24   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Chun-Chieh Lin, Pei-Chann Chang and Ping-Heng Tsai    
Revista: Applied Sciences    Formato: Electrónico

 
en línea
DaYou Jiang and Jongweon Kim    
This paper presents a new content-based image retrieval (CBIR) method based on image feature fusion. The deep features are extracted from object-centric and place-centric deep networks. The discrete cosine transform (DCT) solves the strong correlation of... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
J. L. Divya Shivani and Ranjan K. Senapati    
This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in hierarchical trees (SPIHT) digital watermarking technique that is robust against several common attacks such as cropping, filtering, sharpening, noise, inversio... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
J. L. Divya Shivani and Ranjan K. Senapati    
This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in hierarchical trees (SPIHT) digital watermarking technique that is robust against several common attacks such as cropping, filtering, sharpening, noise, inversio... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fahmi Amhar, Endang Purnama Giri, Florence Elfriede Sinthauli Silalahi, Shelvie Nidya Neyman, Anggrahito, Dadan Ramdani, Danang Jaya, Dewayany Sutrisno, Sandi Adhitya Kolopaking, Tia Rizka Nuzula Rachma and Murdaningsih    
This research aims to protect Digital Elevation Model (DEM) data from piracy or counterfeiting. An invisible watermark inserted into the data, which will not considerably change the data value, is necessary. The proposed method involves the use of the tw... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano    
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ibrahim Furkan Ince    
Human activity recognition (HAR) has been an active area in computer vision with a broad range of applications, such as education, security surveillance, and healthcare. HAR is a general time series classification problem. LSTMs are widely used for time ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
El-Sayed M. El-Kenawy, Nima Khodadadi, Ashin Khoshnaw, Seyedali Mirjalili, Amel Ali Alhussan, Doaa Sami Khafaga, Abdelhameed Ibrahim and Abdelaziz A. Abdelhamid    
Recently, piracy and copyright violations of digital content have become major concerns as computer science has advanced. In order to prevent unauthorized usage of content, digital watermarking is usually employed. This work proposes a new approach to di... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xiao Zhou, Chengyou Wang, Zhi Zhang and Qiming Fu    
Based on a deep understanding of all-phase digital filter (APDF) design and all-phase biorthogonal transform (APBT), this paper will further study the windowed all-phase digital filter (WAPDF) and windowed all-phase biorthogonal transform (WAPBT), discus... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yuan hong Zhong, Shun Zhang, Rongbu He, Jingyi Zhang, Zhaokun Zhou, Xinyu Cheng, Guan Huang and Jing Zhang    
Feature extraction is a key part of the electronic tongue system. Almost all of the existing features extraction methods are ?hand-crafted?, which are difficult in features selection and poor in stability. The lack of automatic, efficient and accurate fe... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Atallah AL-Shatnawi,Faisal Al-Saqqar,Safa?a Alhusban     Pág. pp. 20 - 34
In this paper, we introduce a multi-stage offline holistic handwritten Arabic text recognition model using the Local Binary Pattern (LBP) technique and two machine-learning approaches; Support Vector Machines (SVM) and Artificial Neural Network (ANN). In... ver más

 
en línea
Heri Prasetyo and Hendra Kurniawan    
This paper presents an efficient and simple technique on reducing the false contour problem which often occurs in the JPEG decoded image. The false contour appears on JPEG decoded image while applying small quality factor. This problem induces unpleasant... ver más
Revista: Information    Formato: Electrónico

 
en línea
Luz Fátima Huallpa Vargas,Luis Pánfilo Yapu Quispe    
En este trabajo se presenta el desarrollo de un procedimiento de autenticación de imágenes digitales combinando diversos métodos relacionados con watermarks (marcas de agua) digitales y métodos de cifrado, con el fin de proteger los derechos de autor de ... ver más
Revista: Investigación & Desarrollo    Formato: Electrónico

 
en línea
Heng Zhang, Chengyou Wang and Xiao Zhou    
With the development of image processing technology, the copyright protection of digital images has become an urgent problem to be solved. As an effective method, the robust digital watermarking technique emerges at a historic moment. Currently, most rob... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Heng Zhang, Chengyou Wang and Xiao Zhou    
With the development of image processing technology, the copyright protection of digital images has become an urgent problem to be solved. As an effective method, the robust digital watermarking technique emerges at a historic moment. Currently, most rob... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Carmine Paolino, Alessio Antolini, Francesco Zavalloni, Andrea Lico, Eleonora Franchi Scarselli, Mauro Mangia, Alex Marchioni, Fabio Pareschi, Gianluca Setti, Riccardo Rovatti, Mattia Luigi Torres, Marcella Carissimi and Marco Pasotti    
Analog In-Memory computing (AIMC) is a novel paradigm looking for solutions to prevent the unnecessary transfer of data by distributing computation within memory elements. One such operation is matrix-vector multiplication (MVM), a workhorse of many fiel... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Jaychand Upadhyay and Tad Gonsalves    
In computer vision applications, gait-based gender classification is a challenging task as a person may walk at various angles with respect to the camera viewpoint. In some of the viewing angles, the person?s limb movement can be occluded from the camera... ver más
Revista: AI    Formato: Electrónico

 
en línea
Xinyue Fan, Teng Liu, Hong Bao, Weiguo Pan, Tianjiao Liang and Han Li    
In the field of computer vision, training a well-performing model on a dataset with a long-tail distribution is a challenging task. To address this challenge, image resampling is usually introduced as a simple and effective solution. However, when perfor... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Bo-Lin Jian, Wen-Lin Chu, Yu-Chung Li and Her-Terng Yau    
This study proposed the concept of sparse and low-rank matrix decomposition to address the need for aviator?s night vision goggles (NVG) automated inspection processes when inspecting equipment availability. First, the automation requirements include mac... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nikolay Kalashnikov,Olexandr Kokhanov,Olexandr Iakovenko,Nataliia Kushnirenko     Pág. 37 - 42
This paper addresses the task of developing a steganographic method to hide information, resistant to analysis based on the Rich model (which includes several different submodels), using statistical indicators for the distribution of the pairs of coeffic... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »