Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    Image Fusion Using Wavelet Transformation and XGboost Algorithm

    Shahid Naseem1, Tariq Mahmood2,3, Amjad Rehman Khan2, Umer Farooq1, Samra Nawazish4, Faten S. Alamri5,*, Tanzila Saba2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 801-817, 2024, DOI:10.32604/cmc.2024.047623

    Abstract Recently, there have been several uses for digital image processing. Image fusion has become a prominent application in the domain of imaging processing. To create one final image that proves more informative and helpful compared to the original input images, image fusion merges two or more initial images of the same item. Image fusion aims to produce, enhance, and transform significant elements of the source images into combined images for the sake of human visual perception. Image fusion is commonly employed for feature extraction in smart robots, clinical imaging, audiovisual camera integration, manufacturing process monitoring, electronic circuit design, advanced device… More >

  • Open Access

    ARTICLE

    Robust Watermarking Algorithm for Medical Volume Data Based on Polar Cosine Transform and 3D-DCT

    Pengju Zhang1, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2, Jing Liu3, Yen-wei Chen4, Dekai Li1, Lei Cao1

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5853-5870, 2023, DOI:10.32604/cmc.2023.036462

    Abstract The amount of 3D data stored and transmitted in the Internet of Medical Things (IoMT) is increasing, making protecting these medical data increasingly prominent. However, there are relatively few researches on 3D data watermarking. Moreover, due to the particularity of medical data, strict data quality should be considered while protecting data security. To solve the problem, in the field of medical volume data, we proposed a robust watermarking algorithm based on Polar Cosine Transform and 3D-Discrete Cosine Transform (PCT and 3D-DCT). Each slice of the volume data was transformed by PCT to obtain feature row vector, and then the reshaped… More >

  • Open Access

    ARTICLE

    Zero Watermarking Algorithm for Medical Image Based on Resnet50-DCT

    Mingshuai Sheng1, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2,3, Jing Liu4, Mengxing Huang1,5, Yen-Wei Chen6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 293-309, 2023, DOI:10.32604/cmc.2023.036438

    Abstract Medical images are used as a diagnostic tool, so protecting their confidentiality has long been a topic of study. From this, we propose a Resnet50-DCT-based zero watermarking algorithm for use with medical images. To begin, we use Resnet50, a pre-training network, to draw out the deep features of medical images. Then the deep features are transformed by DCT transform and the perceptual hash function is used to generate the feature vector. The original watermark is chaotic scrambled to get the encrypted watermark, and the watermark information is embedded into the original medical image by XOR operation, and the logical key… More >

  • Open Access

    ARTICLE

    ELM-Based Shape Adaptive DCT Compression Technique for Underwater Image Compression

    M. Jamuna Rani1,*, C. Vasanthanayaki2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1953-1970, 2023, DOI:10.32604/csse.2023.028713

    Abstract Underwater imagery and transmission possess numerous challenges like lower signal bandwidth, slower data transmission bit rates, Noise, underwater blue/green light haze etc. These factors distort the estimation of Region of Interest and are prime hurdles in deploying efficient compression techniques. Due to the presence of blue/green light in underwater imagery, shape adaptive or block-wise compression techniques faces failures as it becomes very difficult to estimate the compression levels/coefficients for a particular region. This method is proposed to efficiently deploy an Extreme Learning Machine (ELM) model-based shape adaptive Discrete Cosine Transformation (DCT) for underwater images. Underwater color image restoration techniques based… More >

  • Open Access

    ARTICLE

    A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT

    Yu Fan1,6, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2, Chunyan Shao1, Cheng Gong1, Jieren Cheng3,5, Yenwei Chen4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1279-1302, 2023, DOI:10.32604/cmc.2023.031445

    Abstract Medical images are a critical component of the diagnostic process for clinicians. Although the quality of medical photographs is essential to the accuracy of a physician’s diagnosis, they must be encrypted due to the characteristics of digital storage and information leakage associated with medical images. Traditional watermark embedding algorithm embeds the watermark information into the medical image, which reduces the quality of the medical image and affects the physicians’ judgment of patient diagnosis. In addition, watermarks in this method have weak robustness under high-intensity geometric attacks when the medical image is attacked and the watermarks are destroyed. This paper proposes… More >

  • Open Access

    ARTICLE

    Hybrid Machine Learning Model for Face Recognition Using SVM

    Anil Kumar Yadav1, R. K. Pateriya2, Nirmal Kumar Gupta3, Punit Gupta4,*, Dinesh Kumar Saini4, Mohammad Alahmadi5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2697-2712, 2022, DOI:10.32604/cmc.2022.023052

    Abstract Face recognition systems have enhanced human-computer interactions in the last ten years. However, the literature reveals that current techniques used for identifying or verifying faces are not immune to limitations. Principal Component Analysis-Support Vector Machine (PCA-SVM) and Principal Component Analysis-Artificial Neural Network (PCA-ANN) are among the relatively recent and powerful face analysis techniques. Compared to PCA-ANN, PCA-SVM has demonstrated generalization capabilities in many tasks, including the ability to recognize objects with small or large data samples. Apart from requiring a minimal number of parameters in face detection, PCA-SVM minimizes generalization errors and avoids overfitting problems better than PCA-ANN. PCA-SVM, however,… More >

  • Open Access

    ARTICLE

    Unified FPGA Design for the HEVC Dequantization and Inverse Transform Modules

    Turki M. Alanazi, Ahmed Ben Atitallah*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4319-4335, 2022, DOI:10.32604/cmc.2022.022988

    Abstract As the newest standard, the High Efficiency Video Coding (HEVC) is specially designed to minimize the bitrate for video data transfer and to support High Definition (HD) and ULTRA HD video resolutions at the cost of increasing computational complexity relative to earlier standards like the H.264. Therefore, real-time video decoding with HEVC decoder becomes a challenging task. However, the Dequantization and Inverse Transform (DE/IT) are one of the computationally intensive modules in the HEVC decoder which are used to reconstruct the residual block. Thus, in this paper, a unified hardware architecture is proposed to implement the HEVC DE/IT module for… More >

  • Open Access

    ARTICLE

    Abnormality Identification in Video Surveillance System using DCT

    A. Balasundaram1,*, Golda Dilip2, M. Manickam3, Arun Kumar Sivaraman4, K. Gurunathan5, R. Dhanalakshmi6, S. Ashokkumar7

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 693-704, 2022, DOI:10.32604/iasc.2022.022241

    Abstract In the present world, video surveillance methods play a vital role in observing the activities that take place across secured and unsecured environment. The main aim with which a surveillance system is deployed is to spot abnormalities in specific areas like airport, military, forests and other remote areas, etc. A new block-based strategy is represented in this paper. This strategy is used to identify unusual circumstances by examining the pixel-wise frame movement instead of the standard object-based approaches. The density and also the speed of the movement is extorted by utilizing optical flow. The proposed strategy recognizes the unusual movement… More >

  • Open Access

    ARTICLE

    Liver Lesions and Acute Intracerebral Hemorrhage Detection Using Multimodal Fusion

    Osama S. Faragallah1,*, Abdullah N. Muhammed2, Taha S. Taha3, Gamal G. N. Geweid4,5

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 215-225, 2021, DOI:10.32604/iasc.2021.019058

    Abstract Medical image fusion is designed to help physicians in their decisions by providing them with a preclinical image with enough information. Accurate assessment and effective treatment of the disease reduce the time it takes to relieve the symptoms of the disease. This article utilizes an effective data fusion approach to work on two different imaging modalities; computed tomography (CT) and magnetic resonance imaging (MRI). The data fusion approach is based on the combination of singular value decomposition (SVD) and the Fast Discrete Curvelet Transform (FDCT) techniques to reduce processing time during the fusion process. The SVD-FDCT data fusion approach is… More >

  • Open Access

    ARTICLE

    OPPR: An Outsourcing Privacy-Preserving JPEG Image Retrieval Scheme with Local Histograms in Cloud Environment

    Jian Tang, Zhihua Xia*, Lan Wang, Chengsheng Yuan, Xueli Zhao

    Journal on Big Data, Vol.3, No.1, pp. 21-33, 2021, DOI:10.32604/jbd.2021.015892

    Abstract As the wide application of imaging technology, the number of big image data which may containing private information is growing fast. Due to insufficient computing power and storage space for local server device, many people hand over these images to cloud servers for management. But actually, it is unsafe to store the images to the cloud, so encryption becomes a necessary step before uploading to reduce the risk of privacy leakage. However, it is not conducive to the efficient application of image, especially in the Content-Based Image Retrieval (CBIR) scheme. This paper proposes an outsourcing privacypreserving JPEG CBIR scheme. We… More >

Displaying 1-10 on page 1 of 15. Per Page