206 Result(s)
-
Article
Open AccessCartoon copyright recognition method based on character personality action
Aiming at the problem of cartoon piracy and plagiarism, this paper proposes a method of cartoon copyright recognition based on character personality actions. This method can be used to compare the original car...
-
Article
Open Access4AC-YOLOv5: an improved algorithm for small target face detection
In real scenes, small target faces often encounter various conditions, such as intricate background, occlusion and scale change, which leads to the problem of omission or misdetection of face detection results...
-
Article
Open AccessFast CU size decision and intra-prediction mode decision method for H.266/VVC
H.266/Versatile Video Coding (VVC) is the most recent video coding standard developed by the Joint Video Experts Team (JVET). The quad-tree with nested multi-type tree (QTMT) architecture that improves the com...
-
Article
Open AccessHeterogeneous scene matching based on the gradient direction distribution field
Heterogeneous scene matching is a key technology in the field of computer vision. The image rotation problem is popular and difficult in the field of heterogeneous scene matching. In this paper, a heterogeneou...
-
Article
Open AccessRetraction Note: Research on professional talent training technology based on multimedia remote image analysis
-
Article
Open AccessAn image-guided network for depth edge enhancement
With the rapid development of 3D coding and display technologies, numerous applications are emerging to target human immersive entertainments. To achieve a prime 3D visual experience, high accuracy depth maps ...
-
Article
Open AccessAdaptive response maps fusion of correlation filters with anti-occlusion mechanism for visual object tracking
Despite the impressive performance of correlation filter-based trackers in terms of robustness and accuracy, the trackers have room for improvement. The majority of existing trackers use a single feature or fi...
-
Chapter
Toward the Creation and Obstruction of DeepFakes
AI-synthesized face- videos, commonly known as DeepFakes, is an emerging problem threatening the trustworthiness of online information. The need to develop and evaluate algorithms calls for large-scale datas...
-
Article
Open AccessTrademark infringement recognition assistance system based on human visual Gestalt psychology and trademark design
Trademarks are common graphic signs in human society. People used this kind of graphic sign to distinguish the signs of representative significance such as individuals, organizations, countries, and groups. Un...
-
Article
Open AccessReal-time embedded object detection and tracking system in Zynq SoC
With the increasing application of computer vision technology in autonomous driving, robot, and other mobile devices, more and more attention has been paid to the implementation of target detection and trackin...
-
Article
Open AccessNon-frontal facial expression recognition based on salient facial patches
Methods using salient facial patches (SFPs) play a significant role in research on facial expression recognition. However, most SFP methods use only frontal face images or videos for recognition, and they do n...
-
Article
Open AccessAn enhanced binarization framework for degraded historical document images
Binarization plays an important role in document analysis and recognition (DAR) systems. In this paper, we present our winning algorithm in ICFHR 2018 competition on handwritten document image binarization (H-DIB...
-
Article
Open AccessEvaluating effects of focal length and viewing angle in a comparison of recent face landmark and alignment methods
Recent attention to facial alignment and landmark detection methods, particularly with application of deep convolutional neural networks, have yielded notable improvements. Neither these neural-network nor mor...
-
Article
Open AccessSteganography algorithm based on modified EMD-coded PU partition modes for HEVC videos
As High Efficiency Video Coding (HEVC) is a worldwide popular video coding standard, the steganography of HEVC videos has gained more and more attention. Prediction unit (PU) is one of the most important innov...
-
Article
Open AccessHuman activity prediction using saliency-aware motion enhancement and weighted LSTM network
In recent years, great progress has been made in recognizing human activities in complete image sequences. However, predicting human activity earlier in a video is still a challenging task. In this paper, a no...
-
Article
Open AccessOnline social image ranking in diversified preferences
Due to the prevalence of social media service, effective and efficient online image retrieval is in urgent need to satisfy diversified requirements of Web users. Previous studies are mainly focusing on bridgin...
-
Article
Open AccessAre RGB-based salient object detection methods unsuitable for light field data?
Considering the significant progress made on RGB-based deep salient object detection (SOD) methods, this paper seeks to bridge the gap between those 2D methods and 4D light field data, instead of implementing ...
-
Article
Open AccessImage completion via transformation and structural constraints
Image completion is an approach to fill a damaged region (hole) in an image. In this study, we adopt a novel method which can repair a target region with structural constraints in an architectural scene. An ob...
-
Article
Open AccessReversible data hiding in encrypted binary image with shared pixel prediction and halving compression
In this paper, a new reversible data hiding scheme in encrypted binary image is proposed by shared pixel prediction and halving compression. We first divide binary image into non-overlap** pure color blocks ...
-
Article
Open AccessA study of hepatic fibrosis staging methods using diffraction enhanced imaging
The early hepatic fibrosis staging is very important for timely diagnosis, prognosis, and treatment of all chronic liver diseases. Diffraction-enhanced imaging, which can provide much more information on soft ...