期刊文献+
共找到2,901篇文章
< 1 2 146 >
每页显示 20 50 100
Digital Text Document Watermarking Based Tampering Attack Detection via Internet
1
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 Fahd N.Al-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 2024年第3期759-771,共13页
Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentica... Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models. 展开更多
关键词 Content authentication tampering attacks detection model SECURITY digital watermarking
下载PDF
Cyber Security within Smart Cities:A Comprehensive Study and a Novel Intrusion Detection-Based Approach
2
作者 Mehdi Houichi Faouzi Jaidi Adel Bouhoula 《Computers, Materials & Continua》 SCIE EI 2024年第10期393-441,共49页
The expansion of smart cities,facilitated by digital communications,has resulted in an enhancement of the quality of life and satisfaction among residents.The Internet of Things(IoT)continually generates vast amounts ... The expansion of smart cities,facilitated by digital communications,has resulted in an enhancement of the quality of life and satisfaction among residents.The Internet of Things(IoT)continually generates vast amounts of data,which is subsequently analyzed to offer services to residents.The growth and development of IoT have given rise to a new paradigm.A smart city possesses the ability to consistently monitor and utilize the physical environment,providing intelligent services such as energy,transportation,healthcare,and entertainment for both residents and visitors.Research on the security and privacy of smart cities is increasingly prevalent.These studies highlight the cybersecurity risks and the challenges faced by smart city infrastructure in handling and managing personal data.To effectively uphold individuals’security and privacy,developers of smart cities must earn the trust of the public.In this article,we delve into the realms of privacy and security within smart city applications.Our comprehensive study commences by introducing architecture and various applications tailored to smart cities.Then,concerns surrounding security and privacy within these applications are thoroughly explored subsequently.Following that,we delve into several research endeavors dedicated to addressing security and privacy issues within smart city applications.Finally,we emphasize our methodology and present a case study illustrating privacy and security in smart city contexts.Our proposal consists of defining an Artificial Intelligence(AI)based framework that allows:Thoroughly documenting penetration attempts and cyberattacks;promptly detecting any deviations from security standards;monitoring malicious behaviors and accurately tracing their sources;and establishing strong controls to effectively repel and prevent such threats.Experimental results using the Edge-IIoTset(Edge Industrial Internet of Things Security Evaluation Test)dataset demonstrated good accuracy.They were compared to related state-of-theart works,which highlight the relevance of our proposal. 展开更多
关键词 Smart cities digital communications CYBERSECURITY PRIVACY intrusion detection
下载PDF
AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics
3
作者 Juhwan Kim Baehoon Son +1 位作者 Jihyeon Yu Joobeom Yun 《Computers, Materials & Continua》 SCIE EI 2024年第11期3371-3393,共23页
Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the comp... Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised systems.Forensic analysts are tasked with extracting and subsequently analyzing data,termed as artifacts,from these systems to gather evidence.Therefore,forensic analysts must sift through extensive datasets to isolate pertinent evidence.However,manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive.Previous studies addressed such inefficiencies by integrating artificial intelligence(AI)technologies into digital forensics.Despite the efforts in previous studies,artifacts were analyzed without considering the nature of the data within them and failed to prove their efficiency through specific evaluations.In this study,we propose a system to prioritize suspicious artifacts from compromised systems infected with malware to facilitate efficient digital forensics.Our system introduces a double-checking method that recognizes the nature of data within target artifacts and employs algorithms ideal for anomaly detection.The key ideas of this method are:(1)prioritize suspicious artifacts and filter remaining artifacts using autoencoder and(2)further prioritize suspicious artifacts and filter remaining artifacts using logarithmic entropy.Our evaluation demonstrates that our system can identify malicious artifacts with high accuracy and that its double-checking method is more efficient than alternative approaches.Our system can significantly reduce the time required for forensic analysis and serve as a reference for future studies. 展开更多
关键词 digital forensics autoencoder logarithmic entropy PRIORITIZATION anomaly detection windows artifacts artificial intelligence
下载PDF
Utility of Droplet Digital PCR Assay for Quantitative Detection of Norovirus in Shellfish, from Production to Consumption in Guangxi, China 被引量:4
4
作者 TAN Dong Mei LYU Su Ling +7 位作者 LIU Wei ZENG Xian Ying LAN Lan QU Cong ZHUGE Shi Yang ZHONG Yan Xu XIE Yi Hong LI Xiu Gui 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2018年第10期713-720,共8页
Objective Shellfish are recognized as important vehicles of norovirus-associated gastroenteritis. The present study aimed to monitor norovirus contamination in oysters along the farm-to-fork continuum in Guangxi, a ma... Objective Shellfish are recognized as important vehicles of norovirus-associated gastroenteritis. The present study aimed to monitor norovirus contamination in oysters along the farm-to-fork continuum in Guangxi, a major oyster production area in Southwestern China. Methods Oyster samples were collected monthly from farms, markets, and restaurants, from January to December 2016. Norovirus was detected and quantified by one-step reverse transcription-droplet digital polymerase chain reaction(RT-ddPCR). Results A total of 480 oyster samples were collected and tested for norovirus genogroups I and II. Norovirus was detected in 20.7% of samples, with genogroup II predominating. No significant difference was observed in norovirus prevalence among different sampling sites. The norovirus levels varied widely, with a geometric mean of 19,300 copies/g in digestive glands. Both norovirus prevalence and viral loads showed obvious seasonality, with a strong winter bias. Conclusion This study provides a systematic analysis of norovirus contamination ‘from the farm to the fork' in Guangxi. RT-ddPCR can be a useful tool for detection and quantification of low amounts of norovirus in the presence of inhibitors found particularly in foodstuffs. This approach will contribute to the development of strategies for controlling and reducing the risk of human illness resulting from shellfish consumption. 展开更多
关键词 NOROVIRUS DROPLET digital PCR SHELLFISH Quantitative detection
下载PDF
Digital coherent detection research on Brillouin optical time domain reflectometry with simplex pulse codes 被引量:7
5
作者 郝蕴琦 叶青 +2 位作者 潘政清 蔡海文 瞿荣辉 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第11期253-256,共4页
The digital coherent detection technique has been investigated without any frequency-scanning device in the Brillouin optical time domain reflectometry (BOTDR), where the simplex pulse codes are applied in the sensi... The digital coherent detection technique has been investigated without any frequency-scanning device in the Brillouin optical time domain reflectometry (BOTDR), where the simplex pulse codes are applied in the sensing system. The time domain signal of every code sequence is collected by the data acquisition card (DAQ). A shift-averaging technique is applied in the frequency domain for the reason that the local oscillator (LO) in the coherent detection is fix-frequency deviated from the primary source. With the 31-bit simplex code, the signal-to-noise ratio (SNR) has 3.5-dB enhancement with the same single pulse traces, accordant with the theoretical analysis. The frequency fluctuation for simplex codes is 14.01 MHz less than that for a single pulse as to 4-m spatial resolution. The results are believed to be beneficial for the BOTDR performance improvement. 展开更多
关键词 Brillouin optical time domain reflectometry digital coherent detection simplex pulse codes signal-to-noise ratio
下载PDF
Application of droplet digital PCR in detection of seed-transmitted pathogen Acidovorax citrulli 被引量:2
6
作者 LU Yu ZHANG Hai-jun +6 位作者 ZHAO Zi-jing WEN Chang-long WU Ping SONG Shun-hua YU Shuan-cang Luo Lai-xin XU Xiu-lan 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2020年第2期561-569,共9页
Bacterial fruit blotch caused by Acidovorax citrulli is a serious threat to cucurbit industry worldwide.The pathogen is seedtransmitted,so seed detection to prevent distribution of contaminated seed is crucial in dise... Bacterial fruit blotch caused by Acidovorax citrulli is a serious threat to cucurbit industry worldwide.The pathogen is seedtransmitted,so seed detection to prevent distribution of contaminated seed is crucial in disease management.In this study,we adapted a quantitative real-time PCR(qPCR)assay to droplet digital PCR(ddPCR)format for A.citrulli detection by optimizing reaction conditions.The performance of ddPCR in detecting A.citrulli pure culture,DNA,infested watermelon/melon seed and commercial seed samples were compared with multiplex PCR,qPCR,and dilution plating method.The lowest concentrations detected(LCD)by ddPCR reached up to 2 fg DNA,and 102 CFU mL–1 bacterial cells,which were ten times more sensitive than those of the qPCR.When testing artificially infested watermelon and melon seed,0.1%infestation level was detectable using ddPCR and dilution plating method.The 26 positive samples were identified in 201 commercial seed samples through ddPCR,which was the highest positive number among all the methods.High detection sensitivity achieved by ddPCR demonstrated a promising technique for improving seed-transmitted pathogen detection threshold in the future. 展开更多
关键词 bacterial fruit blotch Acidovorax citrulli droplet digital PCR seed detection quantitative real-time PCR
下载PDF
Digital Signal Processing Based Real Time Vehicular Detection System 被引量:3
7
作者 杨兆选 林涛 +2 位作者 李香萍 刘春义 高健 《Transactions of Tianjin University》 EI CAS 2005年第2期119-124,共6页
Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is ... Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is presented to obtain various traffic parameters through vehicular video detection system(VVDS).VVDS exploits the algorithm based on virtual loops to detect moving vehicle in real time.This algorithm uses the background differencing method,and vehicles can be detected through luminance difference of pixels between background image and current image.Furthermore a novel technology named as spatio-temporal image sequences analysis is applied to background differencing to improve detection accuracy.Then a hardware implementation of a digital signal processing (DSP) based board is described in detail and the board can simultaneously process four-channel video from different cameras. The benefit of usage of DSP is that images of a roadway can be processed at frame rate due to DSP′s high performance.In the end,VVDS is tested on real-world scenes and experiment results show that the system is both fast and robust to the surveillance of transportation. 展开更多
关键词 intelligent transportation system vehicular detection digital signal processing loop emulation background differencing
下载PDF
Using UAVs for detection of trees from digital surface models
8
作者 Nusret Demir 《Journal of Forestry Research》 SCIE CAS CSCD 2018年第3期804-812,共9页
A difficult problem in forestry is tree inventory.In this study, a GoProHero attached to a small unmanned aerial vehicle was used to capture images of a small area covered by pinus pinea trees. Then, a digital surface... A difficult problem in forestry is tree inventory.In this study, a GoProHero attached to a small unmanned aerial vehicle was used to capture images of a small area covered by pinus pinea trees. Then, a digital surface model was generated with image matching. The elevation model representing the terrain surface, a ‘digital terrain model’,was extracted from the digital surface model using morphological filtering. Individual trees were extracted by analyzing elevation flow on the digital elevation model because the elevation reached the highest value on the tree peaks compared to the neighborhood elevation pixels. The quality of the results was assessed by comparison with reference data for correctness of the estimated number of trees. The tree heights were calculated and evaluated with ground truth dataset. The results showed 80% correctness and 90% completeness. 展开更多
关键词 Tree detection digital surface model Fish-eye camera PHOTOGRAMMETRY UAV
下载PDF
A Novel Method for Detection and Removal of Line Scratch in High Resolution Digital Film
9
作者 周磊 倪强 周源华 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第1期22-26,共5页
With increasing need of high quality movie, more and more standard resolution films are upconverted to the high-resolution films. After this operation, the defects exist in the old movie are more obvious because they ... With increasing need of high quality movie, more and more standard resolution films are upconverted to the high-resolution films. After this operation, the defects exist in the old movie are more obvious because they are enlarged in size, therefore, an efficient artifacts detection method with more precise result and lower computational complexity is in need. This paper provided a line scratch mathematical model, which derives from the Kokaram model and Bruni model, and then gave a detection method to meet the requirements of the high-resolution video application. 展开更多
关键词 digital film restoration line scratch scratch detection scratch removal
下载PDF
Fifth-order phase-sensitive detection of ultrafast polarization beats in cascade four-level system
10
作者 聂志强 李沛哲 +8 位作者 余孝军 张彦鹏 姜彤 李岭 甘琛利 左翠翠 张鹏飞 宋建平 卢克清 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第3期978-987,共10页
We study the colour-locked twin-noisy-field correlation effects in the fifth-order nonlinear susceptibility of ultrafast polarization beats in a cascade four-level system. More importantly, the fifth-order phase-sensi... We study the colour-locked twin-noisy-field correlation effects in the fifth-order nonlinear susceptibility of ultrafast polarization beats in a cascade four-level system. More importantly, the fifth-order phase-sensitive heterodyne detection of ultrafast polarization beats has been exploited. The fifth-order nonlinear optical response can be controlled and modified through the colour-locked correlation of twin noisy fields. Thus, this method with the phase dispersion information is a good way to measure the real and imaginary parts of the fifth-order nonlinear susceptibility. 展开更多
关键词 ultrafast polarization beat nonlinear susceptibility phase-sensitive detection
下载PDF
Digital Cross-Correlation Detection of Multi-Laser Beams Measuring System for Wind Field Detection
11
作者 Li-Min Zhou Ya-Dong Jiang +1 位作者 Zheng-Yu Zhang Xiao-Lin Sui 《Journal of Electronic Science and Technology》 CAS 2010年第4期366-371,共6页
A cross-correlation detection method to process backscatter signals of multi-laser beams measuring (MLBM) is presented, which can be firstly filtered by the digital filter composed of average median filter and finit... A cross-correlation detection method to process backscatter signals of multi-laser beams measuring (MLBM) is presented, which can be firstly filtered by the digital filter composed of average median filter and finite impulse response (FIR) digital filter. The processing of backscatter signals using single-pulse and three-pulse cross-correlation detection methods is depicted in detail. From calculation results, the multi-pulse cross-correlation detection could effectively improve signal-to-noise ratio (SNR). Finally, both wind velocity and direction are determined by the peak-delay method based on the correlation function which shows high measuring precision and high SNR of the MLBM system with the assistance of the digital cross- correlation detection. 展开更多
关键词 Cross-correlation detection digital filter multi-laser beams measuring system signal processing signal to noise ratio.
下载PDF
Use of the Wavelet Transform for Digital Terrain Model Edge Detection (Special Issue—Wavelet Analysis)
12
作者 Clovis Gaboardi 《Journal of Applied Mathematics and Physics》 2018年第10期1997-2005,共9页
The purpose of this work is to analyze the feasibility of using the wavelet transform in the edge detection of digital terrain models (DTM) obtained by Laser Scanner. The Haar wavelet transform and the edge detection ... The purpose of this work is to analyze the feasibility of using the wavelet transform in the edge detection of digital terrain models (DTM) obtained by Laser Scanner. The Haar wavelet transform and the edge detection method called Wavelet Transform Modulus Maxima (WTMM), both implemented in Matlab language, were used. In order to validate and verify the efficiency of WTMM, the edge detection of the same DTM was performed by the Roberts, Sobel-Feldman and Canny methods, chosen due to the wide use in the scientific community in the area of Image Processing and Remote Sensing. The comparison of the results showed superior performance of WTMM in terms of processing time. 展开更多
关键词 digital TERRAIN Model Edge detection WAVELETS TRANSFORM CANNY Roberts SOBEL Sobel-Feldman
下载PDF
Sequential Detection of Digital Watermarking
13
作者 李莉 俞玉莲 王沛 《Journal of Donghua University(English Edition)》 EI CAS 2005年第5期129-134,共6页
The paper analyzed a new watermarking detection paradigm including double detection thresholds based on sequential hypothesis testing. A joint design of watermarking encoding and detection was proposed. The paradigm h... The paper analyzed a new watermarking detection paradigm including double detection thresholds based on sequential hypothesis testing. A joint design of watermarking encoding and detection was proposed. The paradigm had good immunity to noisy signal attacks and high detection probability. Many experiments proved that the above algorithm can detect watermarks about 66% faster than popular detectors, which could have significant impact on many applications such as video watermarking detection and watermark-searching in a large database of digital contents. 展开更多
关键词 digital watermarking watermarking detection sequential testing watermarking length
下载PDF
Research on Influence of Electromagnetic Interference on X-Ray Digital Detection
14
作者 Guo Taotao Wang Dada +1 位作者 Guo Tieqiao Yu Hong 《Electricity》 2012年第5期38-43,共6页
X-ray digital imaging technology has found wide application owing to its advantages of real-time, visualization and rapid imaging. In substations the substantial electromagnetic interference has some influence on the ... X-ray digital imaging technology has found wide application owing to its advantages of real-time, visualization and rapid imaging. In substations the substantial electromagnetic interference has some influence on the live detection by the X-ray digital imaging technology, hindering the promotion of the technology in the detection of electric equipment. Based on a large number of field tests, the author carded out a series of researches on electromagnetic interference protection measures, image de-noising, and image enhancement algorithms. 展开更多
关键词 SUBSTATION live detection X-RAY digital imaging electromagnetic interference image de-noising image enhancement
下载PDF
Dual Attribute Adversarial Camouflage toward camouflaged object detection 被引量:2
15
作者 Yang Wang Zheng Fang +3 位作者 Yun-fei Zheng Zhen Yang Wen Tong Tie-yong Cao 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第4期166-175,共10页
The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some w... The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some works can fool detectors by crafting the adversarial camouflage attached to the object,leading to wrong prediction.It is hard for military operations to utilize the existing adversarial camouflage due to its conspicuous appearance.Motivated by this,this paper proposes the Dual Attribute Adversarial Camouflage(DAAC)for evading the detection by both detectors and humans.Generating DAAC includes two steps:(1)Extracting features from a specific type of scene to generate individual soldier digital camouflage;(2)Attaching the adversarial patch with scene features constraint to the individual soldier digital camouflage to generate the adversarial attribute of DAAC.The visual effects of the individual soldier digital camouflage and the adversarial patch will be improved after integrating with the scene features.Experiment results show that objects camouflaged by DAAC are well integrated with background and achieve visual concealment while remaining effective in fooling object detectors,thus evading the detections by both detectors and humans in the digital domain.This work can serve as the reference for crafting the adversarial camouflage in the physical world. 展开更多
关键词 Adversarial camouflage digital camouflage generation Visual concealment Object detection Adversarial patch
下载PDF
A Review of Machine Learning Techniques in Cyberbullying Detection 被引量:1
16
作者 Daniyar Sultan Batyrkhan Omarov +5 位作者 Zhazira Kozhamkulova Gulnur Kazbekova Laura Alimzhanova Aigul Dautbayeva Yernar Zholdassov Rustam Abdrakhmanov 《Computers, Materials & Continua》 SCIE EI 2023年第3期5625-5640,共16页
Automatic identification of cyberbullying is a problem that is gaining traction,especially in the Machine Learning areas.Not only is it complicated,but it has also become a pressing necessity,considering how social me... Automatic identification of cyberbullying is a problem that is gaining traction,especially in the Machine Learning areas.Not only is it complicated,but it has also become a pressing necessity,considering how social media has become an integral part of adolescents’lives and how serious the impacts of cyberbullying and online harassment can be,particularly among teenagers.This paper contains a systematic literature review of modern strategies,machine learning methods,and technical means for detecting cyberbullying and the aggressive command of an individual in the information space of the Internet.We undertake an in-depth review of 13 papers from four scientific databases.The article provides an overview of scientific literature to analyze the problem of cyberbullying detection from the point of view of machine learning and natural language processing.In this review,we consider a cyberbullying detection framework on social media platforms,which includes data collection,data processing,feature selection,feature extraction,and the application ofmachine learning to classify whether texts contain cyberbullying or not.This article seeks to guide future research on this topic toward a more consistent perspective with the phenomenon’s description and depiction,allowing future solutions to be more practical and effective. 展开更多
关键词 CYBERBULLYING hate speech digital drama online harassment detection classification machine learning NLP
下载PDF
Using Digital Twin to Diagnose Faults in Braiding Machinery Based on IoT
17
作者 Youping Lin Huangbin Lin Dezhi Wei 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1363-1379,共17页
The digital twin(DT)includes real-time data analytics based on the actual product or manufacturing processing parameters.Data from digital twins can predict asset maintenance requirements ahead of time.This saves mone... The digital twin(DT)includes real-time data analytics based on the actual product or manufacturing processing parameters.Data from digital twins can predict asset maintenance requirements ahead of time.This saves money by decreasing operating expenses and asset downtime,which improves company efficiency.In this paper,a digital twin in braiding machinery based on IoT(DTBM-IoT)used to diagnose faults.When an imbalance fault occurs,the system gathers experimental data.After that,the information is sent into a digital win model of the rotor system to see whether it can quantify and locate imbalance for defect detection.It is possible to anticipate asset maintenance requirements with DT technology by IoT(Internet of Things)sensors,XR(X-Ray)capabilities,and AI-powered analytics.A DT model’s appropriate design and flexibility remain difficult because of the nonlinear dynamics and unpre-dictability inherent in the degrading process of equipment.The results indicate that the DT in braiding machinery developed allows for precise diagnostic and dynamic deterioration analysis.At least there is 37%growth in efficiency over conventional approaches. 展开更多
关键词 Braiding machinery IOT digital twin defect detection rotor system
下载PDF
A Thorough Investigation on Image Forgery Detection
18
作者 Anjani Kumar Rai Subodh Srivastava 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期1489-1528,共40页
Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for... Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for authenticity and the integrity of the image drive the detection of a fabricated image.There have been cases of ownership infringements or fraudulent actions by counterfeiting multimedia files,including re-sampling or copy-moving.This work presents a high-level view of the forensics of digital images and their possible detection approaches.This work presents a thorough analysis of digital image forgery detection techniques with their steps and effectiveness.These methods have identified forgery and its type and compared it with state of the art.This work will help us to find the best forgery detection technique based on the different environments.It also shows the current issues in other methods,which can help researchers find future scope for further research in this field. 展开更多
关键词 Forgery detection digital forgery image forgery localization image segmentation image forensics multimedia security
下载PDF
Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security
19
作者 Amal H.Alharbi S.Karthick +2 位作者 K.Venkatachalam Mohamed Abouhawwash Doaa Sami Khafaga 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2773-2787,共15页
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Develop... Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Developers fuse and carry out face identification as an access authority into these applications.Still,face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized user.In the existing spoofing detection algorithm,there was some loss in the recreation of images.This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said problems.This research offers a novel Edge-Net autoencoder to select convoluted and dominant features of the input diffused structure.First,this pro-posed method is tested with the Cross-ethnicity Face Anti-spoofing(CASIA),Fetal alcohol spectrum disorders(FASD)dataset.This database has three models of attacks:distorted photographs in printed form,photographs with removed eyes portion,and video attacks.The images are taken with three different quality cameras:low,average,and high-quality real and spoofed images.An extensive experimental study was performed with CASIA-FASD,3 Diagnostic Machine Aid-Digital(DMAD)dataset that proved higher results when compared to existing algorithms. 展开更多
关键词 Image processing edge detection edge net auto-encoder face authentication digital security
下载PDF
Detecting circulating tumor material and digital pathology imaging during pancreatic cancer progression 被引量:2
20
作者 Radim Moravec Rao Divi Mukesh Verma 《World Journal of Gastrointestinal Oncology》 SCIE CAS 2017年第6期235-250,共16页
Pancreatic cancer(PC) is a leading cause of cancerrelated death worldwide. Clinical symptoms typically present late when treatment options are limited and survival expectancy is very short. Metastatic mutations are he... Pancreatic cancer(PC) is a leading cause of cancerrelated death worldwide. Clinical symptoms typically present late when treatment options are limited and survival expectancy is very short. Metastatic mutations are heterogeneous and can accumulate up to twenty years before PC diagnosis. Given such genetic diversity, detecting and managing the complex states of disease progression may be limited to imaging modalities and markers present in circulation. Recent developments in digital pathology imaging show potential for early PC detection, making a differential diagnosis, and predicting treatment sensitivity leading to long-term survival in advanced stage patients. Despite large research efforts, the only serum marker currently approved for clinical use is CA 19-9. Utility of CA 19-9 has been shown to improve when it is used in combination with PC-specific markers. Efforts are being made to develop early-screening assays that can detect tumor-derived material, present in circulation, before metastasis takes a significant course. Detection of markers that identify circulating tumor cells and tumor-derived extracellular vesicles(EVs) in biofluid samples offers a promising non-invasive method for this purpose. Circulating tumor cells exhibit varying expression of epithelial and mesenchymal markers depending on the state of tumor differentiation. This offers a possibility for monitoring disease progression using minimally invasive procedures. EVs also offer the benefit of detecting molecular cargo of tumor origin and add the potential to detect circulating vesicle markers from tumors that lack invasive properties. This review integrates recent genetic insights of PC progression with developments in digitalpathology and early detection of tumor-derived circulating material. 展开更多
关键词 Circulating tumor cells digital pathology Early detection EXOSOMES Pancreatic cancer
下载PDF
上一页 1 2 146 下一页 到第
使用帮助 返回顶部