期刊文献+
共找到7,128篇文章
< 1 2 250 >
每页显示 20 50 100
A novel medical image data protection scheme for smart healthcare system
1
作者 Mujeeb Ur Rehman Arslan Shafique +6 位作者 Muhammad Shahbaz Khan Maha Driss Wadii Boulila Yazeed Yasin Ghadi Suresh Babu Changalasetty Majed Alhaisoni Jawad Ahmad 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第4期821-836,共16页
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of ... The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of the IoMT,particularly in the context of knowledge‐based learning systems.Smart healthcare systems leverage knowledge‐based learning to become more context‐aware,adaptable,and auditable while maintain-ing the ability to learn from historical data.In smart healthcare systems,devices capture images,such as X‐rays,Magnetic Resonance Imaging.The security and integrity of these images are crucial for the databases used in knowledge‐based learning systems to foster structured decision‐making and enhance the learning abilities of AI.Moreover,in knowledge‐driven systems,the storage and transmission of HD medical images exert a burden on the limited bandwidth of the communication channel,leading to data trans-mission delays.To address the security and latency concerns,this paper presents a lightweight medical image encryption scheme utilising bit‐plane decomposition and chaos theory.The results of the experiment yield entropy,energy,and correlation values of 7.999,0.0156,and 0.0001,respectively.This validates the effectiveness of the encryption system proposed in this paper,which offers high‐quality encryption,a large key space,key sensitivity,and resistance to statistical attacks. 展开更多
关键词 data analysis medical image processing SECURITY
下载PDF
Machine Learning-based Identification of Contaminated Images in Light Curve Data Preprocessing
2
作者 Hui Li Rong-Wang Li +1 位作者 Peng Shu Yu-Qiang Li 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2024年第4期287-295,共9页
Attitude is one of the crucial parameters for space objects and plays a vital role in collision prediction and debris removal.Analyzing light curves to determine attitude is the most commonly used method.In photometri... Attitude is one of the crucial parameters for space objects and plays a vital role in collision prediction and debris removal.Analyzing light curves to determine attitude is the most commonly used method.In photometric observations,outliers may exist in the obtained light curves due to various reasons.Therefore,preprocessing is required to remove these outliers to obtain high quality light curves.Through statistical analysis,the reasons leading to outliers can be categorized into two main types:first,the brightness of the object significantly increases due to the passage of a star nearby,referred to as“stellar contamination,”and second,the brightness markedly decreases due to cloudy cover,referred to as“cloudy contamination.”The traditional approach of manually inspecting images for contamination is time-consuming and labor-intensive.However,we propose the utilization of machine learning methods as a substitute.Convolutional Neural Networks and SVMs are employed to identify cases of stellar contamination and cloudy contamination,achieving F1 scores of 1.00 and 0.98 on a test set,respectively.We also explore other machine learning methods such as ResNet-18 and Light Gradient Boosting Machine,then conduct comparative analyses of the results. 展开更多
关键词 techniques:image processing methods:data analysis light pollution
下载PDF
Robust key point descriptor for multi-spectral image matching 被引量:3
3
作者 Yueming Qin Zhiguo Cao +1 位作者 Wen Zhuo Zhenghong Yu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第4期681-687,共7页
Histogram of collinear gradient-enhanced coding (HCGEC), a robust key point descriptor for multi-spectral image matching, is proposed. The HCGEC mainly encodes rough structures within an image and suppresses detaile... Histogram of collinear gradient-enhanced coding (HCGEC), a robust key point descriptor for multi-spectral image matching, is proposed. The HCGEC mainly encodes rough structures within an image and suppresses detailed textural information, which is desirable in multi-spectral image matching. Experiments on two multi-spectral data sets demonstrate that the proposed descriptor can yield significantly better results than some state-of- the-art descriptors. 展开更多
关键词 collinear gradient-enhanced coding (CGEC) key pointdescriptor multi-spectral image matching.
下载PDF
MULTI-SPECTRAL AND HYPERSPECTRAL IMAGE FUSION USING 3-D WAVELET TRANSFORM 被引量:5
4
作者 Zhang Yifan He Mingyi 《Journal of Electronics(China)》 2007年第2期218-224,共7页
Image fusion is performed between one band of multi-spectral image and two bands of hyperspectral image to produce fused image with the same spatial resolution as source multi-spectral image and the same spectral reso... Image fusion is performed between one band of multi-spectral image and two bands of hyperspectral image to produce fused image with the same spatial resolution as source multi-spectral image and the same spectral resolution as source hyperspeetral image. According to the characteristics and 3-Dimensional (3-D) feature analysis of multi-spectral and hyperspectral image data volume, the new fusion approach using 3-D wavelet based method is proposed. This approach is composed of four major procedures: Spatial and spectral resampling, 3-D wavelet transform, wavelet coefficient integration and 3-D inverse wavelet transform. Especially, a novel method, Ratio Image Based Spectral Resampling (RIBSR)method, is proposed to accomplish data resampling in spectral domain by utilizing the property of ratio image. And a new fusion rule, Average and Substitution (A&S) rule, is employed as the fusion rule to accomplish wavelet coefficient integration. Experimental results illustrate that the fusion approach using 3-D wavelet transform can utilize both spatial and spectral characteristics of source images more adequately and produce fused image with higher quality and fewer artifacts than fusion approach using 2-D wavelet transform. It is also revealed that RIBSR method is capable of interpolating the missing data more effectively and correctly, and A&S rule can integrate coefficients of source images in 3-D wavelet domain to preserve both spatial and spectral features of source images more properly. 展开更多
关键词 image fusion 3-Dimensional (3-D) wavelet transform multi-spectral HYPERSPECTRAL
下载PDF
Application of Image Enhancement Techniques to Potential Field Data 被引量:6
5
作者 张丽莉 郝天珧 +1 位作者 吴健生 王家林 《Applied Geophysics》 SCIE CSCD 2005年第3期145-152,i0001,共9页
In this paper the application of image enhancement techniques to potential field data is briefly described and two improved enhancement methods are introduced. One method is derived from the histogram equalization tec... In this paper the application of image enhancement techniques to potential field data is briefly described and two improved enhancement methods are introduced. One method is derived from the histogram equalization technique and automatically determines the color spectra of geophysical maps. Colors can be properly distributed and visual effects and resolution can be enhanced by the method. The other method is based on the modified Radon transform and gradient calculation and is used to detect and enhance linear features in gravity and magnetic images. The method facilites the detection of line segments in the transform domain. Tests with synthetic images and real data show the methods to be effective in feature enhancement. 展开更多
关键词 image enhancement histogram equalization Radon transform and potential field data
下载PDF
Extraction of Desertification Information in Hulun Buir Based on MODIS Image Data 被引量:4
6
作者 孟翔冲 姜琦刚 +4 位作者 齐霞 王斌 吴阳春 李根军 杨佳佳 《Agricultural Science & Technology》 CAS 2012年第1期233-237,共5页
[Objective] To extract desertification information of Hulun Buir region based on MODIS image data. [Method] Based on MODIS image data with the spatial res- olution of 1 km, 5 indicators which could reflect different d... [Objective] To extract desertification information of Hulun Buir region based on MODIS image data. [Method] Based on MODIS image data with the spatial res- olution of 1 km, 5 indicators which could reflect different desertification features were selected to conduct inversion. The desertification information of Hulun Buir region was extracted by decision tree classification. [Result] The desertification area of Hu- lun Buir region is 33 862 km2, accounting for 24% of the total area, and it is mainly dominated by sandiness desertification. Though field verification and mining point validation of high-resolution interpretation data, the overall accuracy of this evaluation is above 89%. [Conclusion] Evaluation method used in this study is not only effectively for large scale regional desertification monitoring but also has a better evaluation performance. 展开更多
关键词 DESERTIFICATION MODiS image data Remote sensing Decision tree Inversion
下载PDF
Extracting Feature Bands for Damaged Rice Leaves by Planthoppers Using Multi-spectral Imaging Technology
7
作者 曹鹏飞 李宏宁 +2 位作者 杨卫平 林立波 冯洁 《Agricultural Science & Technology》 CAS 2013年第11期1642-1645,1669,共5页
[Objective] The aim of this study was to extract effective feature bands of damaged rice leaves by planthoppers to make identification and classification rapidly from great amounts of imaging spectral data. [Method] T... [Objective] The aim of this study was to extract effective feature bands of damaged rice leaves by planthoppers to make identification and classification rapidly from great amounts of imaging spectral data. [Method] The experiment, using multi-spectral imaging system, acquired the multi-spectral images of damaged rice leaves from band 400 to 720 nm by interval of 5 nm. [Result] According to the principle of band index, it was calculated that the bands at 515, 510, 710, 555, 630, 535, 505, 530 and 595 nm were having high band index value with rich information and little correlation. Furthermore, the experiment used two classification methods and calcu-lated the classification accuracy higher than 90.00% for feature bands and ful bands of damaged rice leaves by planthoppers respectively. [Conclusion] It can be con-cluded that these bands can be considered as effective feature bands to identify damaged rice leaves by planthoppers quickly from a large scale of crops. 展开更多
关键词 Feature bands multi-spectral imaging Damaged rice leaves Planthop-pers Classification accuracy
下载PDF
Road Traffic Monitoring from Aerial Images Using Template Matching and Invariant Features 被引量:1
8
作者 Asifa Mehmood Qureshi Naif Al Mudawi +2 位作者 Mohammed Alonazi Samia Allaoua Chelloug Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2024年第3期3683-3701,共19页
Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibilit... Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area.To this end,different models have shown the ability to recognize and track vehicles.However,these methods are not mature enough to produce accurate results in complex road scenes.Therefore,this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image bursts.The extracted frames were converted to grayscale,followed by the application of a georeferencing algorithm to embed coordinate information into the images.The masking technique eliminated irrelevant data and reduced the computational cost of the overall monitoring system.Next,Sobel edge detection combined with Canny edge detection and Hough line transform has been applied for noise reduction.After preprocessing,the blob detection algorithm helped detect the vehicles.Vehicles of varying sizes have been detected by implementing a dynamic thresholding scheme.Detection was done on the first image of every burst.Then,to track vehicles,the model of each vehicle was made to find its matches in the succeeding images using the template matching algorithm.To further improve the tracking accuracy by incorporating motion information,Scale Invariant Feature Transform(SIFT)features have been used to find the best possible match among multiple matches.An accuracy rate of 87%for detection and 80%accuracy for tracking in the A1 Motorway Netherland dataset has been achieved.For the Vehicle Aerial Imaging from Drone(VAID)dataset,an accuracy rate of 86%for detection and 78%accuracy for tracking has been achieved. 展开更多
关键词 Unmanned Aerial Vehicles(UAV) aerial images dataSET object detection object tracking data elimination template matching blob detection SIFT VAID
下载PDF
Reservoir heterogeneity and fracture parameter determination using electrical image logs and petrophysical data(a case study, carbonate Asmari Formation, Zagros Basin, SW Iran) 被引量:11
9
作者 Ghasem Aghli Reza Moussavi-Harami Ruhangiz Mohammadian 《Petroleum Science》 SCIE CAS CSCD 2020年第1期51-69,共19页
Assessment of reservoir and fracture parameters is necessary to optimize oil production,especially in heterogeneous reservoirs.Core and image logs are regarded as two of the best methods for this aim.However,due to co... Assessment of reservoir and fracture parameters is necessary to optimize oil production,especially in heterogeneous reservoirs.Core and image logs are regarded as two of the best methods for this aim.However,due to core limitations,using image log is considered as the best method.This study aims to use electrical image logs in the carbonate Asmari Formation reservoir in Zagros Basin,SW Iran,in order to evaluate natural fractures,porosity system,permeability profile and heterogeneity index and accordingly compare the results with core and well data.The results indicated that the electrical image logs are reliable for evaluating fracture and reservoir parameters,when there is no core available for a well.Based on the results from formation micro-imager(FMI)and electrical micro-imager(EMI),Asmari was recognized as a completely fractured reservoir in studied field and the reservoir parameters are mainly controlled by fractures.Furthermore,core and image logs indicated that the secondary porosity varies from 0%to 10%.The permeability indicator indicates that zones 3 and 5 have higher permeability index.Image log permeability index shows a very reasonable permeability profile after scaling against core and modular dynamics tester mobility,mud loss and production index which vary between 1 and 1000 md.In addition,no relationship was observed between core porosity and permeability,while the permeability relied heavily on fracture aperture.Therefore,fracture aperture was considered as the most important parameter for the determination of permeability.Sudden changes were also observed at zones 1-1 and 5 in the permeability trend,due to the high fracture aperture.It can be concluded that the electrical image logs(FMI and EMI)are usable for evaluating both reservoir and fracture parameters in wells with no core data in the Zagros Basin,SW Iran. 展开更多
关键词 FMI and EMI image LOGS Porosity and permeability FRACTURES Core data Heterogeneity index
下载PDF
Empirical data decomposition and its applications in image compression 被引量:2
10
作者 Deng Jiaxian Wu Xiaoqin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期164-170,共7页
A nonlinear data analysis algorithm, namely empirical data decomposition (EDD) is proposed, which can perform adaptive analysis of observed data. Analysis filter, which is not a linear constant coefficient filter, i... A nonlinear data analysis algorithm, namely empirical data decomposition (EDD) is proposed, which can perform adaptive analysis of observed data. Analysis filter, which is not a linear constant coefficient filter, is automatically determined by observed data, and is able to implement multi-resolution analysis as wavelet transform. The algorithm is suitable for analyzing non-stationary data and can effectively wipe off the relevance of observed data. Then through discussing the applications of EDD in image compression, the paper presents a 2-dimension data decomposition framework and makes some modifications of contexts used by Embedded Block Coding with Optimized Truncation (EBCOT) . Simulation results show that EDD is more suitable for non-stationary image data compression. 展开更多
关键词 image processing image compression Empirical data decomposition NON-STATIONARY NONLINEAR data decomposition framework
下载PDF
A Systematic Literature Review of Machine Learning and Deep Learning Approaches for Spectral Image Classification in Agricultural Applications Using Aerial Photography
11
作者 Usman Khan Muhammad Khalid Khan +4 位作者 Muhammad Ayub Latif Muhammad Naveed Muhammad Mansoor Alam Salman A.Khan Mazliham Mohd Su’ud 《Computers, Materials & Continua》 SCIE EI 2024年第3期2967-3000,共34页
Recently,there has been a notable surge of interest in scientific research regarding spectral images.The potential of these images to revolutionize the digital photography industry,like aerial photography through Unma... Recently,there has been a notable surge of interest in scientific research regarding spectral images.The potential of these images to revolutionize the digital photography industry,like aerial photography through Unmanned Aerial Vehicles(UAVs),has captured considerable attention.One encouraging aspect is their combination with machine learning and deep learning algorithms,which have demonstrated remarkable outcomes in image classification.As a result of this powerful amalgamation,the adoption of spectral images has experienced exponential growth across various domains,with agriculture being one of the prominent beneficiaries.This paper presents an extensive survey encompassing multispectral and hyperspectral images,focusing on their applications for classification challenges in diverse agricultural areas,including plants,grains,fruits,and vegetables.By meticulously examining primary studies,we delve into the specific agricultural domains where multispectral and hyperspectral images have found practical use.Additionally,our attention is directed towards utilizing machine learning techniques for effectively classifying hyperspectral images within the agricultural context.The findings of our investigation reveal that deep learning and support vector machines have emerged as widely employed methods for hyperspectral image classification in agriculture.Nevertheless,we also shed light on the various issues and limitations of working with spectral images.This comprehensive analysis aims to provide valuable insights into the current state of spectral imaging in agriculture and its potential for future advancements. 展开更多
关键词 Machine learning deep learning unmanned aerial vehicles multi-spectral images image recognition object detection hyperspectral images aerial photography
下载PDF
Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation 被引量:4
12
作者 Qun Mo Heng Yao +2 位作者 Fang Cao Zheng Chang Chuan Qin 《Computers, Materials & Continua》 SCIE EI 2019年第4期119-133,共15页
Recently,reversible data hiding in encrypted image(RDHEI)has attracted extensive attention,which can be used in secure cloud computing and privacy protection effectively.In this paper,a novel RDHEI scheme based on blo... Recently,reversible data hiding in encrypted image(RDHEI)has attracted extensive attention,which can be used in secure cloud computing and privacy protection effectively.In this paper,a novel RDHEI scheme based on block classification and permutation is proposed.Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively.After block classification,content owner utilizes a specific encryption method,including stream cipher encryption and block permutation to protect image content securely.For the encrypted image,data hider embeds additional secret information in the most significant bits(MSB)of the encrypted pixels in smooth blocks and the final marked image can be obtained.At the receiver side,secret data will be extracted correctly with data-hiding key.When receiver only has encryption key,after stream cipher decryption,block scrambling decryption and MSB error prediction with threshold,decrypted image will be achieved.When data hiding key and encryption key are both obtained,receiver can find the smooth and non-smooth blocks correctly and MSB in smooth blocks will be predicted correctly,hence,receiver can recover marked image losslessly.Experimental results demonstrate that our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes. 展开更多
关键词 Reversible data hiding image encryption image recovery
下载PDF
A Comprehensive Image Processing Framework for Early Diagnosis of Diabetic Retinopathy
13
作者 Kusum Yadav Yasser Alharbi +6 位作者 Eissa Jaber Alreshidi Abdulrahman Alreshidi Anuj Kumar Jain Anurag Jain Kamal Kumar Sachin Sharma Brij BGupta 《Computers, Materials & Continua》 SCIE EI 2024年第11期2665-2683,共19页
In today’s world,image processing techniques play a crucial role in the prognosis and diagnosis of various diseases due to the development of several precise and accurate methods for medical images.Automated analysis... In today’s world,image processing techniques play a crucial role in the prognosis and diagnosis of various diseases due to the development of several precise and accurate methods for medical images.Automated analysis of medical images is essential for doctors,as manual investigation often leads to inter-observer variability.This research aims to enhance healthcare by enabling the early detection of diabetic retinopathy through an efficient image processing framework.The proposed hybridized method combines Modified Inertia Weight Particle Swarm Optimization(MIWPSO)and Fuzzy C-Means clustering(FCM)algorithms.Traditional FCM does not incorporate spatial neighborhood features,making it highly sensitive to noise,which significantly affects segmentation output.Our method incorporates a modified FCM that includes spatial functions in the fuzzy membership matrix to eliminate noise.The results demonstrate that the proposed FCM-MIWPSO method achieves highly precise and accurate medical image segmentation.Furthermore,segmented images are classified as benign or malignant using the Decision Tree-Based Temporal Association Rule(DT-TAR)Algorithm.Comparative analysis with existing state-of-the-art models indicates that the proposed FCM-MIWPSO segmentation technique achieves a remarkable accuracy of 98.42%on the dataset,highlighting its significant impact on improving diagnostic capabilities in medical imaging. 展开更多
关键词 image processing biological data PSO Fuzzy C-Means(FCM)
下载PDF
Multimodality Medical Image Fusion Based on Pixel Significance with Edge-Preserving Processing for Clinical Applications
14
作者 Bhawna Goyal Ayush Dogra +4 位作者 Dawa Chyophel Lepcha Rajesh Singh Hemant Sharma Ahmed Alkhayyat Manob Jyoti Saikia 《Computers, Materials & Continua》 SCIE EI 2024年第3期4317-4342,共26页
Multimodal medical image fusion has attained immense popularity in recent years due to its robust technology for clinical diagnosis.It fuses multiple images into a single image to improve the quality of images by reta... Multimodal medical image fusion has attained immense popularity in recent years due to its robust technology for clinical diagnosis.It fuses multiple images into a single image to improve the quality of images by retaining significant information and aiding diagnostic practitioners in diagnosing and treating many diseases.However,recent image fusion techniques have encountered several challenges,including fusion artifacts,algorithm complexity,and high computing costs.To solve these problems,this study presents a novel medical image fusion strategy by combining the benefits of pixel significance with edge-preserving processing to achieve the best fusion performance.First,the method employs a cross-bilateral filter(CBF)that utilizes one image to determine the kernel and the other for filtering,and vice versa,by considering both geometric closeness and the gray-level similarities of neighboring pixels of the images without smoothing edges.The outputs of CBF are then subtracted from the original images to obtain detailed images.It further proposes to use edge-preserving processing that combines linear lowpass filtering with a non-linear technique that enables the selection of relevant regions in detailed images while maintaining structural properties.These regions are selected using morphologically processed linear filter residuals to identify the significant regions with high-amplitude edges and adequate size.The outputs of low-pass filtering are fused with meaningfully restored regions to reconstruct the original shape of the edges.In addition,weight computations are performed using these reconstructed images,and these weights are then fused with the original input images to produce a final fusion result by estimating the strength of horizontal and vertical details.Numerous standard quality evaluation metrics with complementary properties are used for comparison with existing,well-known algorithms objectively to validate the fusion results.Experimental results from the proposed research article exhibit superior performance compared to other competing techniques in the case of both qualitative and quantitative evaluation.In addition,the proposed method advocates less computational complexity and execution time while improving diagnostic computing accuracy.Nevertheless,due to the lower complexity of the fusion algorithm,the efficiency of fusion methods is high in practical applications.The results reveal that the proposed method exceeds the latest state-of-the-art methods in terms of providing detailed information,edge contour,and overall contrast. 展开更多
关键词 image fusion fractal data analysis BIOMEDICAL DISEASES research multiresolution analysis numerical analysis
下载PDF
A Review on the Recent Trends of Image Steganography for VANET Applications
15
作者 Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第3期2865-2892,共28页
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w... Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods. 展开更多
关键词 STEGANOGRAPHY image steganography image steganography techniques information exchange data embedding and extracting vehicular ad hoc network(VANET) transportation system
下载PDF
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism
16
作者 Nannan Wu Xianyi Chen +1 位作者 James Msughter Adeke Junjie Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第3期3001-3019,共19页
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks s... Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks self-adaptability,information leakage,or weak concealment.To address these issues,this study proposes a universal and adaptable image-hiding method.First,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image domain.Second,to improve perceived human similarity,perceptual loss is incorporated into the training process.The experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality output.Furthermore,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at 0.0001.Moreover,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks. 展开更多
关键词 Deep image hiding attention mechanism privacy protection data security visual quality
下载PDF
High Capacity Data Hiding in Encrypted Image Based on Compressive Sensing for Nonequivalent Resources 被引量:2
17
作者 Di Xiao Jia Liang +2 位作者 Qingqing Ma Yanping Xiang Yushu Zhang 《Computers, Materials & Continua》 SCIE EI 2019年第1期1-13,共13页
To fulfill the requirements of data security in environments with nonequivalent resources,a high capacity data hiding scheme in encrypted image based on compressive sensing(CS)is proposed by fully utilizing the adapta... To fulfill the requirements of data security in environments with nonequivalent resources,a high capacity data hiding scheme in encrypted image based on compressive sensing(CS)is proposed by fully utilizing the adaptability of CS to nonequivalent resources.The original image is divided into two parts:one part is encrypted with traditional stream cipher;the other part is turned to the prediction error and then encrypted based on CS to vacate room simultaneously.The collected non-image data is firstly encrypted with simple stream cipher.For data security management,the encrypted non-image data is then embedded into the encrypted image,and the scrambling operation is used to further improve security.Finally,the original image and non-image data can be separably recovered and extracted according to the request from the valid users with different access rights.Experimental results demonstrate that the proposed scheme outperforms other data hiding methods based on CS,and is more suitable for nonequivalent resources. 展开更多
关键词 COMPRESSIVE SENSING encrypted image data hiding PREDICTION ERROR nonequivalent RESOURCES
下载PDF
Image reconstruction for cone-beam computed tomography using total p-variation plus Kullback-Leibler data divergence 被引量:1
18
作者 蔡爱龙 李磊 +4 位作者 王林元 闫镔 郑治中 张瀚铭 胡国恩 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第7期461-473,共13页
Accurate reconstruction from a reduced data set is highly essential for computed tomography in fast and/or low dose imaging applications. Conventional total variation(TV)-based algorithms apply the L1 norm-based pen... Accurate reconstruction from a reduced data set is highly essential for computed tomography in fast and/or low dose imaging applications. Conventional total variation(TV)-based algorithms apply the L1 norm-based penalties, which are not as efficient as Lp(0〈p〈1) quasi-norm-based penalties. TV with a p-th power-based norm can serve as a feasible alternative of the conventional TV, which is referred to as total p-variation(TpV). This paper proposes a TpV-based reconstruction model and develops an efficient algorithm. The total p-variation and Kullback-Leibler(KL) data divergence, which has better noise suppression capability compared with the often-used quadratic term, are combined to build the reconstruction model. The proposed algorithm is derived by the alternating direction method(ADM) which offers a stable, efficient, and easily coded implementation. We apply the proposed method in the reconstructions from very few views of projections(7 views evenly acquired within 180°). The images reconstructed by the new method show clearer edges and higher numerical accuracy than the conventional TV method. Both the simulations and real CT data experiments indicate that the proposed method may be promising for practical applications. 展开更多
关键词 image reconstruction total p-variation minimization Kullback-Leibler data divergence p-shrinkage mapping
下载PDF
Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment 被引量:2
19
作者 Mahmoud Ragab Samah Alshehri +3 位作者 Hani A.Alhadrami Faris Kateb Ehab Bahaudien Ashary SAbdel-khalek 《Computers, Materials & Continua》 SCIE EI 2022年第7期1323-1338,共16页
Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret data.Therefore,security data becomes a crucial issue in IIoT communication w... Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret data.Therefore,security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time.Practically,AI techniques can be utilized to design image steganographic techniques in IIoT.In addition,encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access.In order to accomplish secure data transmission in IIoT environment,this study presents novel encryption with image steganography based data hiding technique(EISDHT)for IIoT environment.The proposed EIS-DHT technique involves a new quantum black widow optimization(QBWO)to competently choose the pixel values for hiding secrete data in the cover image.In addition,the multi-level discrete wavelet transform(DWT)based transformation process takes place.Besides,the secret image is divided into three R,G,and B bands which are then individually encrypted using Blowfish,Twofish,and Lorenz Hyperchaotic System.At last,the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image.In order to validate the enhanced data hiding performance of the EIS-DHT technique,a set of simulation analyses take place and the results are inspected interms of different measures.The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security. 展开更多
关键词 IIoT SECURITY data hiding technique image steganography ENCRYPTION secure communication
下载PDF
Principle and realization method of tunnel deformation detection based on image recognition and data transmission technology 被引量:3
20
作者 Xiong Xiaolei Gao Song +2 位作者 Chen Haiyan Zhou Qicai He Ziqiang 《Engineering Sciences》 EI 2010年第4期23-25,共3页
To detect the deformation of the tunnel structure based on image sensor networks is the advanced study and application of spatial sensor technology. For the vertical settlement of metro tunnel caused by internal and e... To detect the deformation of the tunnel structure based on image sensor networks is the advanced study and application of spatial sensor technology. For the vertical settlement of metro tunnel caused by internal and external stress after its long period operation, the overall scheme and measuring principle of tunnel deformation detection system is in- troduced. The image data acquisition and processing of detection target are achieved by the cooperative work of image sensor, ARM embedded system. RS485 communication achieves the data transmission between ARM memory and host computer. The database system in station platform analyses the detection data and obtains the deformation state of tunnel inner wall, which makes it possible to early-warn the tunnel deformation and take preventive measures in time. 展开更多
关键词 image sensor deformation detection image acquisition and processing data transmission
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部