTML

    In this paper, two novel image feature extraction algorithms base on Directional Filter Banks are proposed, which are named Single Directional Two-Dimensional Linear Discriminant Analysis (SD2DLDA) and Multiple Directional Two-Dimensional Linear Discriminant Analysis (MD2DLDA). the SD2DLDA takes least running time while achieves high recognition rate and the MD2DLDA can get the higher recognition ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Information Hiding Method Based on Grouping Color Palette Indices by K-means Clustering and Similar Pairs

    Publication Year: 2012, Page(s):47 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    We propose a data hiding method with color image palette. Many previous authors often embed data into the index table of the color palette or into the color palette directly. Those data hiding methods will change the color palette into a difference one. It is impossible to reconstruct the original color palette. We follow previous method to apply the K-means clustering to split the color image pal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Study of Automate Locate Special Fiducial Marks

    Publication Year: 2012, Page(s):51 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1427 KB) | HTML iconHTML

    This study proposed an automatic positioning technology for the precision special fiducial mark(SFM). It divided the precision SFM into the fiducial mark of double circle and the fiducial mark of corner before positioning according to SFM. First, a standard fiducial mark (FM) known as reference fiducial mark (RFM) was selected. Then, according to RFM, the FM of other fiducial mark images was compa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancement of Dynamic ID Based User Authentication for Multi-server Environment

    Publication Year: 2012, Page(s):55 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. for user authentication, in 2011, Lee et al. proposed a dynamic user authentication scheme for multi-server environments. They claimed that this scheme provided efficiency, strong security, and user anonymity property. However, we find that Lee et al.'s scheme is still... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on a Dynamic-ID-Based Remote User Authentication Scheme for Multi-server Environment Using Smart Cards

    Publication Year: 2012, Page(s):59 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    User authentication prevents unauthorized users from accessing resources or getting applications illegally. Due to the rapid development of computer network technologies, users may gain the desired services in a multi-server environment. Recently, Lee et al. proposed a dynamic-ID-based remote user authentication scheme for multi-server environment using smart cards. They adopt dynamic ID to provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient and Flexible Mobile Payment Protocol

    Publication Year: 2012, Page(s):63 - 66
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (421 KB) | HTML iconHTML

    With the development of the mobile networks, mobile payment provides a convenient way for the transactions in e-commerce. in this paper, we propose an efficient mobile payment model and its two applications. in the proposed model, mobile operator provides the mutual authentication and anonymity between a merchant and a customer. Because mobile operator is a credible center on mobile networks, the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.