Counter-Terrorism Video Analysis Using Hash-Based Algorithms

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving hash-based Wyner-Ziv video coding using genetic algorithms

This work aims at improving the quality of the side information in distributed video coding. A novel technique for the fusion of multiple side information is developed for this purpose. Based on genetic algorithms, the proposed frame fusion technique incurs no additional complexity at the encoder side, in case of hash-based distributed video coding. Simulation results show a significant improve...

متن کامل

Modeling Values for Counter-Terrorism Analysis

Decisions are made to achieve objectives. A value model unambiguously represents objectives in a quantitative manner. Hence, a value model both guides thinking and provides a basis for analyzing alternatives to best meet the desired objectives. This paper proposes the development of value models to support counter-terrorism efforts. It summarizes the theory and procedures to develop value model...

متن کامل

Dynamic Network Analysis for Counter-Terrorism

networks X X X Abstract network growth X X Xnetwork growth X X X

متن کامل

Data Mining for Counter-Terrorism

Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...

متن کامل

Two Novel Chaos-Based Algorithms for Image and Video Watermarking

In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Algorithms

سال: 2019

ISSN: 1999-4893

DOI: 10.3390/a12050110