Resource Type

Journal Article 104

Year

2023 11

2022 14

2021 9

2020 12

2019 14

2018 7

2017 9

2016 7

2015 1

2014 2

2013 1

2012 1

2008 2

2007 3

2006 3

2005 1

2004 2

2003 1

2001 3

2000 1

open ︾

Keywords

Deep learning 5

Compressive sensing 2

Data hiding 2

Decentralization 2

Dictionary learning 2

Ensemble learning 2

High-speed railway 2

Hypervelocity impact 2

Image segmentation 2

5G smartphone 1

AF/PSTM 1

Accumulated settlement 1

Adaptive patch based processing 1

Adaptive watermarking 1

Alternate vertex updating 1

Antenna array 1

Approximate nearest neighbor search 1

Arousal 1

Artificial intelligence 1

open ︾

Search scope:

排序: Display mode:

An improved ROF denoising model based on time-fractional derivative Research Articles

Xing-ran Liao,xrliao_scu@163.com

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6,   Pages 809-962 doi: 10.1631/FITEE.2000067

Abstract: In this study, we discuss mainly the and texture retention issues. Usually, the has an adjustable fractional order to control the diffusion process, and its memory effect can nicely retain the image texture when it is applied to . Therefore, we design a new Rudin-Osher-Fatemi model with a based on a classical one, where the discretization in space is based on the integer-order difference scheme and the discretization in time is the approximation of the (i.e., Caputo-like difference is applied to discretize the ). Stability and convergence of such an explicit scheme are analyzed in detail. We prove that the numerical solution to the new model converges to the exact solution with the order of (+), where , , and are the time step size, fractional order, and space step size, respectively. Finally, various evaluation criteria including the signal-to-noise ratio, feature similarity, and histogram recovery degree are used to evaluate the performance of our new model. Numerical test results show that our improved model has more powerful denoising and texture retention ability than existing ones.

Keywords: 改进ROF去噪模型;时间分数阶导数;Caputo导数;图像去噪    

Subpixel image reconstruction and denoising based on complex wavelet

Zhang Zhi,Wei Zhihui,Xia Deshen

Strategic Study of CAE 2008, Volume 10, Issue 11,   Pages 76-81

Abstract:

Composing superresolution of the remote sensing images can remedy the deficiency of the remote sensor. However, precision of the common interpolations are not high. The paper analyzes the subpixel theory of the remote sensing image and interpolates two images offsetting subpixel in order to reconstruct high resolution image. The algorithm of adaptive threshold wavelet denoising based inter-scale is used. Experiment results show this algorithm is better than common methods.

Keywords: subpixel     complex wavelet     adaptive threshold     reconstruction     denosing    

Efficientmesh denoising via robust normal filtering and alternate vertex updating Article

Tao LI, Jun WANG, Hao LIU, Li-gang LIU

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11,   Pages 1828-1842 doi: 10.1631/FITEE.1601229

Abstract: The most challenging problem in mesh denoising is to distinguish features from noise. Based on the robust guided normal estimation and alternate vertex updating strategy, we investigate a new feature-preserving mesh denoising method. To accurately capture local structures around features, we propose a corner-aware neighborhood (CAN) scheme. By combining both overall normal distribution of all faces in a CAN and individual normal influence of the interested face, we give a new consistency measuring method, which greatly improves the reliability of the estimated guided normals. As the noise level lowers, we take as guidance the previous filtered normals, which coincides with the emerging rolling guidance idea. In the vertex updating process, we classify vertices according to filtered normals at each iteration and reposition vertices of distinct types alternately with individual regularization constraints. Experiments on a variety of synthetic and real data indicate that our method adapts to various noise, both Gaussian and impulsive, no matter in the normal direction or in a random direction, with few triangles flipped.

Keywords: Mesh denoising     Guided normal filtering     Alternate vertex updating     Corner-aware neighborhoods    

Adaptive Wavelet Thresholding Denoising Used in Gravitational Signal Processing

Zhao Liye,Zhou Bailing,Li Kunyu

Strategic Study of CAE 2006, Volume 8, Issue 3,   Pages 49-52

Abstract:

The theory of wavelet thresholding denoising is analyzed and applied to process the data measured by gravimeter in order to effectively alleviate the effect of different noise in high precise gravitational system. The signal to noise ration (SNR) is used as the index for evaluating the performance of the data processing methods. Theoretical analysis and emulation experiments indicate that wavelet thresholding denoising, adaptive wavelet thresholding denoising and adaptive Kalman filtering are all effective in alleviating the effects of different noise, but the performance of adaptive wavelet thresholding denoising is best.

Keywords: gravimeter     signal processing     wavelet transform     adaptive wavelet threshold     adaptive Kalman     filering    

The application of advanced threshold denoising tothe MMW target radiation signal

Fan Qinghui,Li Xingguo

Strategic Study of CAE 2008, Volume 10, Issue 7,   Pages 153-157

Abstract:

In this paper based on the characteristics of millimeter wave radiation signal for wavelet transform, non-negative wavelet coefficient is used as the wavelet coefficient of the signal. For a given threshold value, the wavelet coefficient which is smaller than the threshold is set zero and the wavelet coefficient which is larger than the threshold is set the difference between the coefficient and a constant a.The method for valuing a is inferred by the variance function of signal, and the experiments show that it has good ability of removing the noise in MMW target radiation signal.

Keywords: The application of advanced threshold denoising tothe MMW target radiation signal    

Accelerated haze removal for a single image by dark channel prior Research Articles

Bo-xuan YUE, Kang-ling LIU, Zi-yang WANG, Jun LIANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1109-1118 doi: 10.1631/FITEE.1700148

Abstract: Haze scatters light transmitted in the air and reduces the visibility of images. Dealing with haze is still a challenge for image processing applications nowadays. For the purpose of haze removal, we propose an accelerated dehazing method based on single pixels. Unlike other methods based on regions, our method estimates the transmission map and atmospheric light for each pixel independently, so that all parameters can be evaluated in one traverse, which is a key to acceleration. Then, the transmission map is bilaterally filtered to restore the relationship between pixels. After restoration via the linear hazy model, the restored images are tuned to improve the contrast, value, and saturation, in particular to offset the intensity errors in different channels caused by the corresponding wavelengths. The experimental results demonstrate that the proposed dehazing method outperforms the state-of-the-art dehazing methods in terms of processing speed. Comparisons with other dehazing methods and quantitative criteria (peak signal-to-noise ratio, detectable marginal rate, and information entropy difference) are introduced to verify its performance.

Keywords: Haze removal     Dark channel prior     Hazy image model     Bilateral filtering    

De-scattering and edge-enhancement algorithms for underwater image restoration Research Papers

Pan-wang PAN, Fei YUAN, En CHENG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6,   Pages 862-871 doi: 10.1631/FITEE.1700744

Abstract:

Image restoration is a critical procedure for underwater images, which suffer from serious color deviation and edge blurring. Restoration can be divided into two stages: de-scattering and edge enhancement. First, we introduce a multi-scale iterative framework for underwater image de-scattering, where a convolutional neural network is used to estimate the transmission map and is followed by an adaptive bilateral filter to refine the estimated results. Since there is no available dataset to train the network, a dataset which includes 2000 underwater images is collected to obtain the synthetic data. Second, a strategy based on white balance is proposed to remove color casts of underwater images. Finally, images are converted to a special transform domain for denoising and enhancing the edge using the non-subsampled contourlet transform. Experimental results show that the proposed method significantly outperforms state-of-the-art methods both qualitatively and quantitatively.

Keywords: Image de-scattering     Edge enhancement     Convolutional neural network     Non-subsampled contourlet transform    

Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation Research Articles

Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7,   Pages 946-963 doi: 10.1631/FITEE.1700667

Abstract:

This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation. The principal objective of the presented scheme is to simultaneously meet all the four requirements (robustness, security, imperceptibility, and capacity) of a good watermarking scheme. The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet. To do so, different approaches are combined in a way that the four requirements are achieved. For instance, to obtain imperceptibility, the three color channels (red, green, and blue) are de-correlated using principal component analysis, and the first principal component (de-correlated red channel) is chosen for watermark embedding. Afterwards, to achieve robustness, the de-correlated channel is decomposed using a discrete wavelet transform (DWT), and the approximate band (the other three bands are kept intact to preserve the edge information) is further decomposed into distinct blocks. The random blocks are chosen based on a random generated key. The random selected blocks are further broken down into singular values and vectors. Based on the mutual dependency on singular values and vectors’ matrices, the values are modified depending on the watermarking bits, and their locations are saved and used as another key, required when the watermark is to be extracted. Consequently, two-level authentication levels ensure the security, and using both singular values and vectors increases the capacity of the presented scheme. Moreover, the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme. Finally, to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility (peak signal-to-noise ratio and structural similarity index), security (with numerous fake keys), robustness (normalized correlation and bit error rate), and capacity, the Gonzalez and Kodak datasets are used. The comparison shows significant improvement of the proposed scheme over existing schemes.

Keywords: Copyright protection     Data hiding     Multi-resolution decomposition     De-correlation     Security    

Mouse Oocyte Enucleation with Surface Tension Assisted Method

Meng Qinggang,Zhu Shien,Zeng Shenming,Zhang Zhongcheng

Strategic Study of CAE 2001, Volume 3, Issue 11,   Pages 65-69

Abstract:

In the present experiment a new simple method-Surface Tension Aided (STA)- for mouse oocyte enucleation is employed and is compared with three other ones. In method STA, the chromosome spindle was squeezed out by the surface tension of the drop edge with the help of micropipette through a slit made in advance in zona pellucida. In method A, the nucleus was aspirated out through a plat end, 25 μm micropipette via the slit. In method B, the nucleus was aspirated out through a 10μm micropipette directly. In method C, the nucleus was assumed just under the first polar body and the enucleating procedure was carried out by aspirated one third of cytoplasm beneath the polarbody. The manipulation time in method A (3 min/oocyte) was significantly longer than that in method STA (1.33min/oocyte), method B (1.30 min/oocyte) and method C (1.41 min/ oocyte) ; The cytoplasm loss in method C (28.4% ) was significantly higher than those in the other three methods. In methods STA, A and B, very small amount (approximately 5% ) of cytoplasm was lost. The accuracy rate of method C (35.3%) was significantly lower than those in the other three methods, the accuracy rate of method STA, A and B was above 95 % and there is no significant differences among these methods. Some of the cytoplasts produced by STA were used for mouse ear fibroblast cell nuclear transfer by electrofusion. Majority (76.1%) of the cell-cytoplast pairs fused to form reconstructed embryos, 85.4 % of reconstituted embryos developed to form pronuclei and 49.4% of them clove to form 2-cell embryos.

Keywords: surface tension assisted     enucleation     oocyte     mouse    

Image Engineering and Its Research Status in China

Zhang Yujin

Strategic Study of CAE 2000, Volume 2, Issue 8,   Pages 91-94

Abstract:

This paper provides a well-regulated explanation of the definition as well as contents of image engineering, a classification of the theories of image engineering and the applications of image technology. In addition, a comprehensive survey on important Chinese publications about image engineering in the past five years is carried out. An analysis and a discussion of the statistics made on the classification results are also presented. This work shows a general and up-to-date picture of the current status, progress trends and application areas of image engineering in China. It also supplies useful information for readers doing research and/or application works in this field, and provides a helpful reference for editors of journals and potential authors of papers.

Keywords: image engineering     publication     survey    

High-payload completely reversible data hiding in encrypted images by an interpolation technique Article

Di XIAO, Ying WANG, Tao XIANG, Sen BAI

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11,   Pages 1732-1743 doi: 10.1631/FITEE.1601067

Abstract: We present a new high-payload joint reversible data-hiding scheme for encrypted images. Instead of embedding data in the encrypted image directly, the content owner first uses an interpolation technique to estimate whether the location can be used for embedding and generates a location map before encryption. Next, the data hider embeds the additional data through flipping the most significant bits (MSBs) of the encrypted image according to the location map. At the receiver side, before extracting the additional data and reconstructing the image, the receiver decrypts the image first. Experimental results demonstrate that the proposed method can achieve real reversibility, which means data extraction and image recovery are free of error. Moreover, our scheme can embed more payloads than most existing reversible data hiding schemes in encrypted images.

Keywords: Encrypted image     Data hiding     Image recovery     Real reversibility     Interpolation    

Decoupling methods of MIMO antenna arrays for 5G applications: a review Review Articles

Xiao-xi ZHANG, Ai-di REN, Ying LIU

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 1,   Pages 62-71 doi: 10.1631/FITEE.1900466

Abstract: Multiple-input multiple-output (MIMO) technique is a key technique for communication in the future. It can effectively enhance channel capacity. For future fifth-generation (5G) terminals, it is still a challenging task to realize desirable isolation within a compact size. To achieve an acceptable isolation level, many decoupling methods have been developed. We review the most recent research on decoupling methods, including the employment of external decoupling structures, orthogonal modes, and reduction of ground effect, and discuss the development trends of the MIMO array in 5G smartphones.

Keywords: MIMO array     5G smartphone     Decoupling methods    

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Research Article

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 1,   Pages 88-103 doi: 10.1631/FITEE.2200118

Abstract: (ISS) is gaining popularity due to the importance of digital images and its wide application to cloud-based distributed storage and multiparty secure computing. generally includes shadow image detection and identification, and plays an important role in ISS. However, traditional dealer-participatory methods, which suffer from significant or storing auxiliary information, authenticate the shadow image mainly during the decoding phase, also known as unidirectional authentication. The authentication of the shadow image in the distributing (encoding) phase is also important for the participant. In this study, we introduce a based bidirectional method in ISS without for a (k,n) threshold. When the dealer distributes each shadow image to a corresponding participant, the participant can authenticate the received shadow image with his/her private key. In the decoding phase, the dealer can authenticate each received shadow image with a secret key; in addition, the dealer can losslessly decode the secret image with any k or more shadow images. The proposed method is validated using theoretical analyses, illustrations, and comparisons.

Keywords: Image secret sharing     Shadow image authentication     Public key     Pixel expansion     Lossless decoding    

Dual collaboration for decentralized multi-source domain adaptation Research Article

Yikang WEI, Yahong HAN

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 12,   Pages 1780-1794 doi: 10.1631/FITEE.2200284

Abstract: The goal of decentralized is to conduct unsupervised in a scenario. The challenge of is that the source domains and target domain lack cross-domain collaboration during training. On the unlabeled target domain, the target model needs to transfer supervision knowledge with the collaboration of source models, while the domain gap will lead to limited adaptation performance from source models. On the labeled source domain, the source model tends to overfit its domain data in the scenario, which leads to the problem. For these challenges, we propose dual collaboration for decentralized by training and aggregating the local source models and local target model in collaboration with each other. On the target domain, we train the local target model by distilling supervision knowledge and fully using the unlabeled target domain data to alleviate the problem with the collaboration of local source models. On the source domain, we regularize the local source models in collaboration with the local target model to overcome the problem. This forms a dual collaboration between the decentralized source domains and target domain, which improves the domain adaptation performance under the scenario. Extensive experiments indicate that our method outperforms the state-of-the-art methods by a large margin on standard datasets.

Keywords: Multi-source domain adaptation     Data decentralization     Domain shift     Negative transfer    

Recent Advances in Passive Digital Image Security Forensics: A Brief Review Review

Xiang Lin, Jian-Hua Li, Shi-Lin Wang, Alan-Wee-Chung Liew, Feng Cheng, Xiao-Sa Huang

Engineering 2018, Volume 4, Issue 1,   Pages 29-39 doi: 10.1016/j.eng.2018.02.008

Abstract:

With the development of sophisticated image editing and manipulation tools, the originality and authenticity of a digital image is usually hard to determine visually. In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade. Compared with active forensics approaches that require embedding additional information, passive forensics approaches are more popular due to their wider application scenario, and have attracted increasing academic and industrial research interests. Generally speaking, passive digital image forensics detects image forgeries based on the fact that there are certain intrinsic patterns in the original image left during image acquisition or storage, or specific patterns in image forgeries left during the image storage or editing. By analyzing the above patterns, the originality of an image can be authenticated. In this paper, a brief review on passive digital image forensic methods is presented in order to provide a comprehensive introduction on recent advances in this rapidly developing research area. These forensics approaches are divided into three categories based on the various kinds of traces they can be used to track—that is, traces left in image acquisition, traces left in image storage, and traces left in image editing. For each category, the forensics scenario, the underlying rationale, and state-of-the-art methodologies are elaborated. Moreover, the major limitations of the current image forensics approaches are discussed in order to point out some possible research directions or focuses in these areas.

Keywords: Digital image forensics     Image-tampering detection     Multimedia security    

Title Author Date Type Operation

An improved ROF denoising model based on time-fractional derivative

Xing-ran Liao,xrliao_scu@163.com

Journal Article

Subpixel image reconstruction and denoising based on complex wavelet

Zhang Zhi,Wei Zhihui,Xia Deshen

Journal Article

Efficientmesh denoising via robust normal filtering and alternate vertex updating

Tao LI, Jun WANG, Hao LIU, Li-gang LIU

Journal Article

Adaptive Wavelet Thresholding Denoising Used in Gravitational Signal Processing

Zhao Liye,Zhou Bailing,Li Kunyu

Journal Article

The application of advanced threshold denoising tothe MMW target radiation signal

Fan Qinghui,Li Xingguo

Journal Article

Accelerated haze removal for a single image by dark channel prior

Bo-xuan YUE, Kang-ling LIU, Zi-yang WANG, Jun LIANG

Journal Article

De-scattering and edge-enhancement algorithms for underwater image restoration

Pan-wang PAN, Fei YUAN, En CHENG

Journal Article

Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation

Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON

Journal Article

Mouse Oocyte Enucleation with Surface Tension Assisted Method

Meng Qinggang,Zhu Shien,Zeng Shenming,Zhang Zhongcheng

Journal Article

Image Engineering and Its Research Status in China

Zhang Yujin

Journal Article

High-payload completely reversible data hiding in encrypted images by an interpolation technique

Di XIAO, Ying WANG, Tao XIANG, Sen BAI

Journal Article

Decoupling methods of MIMO antenna arrays for 5G applications: a review

Xiao-xi ZHANG, Ai-di REN, Ying LIU

Journal Article

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Journal Article

Dual collaboration for decentralized multi-source domain adaptation

Yikang WEI, Yahong HAN

Journal Article

Recent Advances in Passive Digital Image Security Forensics: A Brief Review

Xiang Lin, Jian-Hua Li, Shi-Lin Wang, Alan-Wee-Chung Liew, Feng Cheng, Xiao-Sa Huang

Journal Article