19   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Kaimeng Ding, Fan Meng, Yueming Liu, Nan Xu and Wenjun Chen    
High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet... ver más
Revista: Information    Formato: Electrónico

 
en línea
Adil Redaoui, Amina Belalia and Kamel Belloulata    
Deep network-based hashing has gained significant popularity in recent years, particularly in the field of image retrieval. However, most existing methods only focus on extracting semantic information from the final layer, disregarding valuable structura... ver más
Revista: Information    Formato: Electrónico

 
en línea
Zijian Chao and Yongming Li    
Nowadays, people?s lives are filled with a huge amount of picture information, and image retrieval tasks are widely needed. Deep hashing methods are extensively used to manage such demands due to their retrieval rate and memory consumption. The problem w... ver más
Revista: Information    Formato: Electrónico

 
en línea
Wenjin Hu, Yukun Chen, Lifang Wu, Ge Shi and Meng Jian    
Hamming space retrieval is a hot area of research in deep hashing because it is effective for large-scale image retrieval. Existing hashing algorithms have not fully used the absolute boundary to discriminate the data inside and outside the Hamming ball,... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kai Ma, Bowen Wang, Yunqin Li and Jiaxin Zhang    
Propagating architectural heritage is of great significance to the inheritance and protection of local culture. Recommendations based on user preferences can greatly benefit the promotion of local architectural heritage so as to better protect and inheri... ver más
Revista: Buildings    Formato: Electrónico

 
en línea
Kaimeng Ding, Shiping Chen, Jiming Yu, Yanan Liu and Jie Zhu    
Aiming at the deficiency that blockchain technology is too sensitive to the binary-level changes of high resolution remote sensing (HRRS) images, we propose a new subject-sensitive hashing algorithm specially for HRRS image blockchains. To implement this... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Aiiad Albeshri    
Mobile ad hoc networks (MANETs) play a highly significant role in the Internet of Things (IoT) for managing node mobility. MANET opens the pathway for different IoT-based communication systems with effective abilities for a variety of applications in sev... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ling Du, Zehong He, Yijing Wang, Xiaochao Wang and Anthony T. S. Ho    
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original i... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Hengfu Yang, Jianping Yin and Mingfang Jiang    
Robustness and discriminability are the two most important features of perceptual image hashing (PIH) schemes. In order to achieve a good balance between perceptual robustness and discriminability, a novel PIH algorithm is proposed by combining latent lo... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kaimeng Ding, Fan Meng, Yueming Liu, Nan Xu and Wenjun Chen    
-
Revista: Information    Formato: Electrónico

 
en línea
Dongjie Ye, Yansheng Li, Chao Tao, Xunwei Xie and Xiang Wang    
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Mohammed Amin Belarbi, Saïd Mahmoudi, Ghalem Belalem, Sidi Ahmed Mahmoudi and Aurélie Cools    
Indexing images by content is one of the most used computer vision methods, where various techniques are used to extract visual characteristics from images. The deluge of data surrounding us, due the high use of social and diverse media acquisition syste... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Wenjing Yang, Liejun Wang, Shuli Cheng, Yongming Li and Anyu Du    
Recently, deep learning to hash has extensively been applied to image retrieval, due to its low storage cost and fast query speed. However, there is a defect of insufficiency and imbalance when existing hashing methods utilize the convolutional neural ne... ver más
Revista: Information    Formato: Electrónico

 
en línea
Zhengmao Ye, Hang Yin and Yongmao Ye    
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-c... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Jianan Bai, Danyang Qin, Ping Zheng and Lin Ma    
In visual indoor positioning systems, the method of constructing a visual map by point-by-point sampling is widely used due to its characteristics of clear static images and simple coordinate calculation. However, too small a sampling interval will cause... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Kaimeng Ding, Yueming Liu, Qin Xu and Fuqiang Lu    
Data security technology is of great significance to the application of high resolution remote sensing image (HRRS) images. As an important data security technology, perceptual hash overcomes the shortcomings of cryptographic hashing that is not robust a... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Kunbolat Algazy, Kairat Sakan, Nursulu Kapalova, Saule Nyssanbayeva and Dilmukhanbet Dyusenbayev    
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value. Like any new cryptographic structure, the HBC-256 algorit... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xingang Zhang, Haowen Yan, Liming Zhang and Hao Wang    
Content integrity of high-resolution remote sensing (HRRS) images is the premise of its usability. Existing HRRS image integrity authentication methods are mostly binary decision-making processes, which cannot provide a further interpretable information ... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Argyrios Sideris and Minas Dasygenis    
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat... ver más
Revista: Computation    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »