skip to main content
Volume 79, Issue 29-30Aug 2020
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISSN:1380-7501
Reflects downloads up to 06 Jan 2025Bibliometrics
research-article
Computer-aided diagnosis (CAD) system based on multi-layer feature fusion network for skin lesion recognition in dermoscopy images
Abstract

Skin lesion recognition is one of the most important tasks in dermoscopic image analysis. Current Convolutional Neural Network (CNN) algorithms based recognition methods tend to become a standard methodology to fix a large array of Computer-Aided ...

correction
research-article
A target response adaptive correlation filter tracker with spatial attention
Abstract

In recent years, many efficient and accurate algorithms have been proposed in the field of target tracking. The existing correlation filter(CF) based tracking expands the sample through cyclic shift and uses the position of the maximum response ...

research-article
Performance enhancement techniques for traffic sign recognition using a deep neural network
Abstract

An advanced traffic sign recognition (ATSR) system using novel pre-processing techniques and optimization techniques has been proposed. During the pre-processing of input road images, color contrasts are enhanced and edges are made clearer, for ...

research-article
Voxel-based quadrilateral mesh generation from point cloud
Abstract

In recent years point cloud has been used more and more widely in CAD and computer graphics communities due to the availability of fast and accurate laser scan devices. Many works focus on reconstructing a triangle mesh from a point cloud but few ...

research-article
Symmetry-aware kinematic skeleton generation of a 3D human body model
Abstract

In this paper, an automatic method is proposed to generate a symmetry-aware kinematic skeleton for a human body model with an arbitrary pose and orientation. First, a template kinematic skeleton with semantics is embedded into the input human body ...

research-article
Improving the robustness of gaze tracking under unconstrained illumination conditions
Abstract

In human-computer interaction (HCI) applications, the performance degradation of gaze trackers in real-world environments is a critical issue. Typically, gaze trackers utilize the pupil center and corneal reflection (CR) obtained from an infrared (...

research-article
Learning double weights via data augmentation for robust sparse and collaborative representation-based classification
Abstract

Image classification is a hot technique applied in many multimedia systems, where both l1 and l2 regularizations have shown potential for robust sparse representation-based image classification. However, previous studies showed that l1 or l2 alone ...

research-article
Real-time visual tracking via multi-cue based adaptive particle filter framework
Abstract

Visual tracking using particle filter has been extensively investigated due to its myriad of application in the field of computer vision. However, particle filter framework performance is heavily impaired due to its inherent problems namely, ...

research-article
Efficient chaotic-based image cryptosystem with different modes of operation
Abstract

This paper proposes a design of 2-D chaotic Baker map for image encryption which utilizes three modes of operations: 1) the cipher block chaining (CBC) mode, 2) the cipher feedback (CFB) mode, and 3) the output feedback (OFB) mode. The proposed ...

research-article
Gate and common pathway detection in crowd scenes and anomaly detection using motion units and LSTM predictive models
Abstract

In this paper, we propose two approaches to analyze the crowd scenes. The first one is motion units and meta-tracking based approach (MUDAM Approach). In this approach, the scene is divided into a number of dynamic divisions with coherent motion ...

research-article
PolyCodes: generating cancelable biometric features using polynomial transformation
Abstract

Cancelable biometrics is a template protection technique proposed to bridge the growing gap between ‘biometrics for security’ and ‘security for biometrics’. Various approaches have been reported in literature, yet transforming a biometric template ...

research-article
Multiple-image encryption algorithm based on bit planes and chaos
Abstract

In the era of big data, many fields produce massive images every day. To improve the security of image transmission, a multiple-image encryption algorithm based on bit planes and chaos is proposed. Firstly, k images are decomposed into 8k bit ...

research-article
Hand gesture recognition in real world scenarios using approximate string matching
Abstract

New interaction paradigms combined with emerging technologies have produced the creation of diverse Natural User Interface (NUI) devices in the market. These devices enable the recognition of body gestures allowing users to interact with ...

research-article
A robust cryptosystem to enhance the security in speech based person authentication
Abstract

The developments in technology have made us utilizing speech as a biometric to authenticate persons. In this paper, speech encryption and decryption algorithm are presented for enhancing the security in speech-based person authentication systems. ...

research-article
Entropy-assisted adaptive compressive sensing for energy-efficient visual sensors
Abstract

Compressive Imaging (CI) is a potential sensing technology for energy-efficient visual sensors, and its rate-distortion performance can be improved by adaptive Compressive Sensing (CS) of image. However, due to the unavailability of original image,...

research-article
AutoTrustRec: Recommender System with Social Trust and Deep Learning using AutoEncoder
Abstract

Deep learning is the most active research topic amongst data scientists and analysts these days. It is because deep learning has provided very high accuracy in various domains such as speech recognition, image processing and natural language ...

research-article
Neighborhood min distance descriptor for kinship verification
Abstract

The verification of parental and family relationships based on the facial appearance of subjects is a recent topic that attracted the attention of the computer vision research community. So many feature descriptors for facial images have been ...

research-article
Efficient reversible data hiding based on the histogram modification of differences of pixel differences
Abstract

Histogram modification is one of the most successful reversible data hiding methods. Among many histogram-modification techniques, difference-histogram-based methods perform well, but the efficiency of difference-histogram-based methods is still ...

research-article
Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking
Abstract

In this work, an active forgery detection scheme is proposed to locate the tampered region from a forged digital image. In this regard, an authentication code is formed and subsequently, the same is concealed into each pixel for the realization of ...

research-article
HEVC-based three-layer texture and depth coding for lossless synthesis in 3D video coding
Abstract

Efficient lossless coding of a texture image and its corresponding depth map is important to perform accurate view synthesis in 3D applications. In this paper, a novel HEVC-based three-layer texture and depth coding method is proposed for lossless ...

research-article
An image denoising iterative approach based on total variation and weighting function
Abstract

Image denoising is an important technology for image preprocessing. In recent years, the image denoising technology based on total variation (TV) has been rapidly developed. However, However, although it can preserve image details well, which ...

research-article
Extended exploiting modification direction based steganography using hashed-weightage Array
Abstract

Steganography is the method of hiding secret message information in various cover media like text, image, audio, video and others without raising suspicion to intruders about the existence of any such information. Exploiting Modification Direction ...

research-article
An extended KCF tracking algorithm based on TLD structure in low frame rate videos
Abstract

The KCF (Kernelized Correlation Filter) algorithm achieved a good performance on target tracking challenges. However, it still has some defects and problems of false tracking in low frame rate (LFR) scenarios, target scale variation, occlusion and ...

research-article
A two-stage filter for high density salt and pepper denoising
Abstract

Image restoration is an important and interesting problem in the field of image processing because it improves the quality of input images, which facilitates postprocessing tasks. The salt-and-pepper noise has a simpler structure than other noises,...

research-article
Orientation Invariant Skeleton Feature (OISF): a new feature for Human Activity Recognition
Abstract

Human Activity Recognition is the process of identifying the activity of a person by analyzing continuous frames of a video. In many application areas, human activity identification is either a direct goal or it is a key segment of a bigger ...

research-article
DASH based video caching in MEC-assisted heterogeneous networks
Abstract

Recently, the demand for video applications has become more and more pressing. To save backhaul bandwidth and reduce the network delay, Mobile Edge Computing (MEC) has arisen as a promising technique in future mobile networks. It can provide the ...

research-article
Visualization techniques to support CCTV operators of smart city services
Abstract

In this paper visualization techniques for modern closed circuit television (CCTV) smart city services are discussed with application to prevention of threats. Unconventional approaches to the intelligent visual data processing are proposed in ...

research-article
Satellite image fusion based on modified central force optimization
Abstract

Nowadays, optimization has become a brand methodology for different applications. One of the most promising fields for application of optimization is the image processing field, especially image fusion. A new effective deterministic optimization ...

research-article
Combining LSB embedding with modified Octa-PVD embedding
Abstract

This paper proposes a new image steganographic method that effectively combines LSB embedding with Octa-PVD embedding. A cover image is divided into non-overlapping 3 × 3 sub-blocks, the n least significant bits of the center pixel of each sub-...

Comments