Resource Type

Journal Article 143

Year

2023 9

2022 22

2021 8

2020 16

2019 16

2018 10

2017 11

2016 8

2015 8

2014 3

2013 1

2012 4

2011 1

2010 1

2009 2

2008 3

2007 4

2006 5

2005 3

2004 3

open ︾

Keywords

digital image correlation 7

Deep learning 4

Compressive sensing 2

Dictionary learning 2

Ensemble learning 2

Feature extraction 2

High-speed railway 2

Image segmentation 2

deep learning 2

2D modeling 1

3D human body 1

3D imaging 1

3D printing 1

5G 1

802.11i 1

Eospalax baileyi 1

Panthera pardus 1

AF/PSTM 1

Abstract thinking 1

open ︾

Search scope:

排序: Display mode:

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Research Article

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 1,   Pages 88-103 doi: 10.1631/FITEE.2200118

Abstract: generally includes shadow image detection and identification, and plays an important role in ISS.image mainly during the decoding phase, also known as unidirectional authentication.The authentication of the shadow image in the distributing (encoding) phase is also important for thethe received shadow image with his/her private key., the dealer can losslessly decode the secret image with any k or more shadow images.

Keywords: Image secret sharing     Shadow image authentication     Public key     Pixel expansion     Lossless decoding    

A lightweight authentication scheme with user untraceability

Kuo-Hui YEH

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 4,   Pages 259-271 doi: 10.1631/FITEE.1400232

Abstract: To guarantee robust security and computational efficiency for service retrieval, a variety of authenticationRecently, Chang (2014) introduced a formally provable secure authentication protocol with the propertyA security enhanced authentication scheme is proposed to eliminate all identified weaknesses.

Keywords: Authentication     Privacy     Security     Smart card     Untraceability    

Smog Casts a Shadow on Solar Power

Jane Palmer

Engineering 2019, Volume 5, Issue 6,   Pages 989-990 doi: 10.1016/j.eng.2019.10.009

Turbidity-adaptive underwater image enhancement method using image fusion

Frontiers of Mechanical Engineering 2022, Volume 17, Issue 3, doi: 10.1007/s11465-021-0669-8

Abstract: In this paper, we propose a turbidity-adaptive underwater image enhancement method.Based on the detection result, different image enhancement strategies are designed to deal with the problemThe proposed method is verified by an underwater image dataset captured in real underwater environmentThe result is evaluated by image metrics including structure similarity index measure, underwater colorimage quality evaluation metric, and speeded-up robust features.

Keywords: turbidity     underwater image enhancement     image fusion     underwater robots     visibility    

Amethod of shadowpuppet figure modeling and animation

Xiao-fang HUANG,Shou-qian SUN,Ke-jun ZHANG,Tian-ning XU,Jian-feng WU,Bin ZHU

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 5,   Pages 367-379 doi: 10.1631/FITEE.1400351

Abstract: To promote the development of the intangible cultural heritage of the world, shadow play, many studieshave focused on shadow puppet modeling and interaction.Most of the shadow puppet figures are still imaginary, spread by ancients, or carved and painted by shadowThis study proposes an algorithm to transform 3D human models to 2D puppet figures for shadow puppetsExperiment proves that more realistic and attractive figures and animations of the shadow puppet can

Keywords: Shadow play     Shadow puppet figure     3D human body     Data processing     2D modeling    

Gradient-based compressive image fusion

Yang CHEN,Zheng QIN

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 3,   Pages 227-237 doi: 10.1631/FITEE.1400217

Abstract: We present a novel image fusion scheme based on gradient and scrambled block Hadamard ensemble (SBHE)In the fusion phase, the image gradient is calculated to reflect the abundance of its contour informationBy compositing the gradient of each image, gradient-based weights are obtained, with which compressiveFinally, inverse transformation is applied to the coefficients derived from fusion, and the fused imageIn addition, different image fusion application scenarios are applied to explore the scenario adaptability

Keywords: Compressive sensing (CS)     Image fusion     Gradient-based image fusion     CS-based image fusion    

Edge detection of steel plates at high temperature using image measurement

Qiong Zhou, Qi An

Frontiers of Mechanical Engineering 2009, Volume 4, Issue 1,   Pages 77-82 doi: 10.1007/s11465-009-0013-1

Abstract: An edge detection method for the measurement of steel plate’s thermal expansion is proposed in this paper, where the shrinkage of a steel plate is measured when temperature drops. First, images are picked up by an imaging system; a method of regional edge detection based on grayscales’ sudden change is then applied to detect the edges of the steel plate; finally, pixel coordinates of the edge position are transformed to physical coordinates through calibration parameters. The experiment shows that the real-time, high precision, and non-contact measurement of the steel plate’s edge position under high temperature can be realized using the imaging measurement method established in this paper.

Keywords: thermal expansion     image measurement     edge detection     image calibration    

Parallel Authentication Modes Based on Double Blocks or Key Counter

Huang Yuhua,Huai Aiqun,Song Yubo

Strategic Study of CAE 2004, Volume 6, Issue 7,   Pages 70-74

Abstract: A parallel authentication mode (PKCB) based on double blocks was put forward in this paper.The PKCB mode had a marked improvement on security & speed over parallel authentication mode, PMACOn this ground, another parallel authentication mode (KCTR - MAC) based on key counter was advanced.The KCTR - MAC authentication mode may be combined with the CTR (counter) encryption mode to form a full

Keywords: authentication mode     CBC - MAC mode     PMAC mode     CTR mode     CCM mode    

Molecular authentication of the traditional Chinese medicine Tongren Dahuoluo Wan and its alternative

Jikun WANG, Jing DU, Meng CAO, Lu YAO, Suhua XIE, Jiafu CHEN, Xingbo ZHAO

Frontiers of Agricultural Science and Engineering 2017, Volume 4, Issue 3,   Pages 353-357 doi: 10.15302/J-FASE-2017157

Abstract: For the patent medicine authentication, we set up a molecular diagnostic assay to resolve the difficultiesWe recommend a common technical strategy for authentication of species origins in traditional Chinese

Keywords: Tongren Dahuoluo Wan     molecular diagnostic assay     Eospalax baileyi     Panthera pardus     species-specific primers    

IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication

Wang Xingjian,Hu Aiqun,Huang Yuhua

Strategic Study of CAE 2006, Volume 8, Issue 9,   Pages 69-73

Abstract: Aimed at the weakness both in security and efficiency of one-hop one-way authentication SA (securityassociation) mechanism employed by Mesh network, an multi-hops mutual authentication SA mechanism associated

Keywords: IEEE 802.16     mesh     node     multi-hops mutual authentication     self-modified routing    

Tracing the impact of stack configuration on interface resistances in reverse electrodialysis by in situ electrochemical impedance spectroscopy

Frontiers of Environmental Science & Engineering 2022, Volume 16, Issue 4, doi: 10.1007/s11783-021-1480-9

Abstract:

• RED performance and stack resistance were studied by EIS and LSV.

Keywords: Reverse electrodialysis     Electrochemical impedance spectroscopy     Concentration polarization     Spacer shadow    

Deformable image registration with geometric changes

Yu LIU,Bo ZHU

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 10,   Pages 829-837 doi: 10.1631/FITEE.1500045

Abstract: Geometric changes present a number of difficulties in deformable image registration.developed an innovative model which significantly reduces the side effects of geometric changes in imageWe show that the transformation estimated from our model is able to reconstruct the target image with

Keywords: Geometric changes     Image registration     Sparsity     Traumatic brain injury (TBI)    

A building unit decomposition model for energy leakage by infrared thermography image analysis

Yan SU, Fangjun HONG, Lianjie SHU

Frontiers in Energy 2020, Volume 14, Issue 4,   Pages 901-921 doi: 10.1007/s11708-020-0679-y

Abstract: A quantitative energy leakage model was developed based on the thermography image data measured for both

Keywords: heat conductivity     heat coefficient     heat &fllig     ux     infrared thermography     thermal image    

Digital image correlation-based structural state detection through deep learning

Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 1,   Pages 45-56 doi: 10.1007/s11709-021-0777-x

Abstract: The digital image correlation (DIC) technology was utilized to collect vibration information of an actual

Keywords: structural state detection     deep learning     digital image correlation     vibration signal     steel frame    

Three-dimensional reconstruction of light microscopy image sections: present and future

Yuzhen Wang,Rui Xu,Gaoxing Luo,Jun Wu

Frontiers of Medicine 2015, Volume 9, Issue 1,   Pages 30-45 doi: 10.1007/s11684-014-0337-z

Abstract:

Three-dimensional (3D) image reconstruction technologies can reveal previously hidden microstructures

Keywords: microtomy     3D imaging     computer-assisted image processing     3D printing     tissue scaffold    

Title Author Date Type Operation

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Journal Article

A lightweight authentication scheme with user untraceability

Kuo-Hui YEH

Journal Article

Smog Casts a Shadow on Solar Power

Jane Palmer

Journal Article

Turbidity-adaptive underwater image enhancement method using image fusion

Journal Article

Amethod of shadowpuppet figure modeling and animation

Xiao-fang HUANG,Shou-qian SUN,Ke-jun ZHANG,Tian-ning XU,Jian-feng WU,Bin ZHU

Journal Article

Gradient-based compressive image fusion

Yang CHEN,Zheng QIN

Journal Article

Edge detection of steel plates at high temperature using image measurement

Qiong Zhou, Qi An

Journal Article

Parallel Authentication Modes Based on Double Blocks or Key Counter

Huang Yuhua,Huai Aiqun,Song Yubo

Journal Article

Molecular authentication of the traditional Chinese medicine Tongren Dahuoluo Wan and its alternative

Jikun WANG, Jing DU, Meng CAO, Lu YAO, Suhua XIE, Jiafu CHEN, Xingbo ZHAO

Journal Article

IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication

Wang Xingjian,Hu Aiqun,Huang Yuhua

Journal Article

Tracing the impact of stack configuration on interface resistances in reverse electrodialysis by in situ electrochemical impedance spectroscopy

Journal Article

Deformable image registration with geometric changes

Yu LIU,Bo ZHU

Journal Article

A building unit decomposition model for energy leakage by infrared thermography image analysis

Yan SU, Fangjun HONG, Lianjie SHU

Journal Article

Digital image correlation-based structural state detection through deep learning

Journal Article

Three-dimensional reconstruction of light microscopy image sections: present and future

Yuzhen Wang,Rui Xu,Gaoxing Luo,Jun Wu

Journal Article