|
|
|
Kaimeng Ding, Fan Meng, Yueming Liu, Nan Xu and Wenjun Chen
High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet...
ver más
|
|
|
|
|
|
|
Adil Redaoui, Amina Belalia and Kamel Belloulata
Deep network-based hashing has gained significant popularity in recent years, particularly in the field of image retrieval. However, most existing methods only focus on extracting semantic information from the final layer, disregarding valuable structura...
ver más
|
|
|
|
|
|
|
Zijian Chao and Yongming Li
Nowadays, people?s lives are filled with a huge amount of picture information, and image retrieval tasks are widely needed. Deep hashing methods are extensively used to manage such demands due to their retrieval rate and memory consumption. The problem w...
ver más
|
|
|
|
|
|
|
Wenjin Hu, Yukun Chen, Lifang Wu, Ge Shi and Meng Jian
Hamming space retrieval is a hot area of research in deep hashing because it is effective for large-scale image retrieval. Existing hashing algorithms have not fully used the absolute boundary to discriminate the data inside and outside the Hamming ball,...
ver más
|
|
|
|
|
|
|
Kai Ma, Bowen Wang, Yunqin Li and Jiaxin Zhang
Propagating architectural heritage is of great significance to the inheritance and protection of local culture. Recommendations based on user preferences can greatly benefit the promotion of local architectural heritage so as to better protect and inheri...
ver más
|
|
|
|
|
|
|
Kaimeng Ding, Shiping Chen, Jiming Yu, Yanan Liu and Jie Zhu
Aiming at the deficiency that blockchain technology is too sensitive to the binary-level changes of high resolution remote sensing (HRRS) images, we propose a new subject-sensitive hashing algorithm specially for HRRS image blockchains. To implement this...
ver más
|
|
|
|
|
|
|
Aiiad Albeshri
Mobile ad hoc networks (MANETs) play a highly significant role in the Internet of Things (IoT) for managing node mobility. MANET opens the pathway for different IoT-based communication systems with effective abilities for a variety of applications in sev...
ver más
|
|
|
|
|
|
|
Ling Du, Zehong He, Yijing Wang, Xiaochao Wang and Anthony T. S. Ho
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original i...
ver más
|
|
|
|
|
|
|
Hengfu Yang, Jianping Yin and Mingfang Jiang
Robustness and discriminability are the two most important features of perceptual image hashing (PIH) schemes. In order to achieve a good balance between perceptual robustness and discriminability, a novel PIH algorithm is proposed by combining latent lo...
ver más
|
|
|
|
|
|
|
Kaimeng Ding, Fan Meng, Yueming Liu, Nan Xu and Wenjun Chen
-
|
|
|
|
|
|
|
Dongjie Ye, Yansheng Li, Chao Tao, Xunwei Xie and Xiang Wang
|
|
|
|
|
|
|
Mohammed Amin Belarbi, Saïd Mahmoudi, Ghalem Belalem, Sidi Ahmed Mahmoudi and Aurélie Cools
Indexing images by content is one of the most used computer vision methods, where various techniques are used to extract visual characteristics from images. The deluge of data surrounding us, due the high use of social and diverse media acquisition syste...
ver más
|
|
|
|
|
|
|
Wenjing Yang, Liejun Wang, Shuli Cheng, Yongming Li and Anyu Du
Recently, deep learning to hash has extensively been applied to image retrieval, due to its low storage cost and fast query speed. However, there is a defect of insufficiency and imbalance when existing hashing methods utilize the convolutional neural ne...
ver más
|
|
|
|
|
|
|
Zhengmao Ye, Hang Yin and Yongmao Ye
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-c...
ver más
|
|
|
|
|
|
|
Jianan Bai, Danyang Qin, Ping Zheng and Lin Ma
In visual indoor positioning systems, the method of constructing a visual map by point-by-point sampling is widely used due to its characteristics of clear static images and simple coordinate calculation. However, too small a sampling interval will cause...
ver más
|
|
|
|
|
|
|
Kaimeng Ding, Yueming Liu, Qin Xu and Fuqiang Lu
Data security technology is of great significance to the application of high resolution remote sensing image (HRRS) images. As an important data security technology, perceptual hash overcomes the shortcomings of cryptographic hashing that is not robust a...
ver más
|
|
|
|
|
|
|
Kunbolat Algazy, Kairat Sakan, Nursulu Kapalova, Saule Nyssanbayeva and Dilmukhanbet Dyusenbayev
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value. Like any new cryptographic structure, the HBC-256 algorit...
ver más
|
|
|
|
|
|
|
Xingang Zhang, Haowen Yan, Liming Zhang and Hao Wang
Content integrity of high-resolution remote sensing (HRRS) images is the premise of its usability. Existing HRRS image integrity authentication methods are mostly binary decision-making processes, which cannot provide a further interpretable information ...
ver más
|
|
|
|
|
|
|
Argyrios Sideris and Minas Dasygenis
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat...
ver más
|
|
|
|