Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (68)
  • Open Access

    REVIEW

    A Survey on Face Anti-Spoofing Algorithms

    Meigui Zhang*, Kehui Zeng, Jinwei Wang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.1, pp. 21-34, 2020, DOI:10.32604/jihpp.2020.010467 - 15 October 2020

    Abstract The development of artificial intelligence makes the application of face recognition more and more extensive, which also leads to the security of face recognition technology increasingly prominent. How to design a face anti-spoofing method with high accuracy, strong generalization ability and meeting practical needs is the focus of current research. This paper introduces the research progress of face anti-spoofing algorithm, and divides the existing face anti-spoofing methods into two categories: methods based on manual feature expression and methods based on deep learning. Then, the typical algorithms included in them are classified twice, and the basic More >

  • Open Access

    ARTICLE

    Research on Prevention of Citrus Anthracnose Based on Image Retrieval Technology

    Xuefei Du*, Xuyu Xiang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.1, pp. 11-19, 2020, DOI:10.32604/jihpp.2020.010114 - 15 October 2020

    Abstract Citrus anthracnose is a common fungal disease in citrus-growing areas in China, which causes very serious damage. At present, the manual management method is time-consuming and labor-consuming, which reduces the control effect of citrus anthracnose. Therefore, by designing and running the image retrieval system of citrus anthracnose, the automatic recognition and analysis of citrus anthracnose control were realized, and the control effect of citrus anthracnose was improved. In this paper, based on the self-collected and collated citrus anthracnose image database, we use three image features to realize an image retrieval system based on citrus anthracnose More >

  • Open Access

    ARTICLE

    Research on Denoising of Cryo-em Images Based on Deep Learning

    Jianquan Ouyang*, Yi He, Huanrong Tang, Zhousong Fu

    Journal of Information Hiding and Privacy Protection, Vol.2, No.1, pp. 1-9, 2020, DOI:10.32604/jihpp.2020.010657 - 15 October 2020

    Abstract Cryo-em (Cryogenic electron microscopy) is a technology this can build bio-macromolecule of three-dimensional structure. Under the condition of now, the projection image of the biological macromolecule which is collected by the Cryo-em technology that the contrast is low, the signal to noise is low, image blurring, and not easy to distinguish single particle from background, the corresponding processing technology is lagging behind. Therefore, make Cryoem image denoising useful, and maintaining bio-macromolecule of contour or signal of function-construct improve Cryo-em image quality or resolution of Cryo-em three-dimensional structure have important effect. This paper researched a denoising… More >

  • Open Access

    ARTICLE

    Dynamic Resource Scheduling in Emergency Environment

    Yuankun Yan1,*, Yan Kong1, Zhangjie Fu1,2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 143-155, 2019, DOI:10.32604/jihpp.2019.07772

    Abstract Nowadays, emergency accidents could happen at any time. The accidents occur unpredictably and the accidents requirements are diversely. The accidents happen in a dynamic environment and the resource should be cooperative to solve the accidents. Most methods are focusing on minimizing the casualties and property losses in a static environment. However, they are lack in considering the dynamic and unpredictable event handling. In this paper, we propose a representative environmental model in representation of emergency and dynamic resource allocation model, and an adaptive mathematical model based on Genetic Algorithm (GA) to generate an optimal set More >

  • Open Access

    ARTICLE

    An Enhanced Nonlocal Self-Similarity Technique for Fabric Defect Detection

    Boheng Wang1, Li Ma1, Jielin Jiang1,2,*

    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 135-142, 2019, DOI:10.32604/jihpp.2019.07432

    Abstract Fabric defect detection has been an indispensable and important link in fabric production, many studies on the development of vision based automated inspection techniques have been reported. The main drawback of existing methods is that they can only inspect a particular type of fabric pattern in controlled environment. Recently, nonlocal self-similarity (NSS) based method is used for fabric defect detection. This method achieves good defect detection performance for small defects with uneven illumination, the disadvantage of NNS based method is poor for detecting linear defects. Based on this reason, we improve NSS based defect detection More >

  • Open Access

    ARTICLE

    Analysis of Underlay Cognitive Radio Networks Based on Interference Cancellation Mechanism

    Lei Wang1, Jian Liu1,*, Alan Yang2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 119-133, 2019, DOI:10.32604/jihpp.2019.07296

    Abstract In this paper, we study the state-dependent interference channel, where the Rayleigh channel is non-causally known at cognitive network. We propose an active secondary transmission mechanism with interference cancellation technique according to the ON-OFF status of primary network. the secondary transmission mechanism is divided into four cases according to the active state of the primary user in the two time slots. For these interference cases, numerical results are provided to show that active interference cancellation mechanism significantly reduces the secondary transmission performance in terms of secondary outage probability and energy efficiency. More >

  • Open Access

    ARTICLE

    A Multi-Scale Network with the Encoder-Decoder Structure for CMR Segmentation

    Chaoyang Xia1, Jing Peng1, Zongqing Ma2, Xiaojie Li1,*

    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 109-117, 2019, DOI:10.32604/jihpp.2019.07198

    Abstract Cardiomyopathy is one of the most serious public health threats. The precise structural and functional cardiac measurement is an essential step for clinical diagnosis and follow-up treatment planning. Cardiologists are often required to draw endocardial and epicardial contours of the left ventricle (LV) manually in routine clinical diagnosis or treatment planning period. This task is time-consuming and error-prone. Therefore, it is necessary to develop a fully automated end-to-end semantic segmentation method on cardiac magnetic resonance (CMR) imaging datasets. However, due to the low image quality and the deformation caused by heartbeat, there is no effective… More >

  • Open Access

    ARTICLE

    Study on Initial Alignment Under Large Misalignment Angle

    Qi Wang1,2,*, Changsong Yang2,4, Shaoen Wu3

    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 95-108, 2019, DOI:10.32604/jihpp.2019.06054

    Abstract Misalignment angle error model describing the SINS mathematical platform error is presented in this paper following the idea of small misalignment angle error model and large azimuth misalignment angle error model. It can be considered that the three misalignment angles are independent of the rotational sequence in the misalignment error model, but not suitable in the large misalignment error model. The error angle of Euler platform is used to represent the three misalignment angles from theoretical navigation coordinate system to computational navigation coordinate system. The Euler platform error angle is utilized to represent the mathematical… More >

  • Open Access

    ARTICLE

    A Survey on Digital Image Steganography

    Jiaxin Wang1,*, Mengxin Cheng1, Peng Wu1, Beijing Chen1,2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 87-93, 2019, DOI:10.32604/jihpp.2019.07189

    Abstract Internet brings us not only the convenience of communication but also some security risks, such as intercepting information and stealing information. Therefore, some important information needs to be hidden during communication. Steganography is the most common information hiding technology. This paper provides a literature review on digital image steganography. The existing steganography algorithms are classified into traditional algorithms and deep learning-based algorithms. Moreover, their advantages and weaknesses are pointed out. Finally, further research directions are discussed. More >

  • Open Access

    ARTICLE

    Splicing Image and Its Localization: A Survey

    Jinwei Wang1,*, Yangyang Li2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 77-86, 2019, DOI:10.32604/jihpp.2019.07186

    Abstract With the rapid development of information technology, digital images have become an important medium for information transmission. However, manipulating images is becoming a common task with the powerful image editing tools and software, and people can tamper the images content without leaving any visible traces of splicing in order to gain personal goal. Images are easily spliced and distributed, and the situation will be a great threat to social security. The survey covers splicing image and its localization. The present status of splicing image localization approaches is discussed along with a recommendation for future research. More >

Displaying 51-60 on page 6 of 68. Per Page