Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 77, Issue 19October 2018
Reflects downloads up to 30 Jan 2025Bibliometrics
article
On the ensemble of multiscale object-based classifiers for aerial images: a comparative study

Remote sensing images (RSIs) are increasingly used as data source to produce maps used in several applications. Modern sensors launched into space from the end of the 1990s have been producing high spatial resolution RSIs. The use of classification ...

article
Design of high performance copyright protection watermarking based on lifting wavelet transform and bi empirical mode decomposition

This paper developed new and efficient image watermarking scheme for copyright protection based on Lifting wavelet transform (LWT) and Bi- dimensional Empirical Mode Decomposition (BEMD). A LWT has been selected because it is fast, less computational ...

article
RISC: a robust image symmetric cryptosystem

In recent years, AES is known as the excellent choice between the existing symmetric cryptosystems to encrypt binary or text data. However, this standard encryption algorithm is unsuitable for images regarding the particular features of these kinds of ...

article
A novel retrieval method for remote sensing image based on statistical model

With the increasing number of high-resolution remote sensing (HRRS) image technologies, there is an interest in seeking a way to retrieve images efficiently. In order to describe the images with abundant texture information more concisely and accurately,...

article
Deep-learning-based face detection using iterative bounding-box regression

Multi-view face detection in open environments is a challenging task due to the diverse variations of face appearances and occlusion. In the task of face detection, localization accuracy is one of the key factors. However, many of the existing methods ...

article
Salient object detection method using random graph

In this paper, a bottom-up salient object detection method is proposed by modeling image as a random graph. The proposed method starts with portioning input image into superpixels and extracting color and spatial features for each superpixel. Then, a ...

article
A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding

This paper presents a new combined neural network and chaos based pseudo-random sequence generator and a DNA-rules based chaotic encryption algorithm for secure transmission and storage of images. The proposed scheme uses a new heterogeneous chaotic ...

article
Robust color image watermarking using invariant quaternion Legendre-Fourier moments

In this paper, a geometrically invariant color image watermarking method using Quaternion Legendre-Fourier moments (QLFMs) is presented. A highly accurate, fast and numerically stable method is proposed to compute the QLFMs in polar coordinates. The ...

article
A spatiotemporal chaotic image encryption scheme based on self adaptive model and dynamic keystream fetching technique

This paper proposes a block chaotic image encryption algorithm based on self-adaptive and dynamic key stream fetching technique (DKSFT) which makes use of a non-adjacent spatiotemporal chaotic system coupled with Tent-Sine system (NASC-TSS) for the ...

article
Cross-layer optimization for many-to-one wireless video streaming systems

This paper develops a cross-layer optimization solution for video streaming from multiple sources to a central proxy station over a wireless network. The proposed solution manages the application rates and transmission opportunities of various video ...

article
Action unit detection in 3D facial videos with application in facial expression retrieval and recognition

This work introduces a new scheme for action unit detection in 3D facial videos. Sets of features that define action unit activation in a robust manner are proposed. These features are computed based on eight detected facial landmarks on each facial ...

article
Abnormal events' detection in crowded scenes

In this paper, two new methods are developed in order to detect and track unexpected events in scenes. The process of detecting people may face some difficulties due to poor contrast, noise and the small size of the defects. For this purpose,the perfect ...

article
An entity based multi-direction cooperative deformation algorithm for generating personalized human shape

Personalized human shape plays an important role in system of virtual garment customization. In this paper, a new entity based multi-direction cooperative deformation algorithm (MDCD) is proposed to generate personalized human shape. We primarily ...

article
Locality constrained encoding of frequency and spatial information for image classification

The bag-of-feature (BoF) model provides a way to construct high-level representation for image classification. Although spatial pyramid matching (SPM) has been incorporated into many of its extensions, these models intrinsically lack the mechanism to ...

article
View-invariant gait recognition based on kinect skeleton feature

Gait recognition is a popular remote biometric identification technology. Its robustness against view variation is one of the challenges in the field of gait recognition. In this paper, the second-generation Kinect (2G---Kinect) is used as a tool to ...

article
An Optimized Halftone Visual Cryptography Scheme Using Error Diffusion

Halftone Visual Cryptography (HVC) is an encryption technique that encodes the secret image into halftone images in order to produce secure meaningful shares. Many methods have been proposed for developing HVC to protect the security of the images. Yet, ...

article
VRheab: a fully immersive motor rehabilitation system based on recurrent neural network

In this paper, a fully immersive serious game system that combines two Natural User Interfaces (NUIs) and a Head Mounted Display (HMD) to provide an interactive Virtual Environment (VE) for patient rehabilitation is proposed. Patients' data are acquired ...

article
Improved frame-by-frame object pose tracking in complex environments

Pose tracking is an important task in Augmented Reality (AR), interactive systems, and robotic systems. The frame-by-frame pose tracking that is effective in many cases still faces challenges in complex environments such as occlusions, illumination ...

article
Experimental evaluation of haptic data communication with prediction

The transmission of haptic data is relatively challenging in multimedia communication. In this research study, the methods are presented for exploiting the properties of human haptic perception for data reduction of haptic data transmission. Packet-...

article
A semi-feature learning approach for tampered region localization across multi-format images

In multimedia security, it is an important task to localize the tampered image regions. In this work, deep learning is used to solve this problem and the approach can be applied to multi-format images. Concretely, we use Stack Autoencoder to obtain the ...

article
A new reduced-reference image quality assessment based on the SVD signal projection

A new image quality metric is proposed in this paper based on the degradation of structural information. It uses the singular value decomposition (SVD) as a structural projection tool called SVD-based reduced-reference image quality evaluator (SBR-IQE). ...

article
Exploring the effectiveness of an augmented reality dressing room

In this paper, we describe our experience with the design of an augmented reality dressing room in which 3D models of a dress are overlaid with a color image from a camera to provide the function of a sort of virtual mirror. In such a way, the customer ...

article
Robust object tracking via superpixels and keypoints

Most of the part-based methods just use the initial appearance model and feature information of the object. When the object is affected by occlusion, deformation and illumination factors, these methods can not be stable to the tracking object. In this ...

article
Adaptive variable order polynomial based digital zoom of images

Digital zoom is widely used in daily life from zooming a captured image to navigating through live maps. The applications are simple but application domains benefit large number of users. This manuscript proposes a novel approach to escalate zoom limits ...

article
Generating panoramic unfolded image from borehole video acquired through APBT

In geological engineering, geological structure detection is crucial to the engineering design and implementation. One of the most commonly used method is to acquire the borehole videos by Axial View Panoramic Borehole Televiewer (APBT). However this ...

article
A multilayer backpropagation saliency detection algorithm and its applications

Saliency detection is an active topic in the multimedia field. Most previous works on saliency detection focus on 2D images. However, these methods are not robust against complex scenes which contain multiple objects or complex backgrounds. Recently, ...

article
Online multi-object tracking: multiple instance based target appearance model

The online target specific feature based state estimation method has proved its applicability in video-based multiple objects tracking. This paper proposes a multi-modal tracking approach by coupling a distance based tracker with an appearance based ...

article
Image encryption based on modified Henon map using hybrid chaotic shift transform

In this paper, a new two dimensional modified Henon map (2D-MHM) which is derived from Henon map is proposed. Its chaotic performance is analyzed through bifurcation diagram, Lyapunov exponent spectrum and Lyapunov dimension. The map has broad chaotic ...

article
A relative 3D scan and construction for face using meshing algorithm

Three-dimensional object construction has seen a great deal of activity in the past decade, as has been pointed out in recent surveys, with the advancement of technology and easy availability of the depth sensors the 3D scanning technology has taken ...

article
Sudoku-based secret sharing approach with cheater prevention using QR code

QR codes as public patent are widely used to acquire the information in various fields. However, the characteristic of its public readability hinders its usage for delivering private messages. To overcome this weakness, we propose a Sudoku-based secret ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.