Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,231)
  • Open Access


    An Efficient Crossing-Line Crowd Counting Algorithm with Two-Stage Detection

    Zhenqiu Xiao1,*, Bin Yang2, Desy Tjahjadi3

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1141-1154, 2019, DOI:10.32604/cmc.2019.05638

    Abstract Crowd counting is a challenging task in crowded scenes due to heavy occlusions, appearance variations and perspective distortions. Current crowd counting methods typically operate on an image patch level with overlaps, then sum over the patches to get the final count. In this paper we describe a real-time pedestrian counting framework based on a two-stage human detection algorithm. Existing works with overhead cameras is mainly based on visual tracking, and their robustness is rather limited. On the other hand, some works, which focus on improving the performances, are too complicated to be realistic. By adopting… More >

  • Open Access


    Satellite Cloud-Derived Wind Inversion Algorithm Using GPU

    Lili He1,2, Hongtao Bai1,2, Dantong Ouyang1,2, Changshuai Wang1,2, Chong Wang1,2,3, Yu Jiang1,2,*

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 599-613, 2019, DOI:10.32604/cmc.2019.05928

    Abstract Cloud-derived wind refers to the wind field data product reversely derived through satellite remote sensing cloud images. Satellite cloud-derived wind inversion has the characteristics of large scale, computationally intensive and long time. The most widely used cloud-derived serial--tracer cloud tracking method is the maximum cross-correlation coefficient (MCC) method. In order to overcome the efficiency bottleneck of the cloud-derived serial MCC algorithm, we proposed a parallel cloud-derived wind inversion algorithm based on GPU framework in this paper, according to the characteristics of independence between each wind vector calculation. In this algorithm, each iteration is considered as… More >

  • Open Access


    Adaptive Median Filtering Algorithm Based on Divide and Conquer and Its Application in CAPTCHA Recognition

    Wentao Ma1, Jiaohua Qin1,*, Xuyu Xiang1, Yun Tan1, Yuanjing Luo1, Neal N. Xiong2

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 665-677, 2019, DOI:10.32604/cmc.2019.05683

    Abstract As the first barrier to protect cyberspace, the CAPTCHA has made significant contributions to maintaining Internet security and preventing malicious attacks. By researching the CAPTCHA, we can find its vulnerability and improve the security of CAPTCHA. Recently, many studies have shown that improving the image preprocessing effect of the CAPTCHA, which can achieve a better recognition rate by the state-of-the-art machine learning algorithms. There are many kinds of noise and distortion in the CAPTCHA images of this experiment. We propose an adaptive median filtering algorithm based on divide and conquer in this paper. Firstly, the More >

  • Open Access


    R2N: A Novel Deep Learning Architecture for Rain Removal from Single Image

    Yecai Guo1,2,*, Chen Li1,2, Qi Liu3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 829-843, 2019, DOI:10.32604/cmc.2019.03729

    Abstract Visual degradation of captured images caused by rainy streaks under rainy weather can adversely affect the performance of many open-air vision systems. Hence, it is necessary to address the problem of eliminating rain streaks from the individual rainy image. In this work, a deep convolution neural network (CNN) based method is introduced, called Rain-Removal Net (R2N), to solve the single image de-raining issue. Firstly, we decomposed the rainy image into its high-frequency detail layer and low-frequency base layer. Then, we used the high-frequency detail layer to input the carefully designed CNN architecture to learn the mapping More >

  • Open Access


    An Improved Unsupervised Image Segmentation Method Based on Multi-Objective Particle Swarm Optimization Clustering Algorithm

    Zhe Liu1,2,*, Bao Xiang1,3, Yuqing Song1, Hu Lu1, Qingfeng Liu1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 451-461, 2019, DOI:10.32604/cmc.2019.04069

    Abstract Most image segmentation methods based on clustering algorithms use single-objective function to implement image segmentation. To avoid the defect, this paper proposes a new image segmentation method based on a multi-objective particle swarm optimization (PSO) clustering algorithm. This unsupervised algorithm not only offers a new similarity computing approach based on electromagnetic forces, but also obtains the proper number of clusters which is determined by scale-space theory. It is experimentally demonstrated that the applicability and effectiveness of the proposed multi-objective PSO clustering algorithm. More >

  • Open Access


    A Weighted Threshold Secret Sharing Scheme for Remote Sensing Images Based on Chinese Remainder Theorem

    Qi He1, Shui Yu2, Huifang Xu3,*, Jia Liu4, Dongmei Huang5, Guohua Liu6, Fangqin Xu3, Yanling Du1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 349-361, 2019, DOI:10.32604/cmc.2019.03703

    Abstract The recent advances in remote sensing and computer techniques give birth to the explosive growth of remote sensing images. The emergence of cloud storage has brought new opportunities for storage and management of massive remote sensing images with its large storage space, cost savings. However, the openness of cloud brings challenges for image data security. In this paper, we propose a weighted image sharing scheme to ensure the security of remote sensing in cloud environment, which takes the weights of participants (i.e., cloud service providers) into consideration. An extended Mignotte sequence is constructed according to… More >

  • Open Access


    A Robust Image Watermarking Scheme Using Z-Transform, Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition

    N. Jayashree1,*, R. S. Bhuvaneswaran1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 263-285, 2019, DOI:10.32604/cmc.2019.03924

    Abstract Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images, videos, and audio data. Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties. This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform (DWT), Z-transform (ZT) and Bidiagonal Singular Value Decomposition (BSVD). The original image is decomposed into 3-level DWT, and then, ZT is applied on the HH3 and HL3 sub-bands. The watermark image is encrypted using Arnold Cat Map. BSVD for the More >

  • Open Access


    High Capacity Data Hiding in Encrypted Image Based on Compressive Sensing for Nonequivalent Resources

    Di Xiao1,*, Jia Liang1, Qingqing Ma1, Yanping Xiang1, Yushu Zhang2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 1-13, 2019, DOI:10.32604/cmc.2019.02171

    Abstract To fulfill the requirements of data security in environments with nonequivalent resources, a high capacity data hiding scheme in encrypted image based on compressive sensing (CS) is proposed by fully utilizing the adaptability of CS to nonequivalent resources. The original image is divided into two parts: one part is encrypted with traditional stream cipher; the other part is turned to the prediction error and then encrypted based on CS to vacate room simultaneously. The collected non-image data is firstly encrypted with simple stream cipher. For data security management, the encrypted non-image data is then embedded More >

  • Open Access


    A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment

    Zhihua Xia1,*, Lihua Lu1, Tong Qiu1, H. J. Shim1, Xianyi Chen1, Byeungwoo Jeon2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 27-43, 2019, DOI:10.32604/cmc.2019.02688

    Abstract Content based image retrieval (CBIR) techniques have been widely deployed in many applications for seeking the abundant information existed in images. Due to large amounts of storage and computational requirements of CBIR, outsourcing image search work to the cloud provider becomes a very attractive option for many owners with small devices. However, owing to the private content contained in images, directly outsourcing retrieval work to the cloud provider apparently bring about privacy problem, so the images should be protected carefully before outsourcing. This paper presents a secure retrieval scheme for the encrypted images in the… More >

  • Open Access


    A Method of Identifying Thunderstorm Clouds in Satellite Cloud Image Based on Clustering

    Lili He1,2, Dantong Ouyang1,2, Meng Wang1,2, Hongtao Bai1,2, Qianlong Yang1,2, Yaqing Liu3,4, Yu Jiang1,2,*

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 549-570, 2018, DOI:10.32604/cmc.2018.03840

    Abstract In this paper, the clustering analysis is applied to the satellite image segmentation, and a cloud-based thunderstorm cloud recognition method is proposed in combination with the strong cloud computing power. The method firstly adopts the fuzzy C-means clustering (FCM) to obtain the satellite cloud image segmentation. Secondly, in the cloud image, we dispose the ‘high-density connected’ pixels in the same cloud clusters and the ‘low-density connected’ pixels in different cloud clusters. Therefore, we apply the DBSCAN algorithm to the cloud image obtained in the first step to realize cloud cluster knowledge. Finally, using the method More >

Displaying 1201-1210 on page 121 of 1231. Per Page