|
|
|
Chun-Chieh Lin, Pei-Chann Chang and Ping-Heng Tsai
|
|
|
|
|
|
|
DaYou Jiang and Jongweon Kim
This paper presents a new content-based image retrieval (CBIR) method based on image feature fusion. The deep features are extracted from object-centric and place-centric deep networks. The discrete cosine transform (DCT) solves the strong correlation of...
ver más
|
|
|
|
|
|
|
J. L. Divya Shivani and Ranjan K. Senapati
This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in hierarchical trees (SPIHT) digital watermarking technique that is robust against several common attacks such as cropping, filtering, sharpening, noise, inversio...
ver más
|
|
|
|
|
|
|
J. L. Divya Shivani and Ranjan K. Senapati
This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in hierarchical trees (SPIHT) digital watermarking technique that is robust against several common attacks such as cropping, filtering, sharpening, noise, inversio...
ver más
|
|
|
|
|
|
|
Fahmi Amhar, Endang Purnama Giri, Florence Elfriede Sinthauli Silalahi, Shelvie Nidya Neyman, Anggrahito, Dadan Ramdani, Danang Jaya, Dewayany Sutrisno, Sandi Adhitya Kolopaking, Tia Rizka Nuzula Rachma and Murdaningsih
This research aims to protect Digital Elevation Model (DEM) data from piracy or counterfeiting. An invisible watermark inserted into the data, which will not considerably change the data value, is necessary. The proposed method involves the use of the tw...
ver más
|
|
|
|
|
|
|
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for...
ver más
|
|
|
|
|
|
|
Ibrahim Furkan Ince
Human activity recognition (HAR) has been an active area in computer vision with a broad range of applications, such as education, security surveillance, and healthcare. HAR is a general time series classification problem. LSTMs are widely used for time ...
ver más
|
|
|
|
|
|
|
El-Sayed M. El-Kenawy, Nima Khodadadi, Ashin Khoshnaw, Seyedali Mirjalili, Amel Ali Alhussan, Doaa Sami Khafaga, Abdelhameed Ibrahim and Abdelaziz A. Abdelhamid
Recently, piracy and copyright violations of digital content have become major concerns as computer science has advanced. In order to prevent unauthorized usage of content, digital watermarking is usually employed. This work proposes a new approach to di...
ver más
|
|
|
|
|
|
|
Xiao Zhou, Chengyou Wang, Zhi Zhang and Qiming Fu
Based on a deep understanding of all-phase digital filter (APDF) design and all-phase biorthogonal transform (APBT), this paper will further study the windowed all-phase digital filter (WAPDF) and windowed all-phase biorthogonal transform (WAPBT), discus...
ver más
|
|
|
|
|
|
|
Yuan hong Zhong, Shun Zhang, Rongbu He, Jingyi Zhang, Zhaokun Zhou, Xinyu Cheng, Guan Huang and Jing Zhang
Feature extraction is a key part of the electronic tongue system. Almost all of the existing features extraction methods are ?hand-crafted?, which are difficult in features selection and poor in stability. The lack of automatic, efficient and accurate fe...
ver más
|
|
|
|
|
|
|
Atallah AL-Shatnawi,Faisal Al-Saqqar,Safa?a Alhusban
Pág. pp. 20 - 34
In this paper, we introduce a multi-stage offline holistic handwritten Arabic text recognition model using the Local Binary Pattern (LBP) technique and two machine-learning approaches; Support Vector Machines (SVM) and Artificial Neural Network (ANN). In...
ver más
|
|
|
|
|
|
|
Heri Prasetyo and Hendra Kurniawan
This paper presents an efficient and simple technique on reducing the false contour problem which often occurs in the JPEG decoded image. The false contour appears on JPEG decoded image while applying small quality factor. This problem induces unpleasant...
ver más
|
|
|
|
|
|
|
Luz Fátima Huallpa Vargas,Luis Pánfilo Yapu Quispe
En este trabajo se presenta el desarrollo de un procedimiento de autenticación de imágenes digitales combinando diversos métodos relacionados con watermarks (marcas de agua) digitales y métodos de cifrado, con el fin de proteger los derechos de autor de ...
ver más
|
|
|
|
|
|
|
Heng Zhang, Chengyou Wang and Xiao Zhou
With the development of image processing technology, the copyright protection of digital images has become an urgent problem to be solved. As an effective method, the robust digital watermarking technique emerges at a historic moment. Currently, most rob...
ver más
|
|
|
|
|
|
|
Heng Zhang, Chengyou Wang and Xiao Zhou
With the development of image processing technology, the copyright protection of digital images has become an urgent problem to be solved. As an effective method, the robust digital watermarking technique emerges at a historic moment. Currently, most rob...
ver más
|
|
|
|
|
|
|
Carmine Paolino, Alessio Antolini, Francesco Zavalloni, Andrea Lico, Eleonora Franchi Scarselli, Mauro Mangia, Alex Marchioni, Fabio Pareschi, Gianluca Setti, Riccardo Rovatti, Mattia Luigi Torres, Marcella Carissimi and Marco Pasotti
Analog In-Memory computing (AIMC) is a novel paradigm looking for solutions to prevent the unnecessary transfer of data by distributing computation within memory elements. One such operation is matrix-vector multiplication (MVM), a workhorse of many fiel...
ver más
|
|
|
|
|
|
|
Jaychand Upadhyay and Tad Gonsalves
In computer vision applications, gait-based gender classification is a challenging task as a person may walk at various angles with respect to the camera viewpoint. In some of the viewing angles, the person?s limb movement can be occluded from the camera...
ver más
|
|
|
|
|
|
|
Xinyue Fan, Teng Liu, Hong Bao, Weiguo Pan, Tianjiao Liang and Han Li
In the field of computer vision, training a well-performing model on a dataset with a long-tail distribution is a challenging task. To address this challenge, image resampling is usually introduced as a simple and effective solution. However, when perfor...
ver más
|
|
|
|
|
|
|
Bo-Lin Jian, Wen-Lin Chu, Yu-Chung Li and Her-Terng Yau
This study proposed the concept of sparse and low-rank matrix decomposition to address the need for aviator?s night vision goggles (NVG) automated inspection processes when inspecting equipment availability. First, the automation requirements include mac...
ver más
|
|
|
|
|
|
|
Nikolay Kalashnikov,Olexandr Kokhanov,Olexandr Iakovenko,Nataliia Kushnirenko
Pág. 37 - 42
This paper addresses the task of developing a steganographic method to hide information, resistant to analysis based on the Rich model (which includes several different submodels), using statistical indicators for the distribution of the pairs of coeffic...
ver más
|
|
|
|