default search action
EURASIP Journal on Image and Video Processing, Volume 2020
Volume 2020, Number 1, December 2020
- Jianwei Fei, Zhihua Xia, Peipeng Yu, Fengjun Xiao:
Adversarial attacks on fingerprint liveness detection. 1 - Mingming Hu, Jingtao Guo:
Facial attribute-controlled sketch-to-image translation with generative adversarial networks. 2 - Jie Wang, Zisen Xu, Zhenkuan Pan, Weibo Wei, Guodong Wang:
The Vese-Chan model without redundant parameter estimation for multiphase image segmentation. 3 - Huanlong Zhang, Zeng Gao, Jie Zhang, Junfeng Liu, Zhicheng Nie, Jianwei Zhang:
Hybridizing extended ant lion optimizer with sine cosine algorithm approach for abrupt motion tracking. 4 - Lin He, Xiaomin Yang, Lu Lu, Wei Wu, Awais Ahmad, Gwanggil Jeon:
A novel multi-focus image fusion method for improving imaging systems by using cascade-forest model. 5 - Aneela Sabir, Khawar Khurshid, Ahmad Salman:
Segmentation-based image defogging using modified dark channel prior. 6 - Yue Yuan, Jun Chu, Lu Leng, Jun Miao, Byung-Gyu Kim:
A scale-adaptive object-tracking algorithm with occlusion detection. 7 - Kuo-Ming Hung, Chi-Hsiao Yih, Cheng-Hsiang Yeh, Li-Ming Chen:
A high capacity reversible data hiding through multi-directional gradient prediction, non-linear regression analysis and embedding selection. 8 - Zhen Wang, Fu-Zhen Sun, Long-Bo Zhang, Pingping Liu:
Minimal residual ordinal loss hashing with an adaptive optimization mechanism. 10 - Soon-kak Kwon, Dong-Seok Lee:
Zoom motion estimation for color and depth videos using depth information. 11 - Jiahuan He, Qichao Ying, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Semi-structured data protection scheme based on robust watermarking. 12 - Pål Anders Floor, Ivar Farup, Marius Pedersen, Øistein Hovde:
Error reduction through post processing for wireless capsule endoscope video. 14 - Fan Zhang, Fenlin Liu, Xiangyang Luo:
Geolocation of covert communication entity on the Internet for post-steganalysis. 15 - Mingji Yu, Yuchen Liu, Hu Sun, Heng Yao, Tong Qiao:
Adaptive and separable multiary reversible data hiding in encryption domain. 16 - Bo Yang, Mingyue Tang, Shaohui Chen, Gang Wang, Yan Tan, Bijun Li:
A vehicle tracking algorithm combining detector and tracker. 17 - Xintao Duan, Baoxia Li, Daidou Guo, Zhen Zhang, Yuanyuan Ma:
A coverless steganography method based on generative adversarial network. 18 - Marcos Roberto e Souza, Hélio Pedrini:
Visual rhythms for qualitative evaluation of video stabilization. 19 - G. Jemilda, S. Baulkani:
Integration of new moving object segmentation and classification techniques using optimal salp swarm-based feature fusion with linear multi k-SVM classifier. 20 - Zhenjun Tang, Hanyun Zhang, Shenglian Lu, Heng Yao, Xianquan Zhang:
Robust image hashing with compressed sensing and ordinal measures. 21 - Bernardo B. Gatto, Lincon Sales de Souza, Eulanda Miranda dos Santos, Kazuhiro Fukui, Waldir Sabino da Silva Jr., Kenny V. dos Santos:
A semi-supervised convolutional neural network based on subspace representation for image classification. 22 - Nan Pan, Jiaohua Qin, Yun Tan, Xuyu Xiang, Guimin Hou:
A video coverless information hiding algorithm based on semantic segmentation. 23 - Yuxuan Zhao, Ka Lok Man, Jeremy S. Smith, Kamran Siddique, Sheng-Uei Guan:
Improved two-stream model for human action recognition. 24 - Samadhi Wickrama Arachchilage, Ebroul Izquierdo:
Deep-learned faces: a survey. 25 - Lukasz Roszkowiak, Anna Korzynska, Dorota G. Pijanowska, Ramón Bosch, Marylène Lejeune, Carlos López:
Clustered nuclei splitting based on recurrent distance transform in digital pathology images. 26 - Bibi Ruqia, Zahid Mehmood, Rehan Mehmood Yousaf, Muhammad Tahir, Amjad Rehman, Muhammad Sardaraz, Muhammad Rashid:
BoVW model based on adaptive local and global visual words modeling and log-based relevance feedback for semantic retrieval of the images. 27 - Ze Wang, Mingzhi Chen, Yu Yang, Min Lei, Zhexuan Dong:
Joint multi-domain feature learning for image steganalysis based on CNN. 28 - He Yang, Beibei Fan, Lingling Guo:
Anchor-free object detection with mask attention. 29 - Huaqi Wang, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Defeating data hiding in social networks using generative adversarial network. 30 - Giuseppe Conti, Christos Kyrkou, Theocharis Theocharides, Gustavo Hernández-Peñaloza, David Jiménez:
A novel FPGA-based test-bench framework for SDI stream verification. 31 - Jing Wang, Hui Li, Xiuling Zhou, Xiao-Zhi Gao, Ming Wang:
A study of hepatic fibrosis staging methods using diffraction enhanced imaging. 32 - Fengyong Li, Lianming Zhang, Weimin Wei:
Reversible data hiding in encrypted binary image with shared pixel prediction and halving compression. 33 - Ali Mirza, Ossama Zeshan, Muhammad Atif, Imran Siddiqi:
Detection and recognition of cursive text from video frames. 34 - Qinghongya Shi, Hongbo Zhang, Hao-Tian Ren, Ji-Xiang Du, Qing Lei:
Consistent constraint-based video-level learning for action recognition. 35 - Yi Cao, Zhili Zhou, Q. M. Jonathan Wu, Chengsheng Yuan, Xingming Sun:
Coverless information hiding based on the generation of anime characters. 36 - Renjie Zhu, Xinpeng Zhang, Mengte Shi, Zhenjun Tang:
Secure neural network watermarking protocol against forging attack. 37 - Chih-Shuan Huang, Ya-Han Huang, Din-Yuen Chan, Jar-Ferr Yang:
Shape-reserved stereo matching with segment-based cost aggregation and dual-path refinement. 38 - Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Yao Qiu:
Coverless image steganography based on DenseNet feature mapping. 39 - Jiu-fen Liu, Chunfang Yang, Junchao Wang, Yanan Shi:
Stego key recovery method for F5 steganography with matrix encoding. 40 - Herng-Hua Chang, Po-Fang Chen, Jun-Kai Guo, Chia-Chi Sung:
A self-adaptive single underwater image restoration algorithm for improving graphic quality. 41 - Zheng Ma, Yan Ma, Xiaohong Huang, Manjun Zhang, Yanxiao Liu:
Applying cheating identifiable secret sharing scheme in multimedia security. 42 - Sujuan Yan, Hong Jin:
An improved localization method for lesion area in gynecological ultrasound image. 43 - Qiaochuan Chen, Guangyao Li, Qingguo Xiao, Li Xie, Mang Xiao:
Image completion via transformation and structural constraints. 44 - Giuseppe Conti, Christos Kyrkou, Theocharis Theocharides, Gustavo Hernández-Peñaloza, David Jiménez:
Correction to: A novel FPGA-based test-bench framework for SDI stream verification. 45 - Zhangjie Fu, Fan Wang, Xu Cheng:
The secure steganography for hiding images via GAN. 46 - Seong-Kyu Kim, Jun-Ho Huh:
Autochain platform: expert automatic algorithm Blockchain technology for house rental dApp image application model. 47 - Guangyi Yang, Xingyu Ding, Tian Huang, Kun Cheng, Weizheng Jin:
Explicit-implicit dual stream network for image quality assessment. 48 - Yu Liu, Huaxin Xiao, Hanlin Tan, Ping Li:
Are RGB-based salient object detection methods unsuitable for light field data? 49 - Minhui Chang, Lei Zhang:
Image restoration based on sparse representation using feature classification learning. 50 - Xu Cheng, Chen Song, Yongxiang Gu, Beijing Chen:
Learning attention for object tracking with adversarial learning network. 51 - Wenming Huang, Dengrui Hu, Zhenrong Deng, Jianyun Nie:
Named entity recognition for Chinese judgment documents based on BiLSTM and CRF. 52 - Xuezhuan Zhao, Lishen Pei, Tao Li, Zheng Zhang:
Online social image ranking in diversified preferences. 53
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.