Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (37)
  • Open Access

    ARTICLE

    Book Retrieval Method Based on QR Code and CBIR Technology

    Qiuyan Wang1, *, Haibing Dong2

    Journal on Artificial Intelligence, Vol.1, No.2, pp. 101-110, 2019, DOI:10.32604/jai.2019.08170

    Abstract It is the development trend of library information management, which applies the mature and cutting-edge information technology to library information retrieval. In order to realize the rapid retrieval of massive book information, this paper proposes a book retrieval method combining QR code with image retrieval technology. This method analyzes the visual features of book images, design a book image retrieval method based on boundary contour and regional pixel distribution features, and realizes the association retrieval of book information combined with the QR code, so as to improve the efficiency of book retrieval. The experimental results show that, the books can… More >

  • Open Access

    ARTICLE

    Instance Retrieval Using Region of Interest Based CNN Features

    Jingcheng Chen1, Zhili Zhou1,2,*, Zhaoqing Pan1, Ching-nung Yang3

    Journal of New Media, Vol.1, No.2, pp. 87-99, 2019, DOI:10.32604/jnm.2019.06582

    Abstract Recently, image representations derived by convolutional neural networks (CNN) have achieved promising performance for instance retrieval, and they outperform the traditional hand-crafted image features. However, most of existing CNN-based features are proposed to describe the entire images, and thus they are less robust to background clutter. This paper proposes a region of interest (RoI)-based deep convolutional representation for instance retrieval. It first detects the region of interests (RoIs) from an image, and then extracts a set of RoI-based CNN features from the fully-connected layer of CNN. The proposed RoI-based CNN feature describes the patterns of the detected RoIs, so that… More >

  • Open Access

    ARTICLE

    Shape, Color and Texture Based CBIR System Using Fuzzy Logic Classifier

    D. Yuvaraj1, M. Sivaram2, B. Karthikeyan3,*, Jihan Abdulazeez4

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 729-739, 2019, DOI:10.32604/cmc.2019.05945

    Abstract The perfect image retrieval and retrieval time are the two major challenges in CBIR systems. To improve the retrieval accuracy, the whole database is searched based on many image characteristics such as color, shape, texture and edge information which leads to more time consumption. This paper presents a new fuzzy based CBIR method, which utilizes colour, shape and texture attributes of the image. Fuzzy rule based system is developed by combining color, shape, and texture feature for enhanced image recovery. In this approach, DWT is used to pull out the texture characteristics and the region based moment invariant is utilized… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment

    Zhihua Xia1,*, Lihua Lu1, Tong Qiu1, H. J. Shim1, Xianyi Chen1, Byeungwoo Jeon2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 27-43, 2019, DOI:10.32604/cmc.2019.02688

    Abstract Content based image retrieval (CBIR) techniques have been widely deployed in many applications for seeking the abundant information existed in images. Due to large amounts of storage and computational requirements of CBIR, outsourcing image search work to the cloud provider becomes a very attractive option for many owners with small devices. However, owing to the private content contained in images, directly outsourcing retrieval work to the cloud provider apparently bring about privacy problem, so the images should be protected carefully before outsourcing. This paper presents a secure retrieval scheme for the encrypted images in the YUV color space. With this… More >

  • Open Access

    ARTICLE

    Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor

    Guoyuan Lin1,2,*, Bowen Liu1, Pengcheng Xiao3, Min Lei4, Wei Bi5,6

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 533-547, 2018, DOI:10.32604/cmc.2018.03720

    Abstract Anti-detection is becoming as an emerging challenge for anti-phishing. This paper solves the threats of anti-detection from the threshold setting condition. Enough webpages are considered to complicate threshold setting condition when the threshold is settled. According to the common visual behavior which is easily attracted by the salient region of webpages, image retrieval methods based on texton correlation descriptor (TCD) are improved to obtain enough webpages which have similarity in the salient region for the images of webpages. There are two steps for improving TCD which has advantage of recognizing the salient region of images: (1) This paper proposed Weighted… More >

  • Open Access

    ARTICLE

    A Cryptograph Domain Image Retrieval Method Based on Paillier Homomorphic Block Encryption

    Wenjia Xu1, Shijun Xiang1,*, Vasily Sachnev2

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 285-295, 2018, DOI:10.3970/cmc.2018.01719

    Abstract With the rapid development of information network, the computing resources and storage capacity of ordinary users cannot meet their needs of data processing. The emergence of cloud computing solves this problem but brings data security problems. How to manage and retrieve ciphertext data effectively becomes a challenging problem. To these problems, a new image retrieval method in ciphertext domain by block image encrypting based on Paillier homomophic cryptosystem is proposed in this paper. This can be described as follows: According to the Paillier encryption technology, the image owner encrypts the original image in blocks, obtains the image in ciphertext domain,… More >

  • Open Access

    ARTICLE

    Coverless Information Hiding Based on the Molecular Structure Images of Material

    Yi Cao1,2, Zhili Zhou1,2,3, Xingming Sun1,2, Chongzhi Gao4,*

    CMC-Computers, Materials & Continua, Vol.54, No.2, pp. 197-207, 2018, DOI:10.3970/cmc.2018.054.197

    Abstract The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm. To address this problem, the concept of coverless information hiding was proposed. Coverless information hiding can effectively resist steganalysis algorithm, since it uses unmodified natural stego-carriers to represent and convey confidential information. However, the state-of-the-arts method has a low hidden capacity, which makes it less appealing. Because the pixel values of different regions of the molecular structure images of material (MSIM) are usually different,… More >

Displaying 31-40 on page 4 of 37. Per Page