Search scope:
排序: Display mode:
An improved ROF denoising model based on time-fractional derivative Research Articles
Xing-ran Liao,xrliao_scu@163.com
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6, Pages 809-962 doi: 10.1631/FITEE.2000067
Keywords: 改进ROF去噪模型;时间分数阶导数;Caputo导数;图像去噪
Subpixel image reconstruction and denoising based on complex wavelet
Zhang Zhi,Wei Zhihui,Xia Deshen
Strategic Study of CAE 2008, Volume 10, Issue 11, Pages 76-81
Composing superresolution of the remote sensing images can remedy the deficiency of the remote sensor. However, precision of the common interpolations are not high. The paper analyzes the subpixel theory of the remote sensing image and interpolates two images offsetting subpixel in order to reconstruct high resolution image. The algorithm of adaptive threshold wavelet denoising based inter-scale is used. Experiment results show this algorithm is better than common methods.
Keywords: subpixel complex wavelet adaptive threshold reconstruction denosing
Efficientmesh denoising via robust normal filtering and alternate vertex updating Article
Tao LI, Jun WANG, Hao LIU, Li-gang LIU
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11, Pages 1828-1842 doi: 10.1631/FITEE.1601229
Keywords: Mesh denoising Guided normal filtering Alternate vertex updating Corner-aware neighborhoods
Adaptive Wavelet Thresholding Denoising Used in Gravitational Signal Processing
Zhao Liye,Zhou Bailing,Li Kunyu
Strategic Study of CAE 2006, Volume 8, Issue 3, Pages 49-52
The theory of wavelet thresholding denoising is analyzed and applied to process the data measured by gravimeter in order to effectively alleviate the effect of different noise in high precise gravitational system. The signal to noise ration (SNR) is used as the index for evaluating the performance of the data processing methods. Theoretical analysis and emulation experiments indicate that wavelet thresholding denoising, adaptive wavelet thresholding denoising and adaptive Kalman filtering are all effective in alleviating the effects of different noise, but the performance of adaptive wavelet thresholding denoising is best.
Keywords: gravimeter signal processing wavelet transform adaptive wavelet threshold adaptive Kalman filering
The application of advanced threshold denoising tothe MMW target radiation signal
Fan Qinghui,Li Xingguo
Strategic Study of CAE 2008, Volume 10, Issue 7, Pages 153-157
In this paper based on the characteristics of millimeter wave radiation signal for wavelet transform, non-negative wavelet coefficient is used as the wavelet coefficient of the signal. For a given threshold value, the wavelet coefficient which is smaller than the threshold is set zero and the wavelet coefficient which is larger than the threshold is set the difference between the coefficient and a constant a.The method for valuing a is inferred by the variance function of signal, and the experiments show that it has good ability of removing the noise in MMW target radiation signal.
Keywords: The application of advanced threshold denoising tothe MMW target radiation signal
Accelerated haze removal for a single image by dark channel prior Research Articles
Bo-xuan YUE, Kang-ling LIU, Zi-yang WANG, Jun LIANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8, Pages 1109-1118 doi: 10.1631/FITEE.1700148
Keywords: Haze removal Dark channel prior Hazy image model Bilateral filtering
De-scattering and edge-enhancement algorithms for underwater image restoration Research Papers
Pan-wang PAN, Fei YUAN, En CHENG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6, Pages 862-871 doi: 10.1631/FITEE.1700744
Image restoration is a critical procedure for underwater images, which suffer from serious color deviation and edge blurring. Restoration can be divided into two stages: de-scattering and edge enhancement. First, we introduce a multi-scale iterative framework for underwater image de-scattering, where a convolutional neural network is used to estimate the transmission map and is followed by an adaptive bilateral filter to refine the estimated results. Since there is no available dataset to train the network, a dataset which includes 2000 underwater images is collected to obtain the synthetic data. Second, a strategy based on white balance is proposed to remove color casts of underwater images. Finally, images are converted to a special transform domain for denoising and enhancing the edge using the non-subsampled contourlet transform. Experimental results show that the proposed method significantly outperforms state-of-the-art methods both qualitatively and quantitatively.
Keywords: Image de-scattering Edge enhancement Convolutional neural network Non-subsampled contourlet transform
Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation Research Articles
Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7, Pages 946-963 doi: 10.1631/FITEE.1700667
This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation. The principal objective of the presented scheme is to simultaneously meet all the four requirements (robustness, security, imperceptibility, and capacity) of a good watermarking scheme. The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet. To do so, different approaches are combined in a way that the four requirements are achieved. For instance, to obtain imperceptibility, the three color channels (red, green, and blue) are de-correlated using principal component analysis, and the first principal component (de-correlated red channel) is chosen for watermark embedding. Afterwards, to achieve robustness, the de-correlated channel is decomposed using a discrete wavelet transform (DWT), and the approximate band (the other three bands are kept intact to preserve the edge information) is further decomposed into distinct blocks. The random blocks are chosen based on a random generated key. The random selected blocks are further broken down into singular values and vectors. Based on the mutual dependency on singular values and vectors’ matrices, the values are modified depending on the watermarking bits, and their locations are saved and used as another key, required when the watermark is to be extracted. Consequently, two-level authentication levels ensure the security, and using both singular values and vectors increases the capacity of the presented scheme. Moreover, the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme. Finally, to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility (peak signal-to-noise ratio and structural similarity index), security (with numerous fake keys), robustness (normalized correlation and bit error rate), and capacity, the Gonzalez and Kodak datasets are used. The comparison shows significant improvement of the proposed scheme over existing schemes.
Keywords: Copyright protection Data hiding Multi-resolution decomposition De-correlation Security
Mouse Oocyte Enucleation with Surface Tension Assisted Method
Meng Qinggang,Zhu Shien,Zeng Shenming,Zhang Zhongcheng
Strategic Study of CAE 2001, Volume 3, Issue 11, Pages 65-69
In the present experiment a new simple method-Surface Tension Aided (STA)- for mouse oocyte enucleation is employed and is compared with three other ones. In method STA, the chromosome spindle was squeezed out by the surface tension of the drop edge with the help of micropipette through a slit made in advance in zona pellucida. In method A, the nucleus was aspirated out through a plat end, 25 μm micropipette via the slit. In method B, the nucleus was aspirated out through a 10μm micropipette directly. In method C, the nucleus was assumed just under the first polar body and the enucleating procedure was carried out by aspirated one third of cytoplasm beneath the polarbody. The manipulation time in method A (3 min/oocyte) was significantly longer than that in method STA (1.33min/oocyte), method B (1.30 min/oocyte) and method C (1.41 min/ oocyte) ; The cytoplasm loss in method C (28.4% ) was significantly higher than those in the other three methods. In methods STA, A and B, very small amount (approximately 5% ) of cytoplasm was lost. The accuracy rate of method C (35.3%) was significantly lower than those in the other three methods, the accuracy rate of method STA, A and B was above 95 % and there is no significant differences among these methods. Some of the cytoplasts produced by STA were used for mouse ear fibroblast cell nuclear transfer by electrofusion. Majority (76.1%) of the cell-cytoplast pairs fused to form reconstructed embryos, 85.4 % of reconstituted embryos developed to form pronuclei and 49.4% of them clove to form 2-cell embryos.
Keywords: surface tension assisted enucleation oocyte mouse
Image Engineering and Its Research Status in China
Zhang Yujin
Strategic Study of CAE 2000, Volume 2, Issue 8, Pages 91-94
This paper provides a well-regulated explanation of the definition as well as contents of image engineering, a classification of the theories of image engineering and the applications of image technology. In addition, a comprehensive survey on important Chinese publications about image engineering in the past five years is carried out. An analysis and a discussion of the statistics made on the classification results are also presented. This work shows a general and up-to-date picture of the current status, progress trends and application areas of image engineering in China. It also supplies useful information for readers doing research and/or application works in this field, and provides a helpful reference for editors of journals and potential authors of papers.
Keywords: image engineering publication survey
High-payload completely reversible data hiding in encrypted images by an interpolation technique Article
Di XIAO, Ying WANG, Tao XIANG, Sen BAI
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11, Pages 1732-1743 doi: 10.1631/FITEE.1601067
Keywords: Encrypted image Data hiding Image recovery Real reversibility Interpolation
Decoupling methods of MIMO antenna arrays for 5G applications: a review Review Articles
Xiao-xi ZHANG, Ai-di REN, Ying LIU
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 1, Pages 62-71 doi: 10.1631/FITEE.1900466
Keywords: MIMO array 5G smartphone Decoupling methods
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Research Article
Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 1, Pages 88-103 doi: 10.1631/FITEE.2200118
Keywords: Image secret sharing Shadow image authentication Public key Pixel expansion Lossless decoding
Dual collaboration for decentralized multi-source domain adaptation Research Article
Yikang WEI, Yahong HAN
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 12, Pages 1780-1794 doi: 10.1631/FITEE.2200284
Keywords: Multi-source domain adaptation Data decentralization Domain shift Negative transfer
Recent Advances in Passive Digital Image Security Forensics: A Brief Review Review
Xiang Lin, Jian-Hua Li, Shi-Lin Wang, Alan-Wee-Chung Liew, Feng Cheng, Xiao-Sa Huang
Engineering 2018, Volume 4, Issue 1, Pages 29-39 doi: 10.1016/j.eng.2018.02.008
With the development of sophisticated image editing and manipulation tools, the originality and authenticity of a digital image is usually hard to determine visually. In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade. Compared with active forensics approaches that require embedding additional information, passive forensics approaches are more popular due to their wider application scenario, and have attracted increasing academic and industrial research interests. Generally speaking, passive digital image forensics detects image forgeries based on the fact that there are certain intrinsic patterns in the original image left during image acquisition or storage, or specific patterns in image forgeries left during the image storage or editing. By analyzing the above patterns, the originality of an image can be authenticated. In this paper, a brief review on passive digital image forensic methods is presented in order to provide a comprehensive introduction on recent advances in this rapidly developing research area. These forensics approaches are divided into three categories based on the various kinds of traces they can be used to track—that is, traces left in image acquisition, traces left in image storage, and traces left in image editing. For each category, the forensics scenario, the underlying rationale, and state-of-the-art methodologies are elaborated. Moreover, the major limitations of the current image forensics approaches are discussed in order to point out some possible research directions or focuses in these areas.
Keywords: Digital image forensics Image-tampering detection Multimedia security
Title Author Date Type Operation
An improved ROF denoising model based on time-fractional derivative
Xing-ran Liao,xrliao_scu@163.com
Journal Article
Subpixel image reconstruction and denoising based on complex wavelet
Zhang Zhi,Wei Zhihui,Xia Deshen
Journal Article
Efficientmesh denoising via robust normal filtering and alternate vertex updating
Tao LI, Jun WANG, Hao LIU, Li-gang LIU
Journal Article
Adaptive Wavelet Thresholding Denoising Used in Gravitational Signal Processing
Zhao Liye,Zhou Bailing,Li Kunyu
Journal Article
The application of advanced threshold denoising tothe MMW target radiation signal
Fan Qinghui,Li Xingguo
Journal Article
Accelerated haze removal for a single image by dark channel prior
Bo-xuan YUE, Kang-ling LIU, Zi-yang WANG, Jun LIANG
Journal Article
De-scattering and edge-enhancement algorithms for underwater image restoration
Pan-wang PAN, Fei YUAN, En CHENG
Journal Article
Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation
Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON
Journal Article
Mouse Oocyte Enucleation with Surface Tension Assisted Method
Meng Qinggang,Zhu Shien,Zeng Shenming,Zhang Zhongcheng
Journal Article
High-payload completely reversible data hiding in encrypted images by an interpolation technique
Di XIAO, Ying WANG, Tao XIANG, Sen BAI
Journal Article
Decoupling methods of MIMO antenna arrays for 5G applications: a review
Xiao-xi ZHANG, Ai-di REN, Ying LIU
Journal Article
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com
Journal Article
Dual collaboration for decentralized multi-source domain adaptation
Yikang WEI, Yahong HAN
Journal Article