By Komate Amphawan, Philippe Lenca (auth.), Borworn Papasratorn, Nipon Charoenkitkarn, Vajirasak Vanijja, Vithida Chongsuphajaisiddhi (eds.)

This e-book constitutes the complaints of the sixth foreign convention on Advances in details expertise, IAIT 2013, held in Bangkok, Thailand, in December 2013. The 23 revised papers provided during this quantity have been conscientiously reviewed and chosen from various submissions. They care for all components with regards to utilized details technology.

Show description

Read Online or Download Advances in Information Technology: 6th International Conference, IAIT 2013, Bangkok, Thailand, December 12-13, 2013. Proceedings PDF

Best international_1 books

Virtual, Augmented and Mixed Reality. Designing and Developing Virtual and Augmented Environments: 6th International Conference, VAMR 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part I

The two-volume set LNCS 8525-8526 constitutes the refereed complaints of the sixth overseas convention on digital, Augmented and combined truth, VAMR 2014, held as a part of the sixteenth foreign convention on Human-Computer interplay, HCI 2014, in Heraklion, Crete, Greece, in June 2014, together with thirteen different thematically comparable meetings.

Multiple Nationality and International Law

This e-book is a accomplished assessment of a number of nationality in overseas legislation, and features a survey of present nation perform overlaying over seventy five international locations. It examines the subject in mild of the old therapy of a number of nationality by way of States, overseas our bodies and commentators, taking off the final traits in overseas legislations and family members that experience motivated nationality.

Recent Developments in Intelligent Systems and Interactive Applications: Proceedings of the International Conference on Intelligent and Interactive Systems and Applications (IISA2016)

Interactive clever platforms are one of the most vital multi-disciplinary learn and improvement domain names of synthetic intelligence, human–computer interplay, laptop studying and new Internet-based applied sciences. hence, those structures include quite a few software parts equivalent to self reliant platforms, professional structures, cellular structures, recommender structures, knowledge-based and semantic web-based platforms, digital verbal exchange environments, and selection aid structures, to call a number of.

Additional resources for Advances in Information Technology: 6th International Conference, IAIT 2013, Bangkok, Thailand, December 12-13, 2013. Proceedings

Example text

Uthayopas Table 1. getF reeSpace(); Table 2. 1 wsw NY 31 days wso wsw 15 days wso wsw 30 days wso wsw 500 25,000 8,000 35,000 2,000 100 1,000 60,000 20 1,300 40,000 8,000 60,000 5,000 100 8,000 100 30 100 60,000 8,000 5,000 500 80,000 3,500 100 Window Size Parameter A significant parameter influencing all performance aspects of i-Cloud is window size (ws in Table 1). Our previous works, [7] and [8], have determined both optimal window sizes (wso ) and worst window sizes (wsw ) for simulations by extensively trial-and-error experiments as shown in Table 2.

Chantrapornchai Fig. 6 compares the PSNR values of the various method for the varying payload size. For example, when the payload is 10%, we consider the case where the size of the secret image size is 10% of the total size of all the frames. Obviously, the larger payload, the worse PSNR. Still, LMWT-Sim performs better for all the cases. Also, the lower payload size, the better the performance is. Fig. 5. Comparison of different drop frame rates with different video files with the lena image 512*512 Fig.

Comparison of different payload size with different video files Exploring Video Steganography for Hiding Images 43 Table 2 shows the coefficients of the original video, secret i e, and the direct combination of them and the combination from our "similar" approach. It shows that the secret image coefficients are hidden completely in the video frame coefficients. Though we can see the region where it is not perfectly hidden due to the number exact coefficient matches, those coefficients are likely hidden in the left side regions of the graph in the figure.

Download PDF sample

Rated 4.73 of 5 – based on 36 votes