![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
An image compression-then-encryption algorithm using piecewise asymptotic deterministic random measurement matrix
A digital Image Compression Encryption Method (ICEM) is proposed in this work by using the Compressed Sensing (CS), two-dimensional Logistic-adjusted-Sine map, the piecewise asymptotic deterministic system, dy...
-
Article
Hardware Spiking Neural Networks with Pair-Based STDP Using Stochastic Computing
Spiking Neural Networks (SNNs) can closely mimic the biological neural network systems. Recently, the SNNs have been developed in hardware circuits to emulate the time encoding and information-processing aspec...
-
Article
A grape disease identification and severity estimation system
It is an important research of automatically identifying the type and severity level of crop diseases, which affects food production, disease control, and economic loss prediction. Deep learning-based methods ...
-
Article
An image encryption scheme based on block compressed sensing and Chen’s system
Image encryption is a common way of information protection. However, most of the existing image encryption schemes have a low transmission efficiency and large memory consumption due to ciphertext redundancy. ...
-
Chapter and Conference Paper
Efficient-Secure k-means Clustering Guaranteeing Personalized Local Differential Privacy
One highly discussed research topic is user privacy protection and the usability of models in data mining tasks. Currently, the most k-means clustering approach using differential privacy is based on trusted thir...
-
Article
COVER: A Secure Blind Image Watermarking Scheme
The robustness and imperceptibility of the watermarking algorithm are a pair of contradictory properties. When the robustness increases, the imperceptibility decreases. Most strategies proposed in the literatu...
-
Chapter and Conference Paper
A Combined Feature Encoding Network with Semantic Enhancement for Image Tampering Forensics
Image tampering forensics is performed by analyzing images to locate the tampered regions. However, most image tampering detection methods lack locational accuracy and are effective only for specific types of ...
-
Article
Localization deception performance of FDA signals under passive bi-satellite reconnaissance
Time difference of arrival (TDOA) and frequency difference of arrival (FDOA) are widely adopted for passive bi-satellite positioning system (BPS) localization. Although TDOA/FDOA localization counter-measures ...
-
Chapter and Conference Paper
Automatic Segmentation and Diagnosis of Intervertebral Discs Based on Deep Neural Networks
Lumbar disc diagnosis belongs to Magnetic Resonance Imaging (MRI) segmentation and detection. It is a challenge for even the most professional radiologists to manually check and interpret MRI. In addition, hig...
-
Article
Improved compressed sensing for high-resolution ISAR image reconstruction
For inverse synthetic aperture radar (ISAR), an ISAR signal in the cross-range direction has the characteristic of sparsity in the azimuth frequency domain. Due to this property, a Fourier basis is adopted as ...