Learn More
This paper presents a wavelet transform based method for extracting license plates from cluttered images. The proposed system consists of three major stages. First, a wavelet transform based method is used for extracting important contrast features as guides to search for desired license plates. Then, finding a reference line in HL subimage plays an(More)
In order to improve the detection of malicious tampering of images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been distorted incidentally. However, watermarks are sensitive to geometric distortions. In this paper, we propose a new invariant semi-fragile digital watermarking technique based on(More)
In this paper we present a instant and real-time mobile vehicle license plate recognition system in an open environment. Using a nonfixed video camera installed in the car, the system tries to capture the image of the car in front and to process instant vehicle license plate detection and recognition. Relying on the instant vehicle body recognition, the(More)
In this paper, adaptive channel borrowing approach fuzzy neural networks for load balancing (ACB-FNN) is presented to maximized the number of served calls and the depending on asymmetries traffic load problem. In a wireless network, the call's arrival rate, the call duration and the communication overhead between the base station and the mobile switch(More)
Vision based band gesture recognition provides a more nature and powerful means for human-computer interaction. A fast detection process of hand gesture and an effective feature extraction process are presented. The proposed a hand gesture recognition algorithm comprises four main steps. First use Camshift algorithm to track skin color after closing(More)
Data hiding conceals the existence of secret information while cryptography protects the content of messages. A reversible data hiding is an algorithm, which can recover the original image losslessly from the stego-image after the hidden data have been extracted. In this paper, we propose a method that combines reversible data hiding, halftoning and vector(More)
We propose a novel scheme of Automatic image authentication and recovery, in which the altered region of the image can be detected and recovered in a fully automated fashion. We use a fragile digital watermarking technique based on eigenvalues and eigenvectors of a real symmetric matrix generated by the four pixel-pair. The signature bits for detecting(More)