Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 78, Issue 12June 2019
Reflects downloads up to 09 Jan 2025Bibliometrics
article
A blind spatial domain-based image watermarking using texture analysis and association rules mining

In aims to ensure images authentication, this paper proposes a blind spatial domain-based image watermarking using texture analysis and association rules mining. The idea is to identify the strongly textured locations in the host image for inserting the ...

article
Object detection and classification: a joint selection and fusion strategy of deep convolutional neural network and SIFT point features

In the area of machine learning and pattern recognition, object classification is getting an attraction due to its range of applications such as visual surveillance. In recent times, numerous deep learning-based methods are presented for object ...

article
Oriented-linear-tree based cost aggregation for stereo matching

Matching cost aggregation is one of the most important steps in dense stereo correspondence, and non-local cost aggregation methods based on tree structures have been widely studied recently. In this paper, we analyze the shortcomings of both the local ...

article
Improved Convolutional Neural Networks for Acoustic Event Classification

To further exploit the potential performance of convolutional neural networks in acoustic event classification, an improved convolutional neural network called AecNet (Acoustic event classification net) is proposed. For traditional convolutional neural ...

article
Shortest path with backtracking based automatic layer segmentation in pathological retinal optical coherence tomography images

Optical coherence tomography (OCT) is a high-resolution and non-invasive imaging modality that has become one of the most prevalent techniques for ophthalmic diagnosis. Retinal layer segmentation is crucial for doctors to diagnose and analysis retinal ...

article
The study of new features for video traffic classification

Network traffic classification is important for the management of network resource and the support quality of multimedia services. To realize the fine-grained classification of typical Internet video traffic, this paper studies and analyses the ...

article
A new thermal infrared and visible spectrum images-based pedestrian detection system

In this paper, we propose a hybrid system for pedestrian detection, in which both thermal and visible images of the same scene are used. The proposed method is achieved in two basic steps: (1) Hypotheses generation (HG) where the locations of possible ...

article
Novel multi-convolutional neural network fusion approach for smile recognition

The smile is one of the most common human facial expressions encountered in our daily lives. Smile recognition can be used in many scenarios, such as emotion monitoring, human-to-robot games, and camera shutter control, which is why smile recognition ...

article
DLGBD: A directional local gradient based descriptor for face recognition

This paper proposes a novel high-performance gradient-based local descriptor that handles the prominent challenges of face recognition such as resistance against rotational, illuminative changes as well as noise effects. One of the novelties this study ...

article
A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform

True random number generators are used in high security applications such as cryptography where non-determinism is required. However, they are slower than their pseudorandom counterparts because they need to extract entropy from physical phenomenon. To ...

article
3D convolutional neural network for object recognition: a review

Recognition of an object from an image or image sequences is an important task in computer vision. It is an important low-level image processing operation and plays a crucial role in many real-world applications. The challenges involved in object ...

article
Construction of a new 2D Chebyshev-Sine map and its application to color image encryption

A new 2D Chebyshev-Sine map with natural evaluation is proposed and its dynamical behavior is analyzed. To investigate its application in information security, a color image encryption algorithm is designed. One-time initial condition expressed as ...

article
Scale-adaptive tracking based on perceptual hash and correlation filter

In the research on computer vision, object tracking has encountered various challenges, such as occlusion and scale variation. In recent years, tracking-by-detection methods have performed competitively. Some of these methods have focused on solving the ...

article
A novel steganography scheme for video H.264/AVC without distortion drift

Many steganography schemes have been proposed for video sequences. However, the embedding capacity obtained by these schemes is still unsatisfactory. In this paper, a novel steganography scheme has proposed to further improve the embedding capacity ...

article
Secure and robust watermarking algorithm for remote sensing images based on compressive sensing

The aim of this paper is to improve the reconstruction accuracy and security when adopting Compressive Sensing (CS) in watermarking algorithm. Unlike classical CS-based watermark generation method, lifting wavelet transformation, partial Hadamard matrix,...

article
Multiple human upper bodies detection via candidate-region convolutional neural network

Upper body detection on images is a challenging task in practical application scenarios and shares all the difficulties of object detection. This paper focuses on the problems of the multiple upper bodies, including the diversity of appearances, the ...

article
FPGA realization of a speech encryption system based on a generalized modified chaotic transition map and bit permutation

This paper proposes a generalized modified chaotic transition map with three independent parameters. A hardware speech encryption scheme utilizing this map along with a bit permutation network is presented. While the transition map's generalization ...

article
Automatic generation of video navigation from Google Street View data with car detection and inpainting

In spite of the existence of numerous navigation tools/systems, Google Street View, offering only a single static image at a time, is still sometimes preferred for the provision of a realistic scene. However, for the sake of navigation, given the ...

article
A fast video watermarking algorithm using dual tree complex wavelet transform

Illegal camcording as the most common source of video piracy, is the main concern of the film production companies. With the increased speed and convenience of access to the Internet and video sharing services, the distribution of pirated video copies ...

article
A fast hybrid image cryptosystem based on random generator and modified logistic map

This paper demonstrates an image encryption technique using a hybrid method. This method consists of two stages. The image is XORed with the Pseudo-Random Number Generator (PRNG) in the first stage. The confusion and diffusion processes are applied by ...

article
Emotion recognition using facial expression by fusing key points descriptor and texture features

Emotions have a great significance in human-to-human and in human-to-computer communication and interaction. In this paper, an effective and novel approach to recognize the emotions using facial expressions by the fusion of duplex features is proposed. ...

article
Evolutionary learning approach to multi-agent negotiation for group recommender systems

Recommender systems (RSs) have emerged as a solution to the information overload problem by filtering and presenting the users with information, services etc. according to their preferences. RSs research has focused on algorithms for recommending items ...

article
Music similarity model based on CRP fusion and Multi-Kernel Integration

A music similarity model that combines Cross Recurrence Plot (CRP) fusion and Multi-Kernel Integration (MKI) is proposed for Cover Song Identification (CSI) task. First, two complementary descriptors: Harmonic Pitch Class Profile (HPCP), which ...

article
EEG in classroom: EMD features to detect situational interest of students during learning

Situational interest is widely explored in the psychology and education domains. It is proven to have positive effect on learning and academic achievement. Nonetheless, not much attention is given for assessing the feasibility of detecting this interest ...

article
Security enhancement of shares generation process for multimedia counting-based secret-sharing technique

Secret sharing is a cryptographic tool to ensure reliable and secure access to information. Counting-based secret sharing is a new secret sharing technique that generate the preprocessing shares using simple replacements operations of specific bits. ...

article
An improved reversible data hiding scheme using layered embedding

Reversible data hiding (RDH) embeds data into the original image content, and it can also losslessly recover the original image content after the embedded data is extracted. Some previous RDH algorithms, such as the algorithm proposed by Luo et al., ...

article
Collaborative hashing adopted in locality-constrained linear coding for scene classification

Scene classification methods based on effective feature extraction and coding have obtained promising results in recent years. But the K-nearest neighbor search strategy in Locality-constrained Linear Coding (LLC) increases the complexity of the ...

article
Multimodal biometric scheme for human authentication technique based on voice and face recognition fusion

In this paper, an effective multimodal biometric identification approach for human authentication tool based on face and voice recognition fusion is proposed. Cepstral coefficients and statistical coefficients are employed to extract features of voice ...

article
Edge based image steganography with variable threshold

With the rapid escalation of the usage of sensitive data exchange through internet, information security has become a vulnerable realm of concern. Numerous security policies are incorporated, steganography being one of them. In this paper, a new image ...

article
A video prediction approach for animating single face image

Generating dynamic 2D image-based facial expressions is a challenging task for facial animation. Much research work focused on performance-driven facial animation from given videos or images of a target face, while animating a single face image driven ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.