Information hiding is an area of great interest due to its applications in copyright protection of images, data, passport control, CDs, DVDs, videos and so on. This book presents a sample of recent research results from key researchers. The contributions include: - Copyright protection system; - Video watermarking; - Restoring objects for digital inpainting; - Data embedding scheme; - Robust image watermarking; - Perceptual shaping in digital watermarking; - Image authentication method under JPEG; - Fingerprinting for copyright protection; - Data hiding for halftone images; - Information...
Information hiding is an area of great interest due to its applications in copyright protection of images, data, passport control, CDs, DVDs, video...
This book is about synergy in computational intelligence (CI). It is a c- lection of chapters that covers a rich and diverse variety of computer-based techniques, all involving some aspect of computational intelligence, but each one taking a somewhat pragmatic view. Many complex problems in the real world require the application of some form of what we loosely call "intel- gence"fortheirsolution. Fewcanbesolvedbythenaiveapplicationofasingle technique, however good it is. Authors in this collection recognize the li- tations of individual paradigms, and propose some practical and novel ways in...
This book is about synergy in computational intelligence (CI). It is a c- lection of chapters that covers a rich and diverse variety of computer-based...
This research book presents the use of computational intelligence paradigms in the bioprocess-related tasks of modeling, supervision, monitoring and control, diagnostic, learning and optimization. All have applications to a wide variety of other areas.
This research book presents the use of computational intelligence paradigms in the bioprocess-related tasks of modeling, supervision, monitoring and c...
Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions. This book is directed to students, professors,...
Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in ...
Over the past two decades, swarm intelligence has emerged as a powerful approach to solving optimization as well as other complex problems. Swarm intelligence models are inspired by social behaviours of simple agents interacting among themselves as well as with the environment, e.g., flocking of birds, schooling of fish, foraging of bees and ants. The collective behaviours that emerge out of the interactions at the colony level are useful in achieving complex goals.
The main aim of this research book is to present a sample of recent innovations and advances in techniques and...
Over the past two decades, swarm intelligence has emerged as a powerful approach to solving optimization as well as other complex problems. Swarm i...
Intelligent Autonomous Systems (IAS) are the physical embodiment of machine intelligence providing a core concept for integrating various advanced techno- gies with pattern recognition and learning. The basic philosophy of IAS research is to explore and understand the nature of intelligence in problems of perception, reasoning, learning and control in order to develop and implement the theory to engineered realization. In other words, the objective is to formulate various me- odologies for the development of robots which can operate autonomously and exhibit intelligent behavior by making...
Intelligent Autonomous Systems (IAS) are the physical embodiment of machine intelligence providing a core concept for integrating various advanced tec...
KES International (KES) is a worldwide organisation that provides a professional community and association for researchers, originally in the discipline of Knowledge Based and Intelligent Engineering Systems, but now extending into other related areas. Through this, KES provides its members with opportunities for publication and beneficial interaction. The focus of KES is research and technology transfer in the area of Intelligent S- tems, i.e. computer-based software systems that operate in a manner analogous to the human brain, in order to perform advanced tasks. Recently KES has started to...
KES International (KES) is a worldwide organisation that provides a professional community and association for researchers, originally in the discipli...
KES International (KES) is a worldwide organisation that provides a professional community and association for researchers, originally in the discipline of Knowledge Based and Intelligent Engineering Systems, but now extending into other related areas. Through this, KES provides its members with opportunities for publication and beneficial interaction. The focus of KES is research and technology transfer in the area of Intelligent S- tems, i.e. computer-based software systems that operate in a manner analogous to the human brain, in order to perform advanced tasks. Recently KES has started to...
KES International (KES) is a worldwide organisation that provides a professional community and association for researchers, originally in the discipli...
Decision making arises when we wish to select the best possible course of action from a set of alternatives. With advancements of the digital technologies, it is easy, and almost instantaneous, to gather a large volume of information and/or data pertaining to a problem that we want to solve. For instance, the world-wi- web is perhaps the primary source of information and/or data that we often turn to when we face a decision making problem. However, the information and/or data that we obtain from the real world often are complex, and comprise various kinds of noise. Besides, real-world...
Decision making arises when we wish to select the best possible course of action from a set of alternatives. With advancements of the digital technolo...
In today's world, the increasing requirement for emulating the behavior of real-world applications for achieving effective management and control has necessitated the usage of advanced computational techniques. Computational intelligence-based techniques that combine a variety of problem solvers are becoming increasingly pervasive. The ability of these methods to adapt to the dynamically changing environment and learn in an online manner has increased their usefulness in simulating intelligent behaviors as observed in humans. These intelligent systems are able to handle the stochastic and...
In today's world, the increasing requirement for emulating the behavior of real-world applications for achieving effective management and control has ...