Abstract: Systems (100) and methods (600) for reducing the total number of bits required to be transferred over a communications link for an image (400) captured by a camera (102). The methods involve receiving, from the camera, original color values for pixels of the image. A first pixel is selected by an encoder (130). Thereafter, the encoder determines whether the first pixel exists outside a region of interest (402) within the image. If the first pixel exists outside the region of interest within the image, then arithmetic operations are performed by the encoder using the original color value for the first pixel. The arithmetic operations are performed to generate a First Modified Color Value (FMCV). Subsequently, image data is compressed using at least the FMCV. Notably, the color represented by FMCV is different than a color represented by the original color value for the first pixel.
Abstract: There is disclosed an inspection device of a plugged honeycomb structure in which a plugged honeycomb structure is an inspection target, and the inspection device comprises a light source which illuminates one end face of the plugged honeycomb structure as the inspection target; a camera-side lens which condenses light emitted from the light source to the one end face, transmitted through plugged portions of the plugged honeycomb structure and radiated from the other end face; a camera which receives the light condensed by the camera-side lens; and an image processor which processes an image of the light received by the camera to display the contrast of the light transmitted through the plugged portions of the plugged honeycomb structure.
Abstract: The protected method of cryptographic computation includes N computation rounds successively performed to produce an output data from an input data and a private key. The method also includes a first masking stage to mask the input data, so that each intermediate data used or produced by a computation round is masked, and a second masking stage to mask data manipulated inside each computation round.
Abstract: A program control system is capable of preventing an invalid program from being downloaded to a mobile terminal. When a programmer applies for the certification and registration of a developed program, a gateway sends a checking program for checking the validity of program to the programmer. After having been notified that the program had passed the check from the programmer, the gateway accepts the registration of the program, and requests a cipher key database to send a public key. Having received the public key from the cipher key database, the gateway sends the program with the public key to a server to register the program. When a mobile terminal requests for the program, the gateway accesses the server to obtain the program with the public key. Subsequently, the gateway sends the public key to the cipher key database to authenticate the public key by use of a companion cipher key stored therein.