Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (77)
  • Open Access

    ARTICLE

    Instance Retrieval Using Region of Interest Based CNN Features

    Jingcheng Chen1, Zhili Zhou1,2,*, Zhaoqing Pan1, Ching-nung Yang3

    Journal of New Media, Vol.1, No.2, pp. 87-99, 2019, DOI:10.32604/jnm.2019.06582

    Abstract Recently, image representations derived by convolutional neural networks (CNN) have achieved promising performance for instance retrieval, and they outperform the traditional hand-crafted image features. However, most of existing CNN-based features are proposed to describe the entire images, and thus they are less robust to background clutter. This paper proposes a region of interest (RoI)-based deep convolutional representation for instance retrieval. It first detects the region of interests (RoIs) from an image, and then extracts a set of RoI-based CNN features from the fully-connected layer of CNN. The proposed RoI-based CNN feature describes the patterns of the detected RoIs, so that… More >

  • Open Access

    ARTICLE

    Shape, Color and Texture Based CBIR System Using Fuzzy Logic Classifier

    D. Yuvaraj1, M. Sivaram2, B. Karthikeyan3,*, Jihan Abdulazeez4

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 729-739, 2019, DOI:10.32604/cmc.2019.05945

    Abstract The perfect image retrieval and retrieval time are the two major challenges in CBIR systems. To improve the retrieval accuracy, the whole database is searched based on many image characteristics such as color, shape, texture and edge information which leads to more time consumption. This paper presents a new fuzzy based CBIR method, which utilizes colour, shape and texture attributes of the image. Fuzzy rule based system is developed by combining color, shape, and texture feature for enhanced image recovery. In this approach, DWT is used to pull out the texture characteristics and the region based moment invariant is utilized… More >

  • Open Access

    ARTICLE

    Uniform Query Framework for Relational and NoSQL Databases

    J.B. Karanjekar1, M.B. Ch,ak2

    CMES-Computer Modeling in Engineering & Sciences, Vol.113, No.2, pp. 177-187, 2017, DOI:10.3970/cmes.2017.113.177

    Abstract As the data managed by applications has evolved over the years with the arrival of Web 2.0, a large number of new databases have been developed to manage various types of data. While the traditional relational databases continue to exist, NoSQL databases which are document oriented or key-value stores or columnar continue to evolve and are embraced very rapidly across the industry. It is not just the type of data handled by these databases that is different but also the query language they use is also different. This paper talks about a uniform query framework that can be used for… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment

    Zhihua Xia1,*, Lihua Lu1, Tong Qiu1, H. J. Shim1, Xianyi Chen1, Byeungwoo Jeon2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 27-43, 2019, DOI:10.32604/cmc.2019.02688

    Abstract Content based image retrieval (CBIR) techniques have been widely deployed in many applications for seeking the abundant information existed in images. Due to large amounts of storage and computational requirements of CBIR, outsourcing image search work to the cloud provider becomes a very attractive option for many owners with small devices. However, owing to the private content contained in images, directly outsourcing retrieval work to the cloud provider apparently bring about privacy problem, so the images should be protected carefully before outsourcing. This paper presents a secure retrieval scheme for the encrypted images in the YUV color space. With this… More >

  • Open Access

    ARTICLE

    Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor

    Guoyuan Lin1,2,*, Bowen Liu1, Pengcheng Xiao3, Min Lei4, Wei Bi5,6

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 533-547, 2018, DOI:10.32604/cmc.2018.03720

    Abstract Anti-detection is becoming as an emerging challenge for anti-phishing. This paper solves the threats of anti-detection from the threshold setting condition. Enough webpages are considered to complicate threshold setting condition when the threshold is settled. According to the common visual behavior which is easily attracted by the salient region of webpages, image retrieval methods based on texton correlation descriptor (TCD) are improved to obtain enough webpages which have similarity in the salient region for the images of webpages. There are two steps for improving TCD which has advantage of recognizing the salient region of images: (1) This paper proposed Weighted… More >

  • Open Access

    ARTICLE

    A Cryptograph Domain Image Retrieval Method Based on Paillier Homomorphic Block Encryption

    Wenjia Xu1, Shijun Xiang1,*, Vasily Sachnev2

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 285-295, 2018, DOI:10.3970/cmc.2018.01719

    Abstract With the rapid development of information network, the computing resources and storage capacity of ordinary users cannot meet their needs of data processing. The emergence of cloud computing solves this problem but brings data security problems. How to manage and retrieve ciphertext data effectively becomes a challenging problem. To these problems, a new image retrieval method in ciphertext domain by block image encrypting based on Paillier homomophic cryptosystem is proposed in this paper. This can be described as follows: According to the Paillier encryption technology, the image owner encrypts the original image in blocks, obtains the image in ciphertext domain,… More >

  • Open Access

    ARTICLE

    Coverless Information Hiding Based on the Molecular Structure Images of Material

    Yi Cao1,2, Zhili Zhou1,2,3, Xingming Sun1,2, Chongzhi Gao4,*

    CMC-Computers, Materials & Continua, Vol.54, No.2, pp. 197-207, 2018, DOI:10.3970/cmc.2018.054.197

    Abstract The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm. To address this problem, the concept of coverless information hiding was proposed. Coverless information hiding can effectively resist steganalysis algorithm, since it uses unmodified natural stego-carriers to represent and convey confidential information. However, the state-of-the-arts method has a low hidden capacity, which makes it less appealing. Because the pixel values of different regions of the molecular structure images of material (MSIM) are usually different,… More >

Displaying 71-80 on page 8 of 77. Per Page