![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
(k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability
In the traditional secret image sharing (SIS) scheme, the secret image is divided into several noise-like shares, which lack authentication and may attract the attention of malicious users. Therefore, the auth...
-
Chapter and Conference Paper
Affinity-Aware Relation Network for Oriented Object Detection in Aerial Images
Object detection in aerial images is a challenging task due to the oriented and densely packed objects. However, densely packed objects constitute a significant characteristic of aerial images: objects are not...
-
Chapter and Conference Paper
Neural Watermarking for 3D Morphable Models
3D morphable models (3DMMs) have been widely used in computer graphics applications. Therefore, digital watermarking for 3DMMs can also become a valuable research direction in the near future. However, previou...
-
Chapter and Conference Paper
Exploration of Optimized Teaching Mode in Applied Technology Colleges Under the Background of Big Data
Under the background of big data era, private universities should make big data not only a teaching tool and means for teachers, but also a teaching platform for students’ professional learning and practical t...
-
Chapter and Conference Paper
PTAC: Privacy-Preserving Time and Attribute Factors Combined Cloud Data Access Control with Computation Outsourcing
Cloud storage service has significant advantages on both cost reduction and convenient data sharing. It frees data owners from technical management. However, it poses new challenges on privacy and security pro...
-
Article
An ultrahigh-resolution image encryption algorithm using random super-pixel strategy
Almost all existing image encryption algorithms are only suitable for low-resolution images in the standard image library. When they are used to encrypt high-resolution images, they will inevitably suffer from...
-
Chapter and Conference Paper
Bone Marrow Cell Segmentation Based on Improved U-Net
Automatic segmentation of bone marrow cells plays an important role in the diagnosis of many blood diseases such as anemia and leukemia. Due to the complex morphology and wide variety of bone marrow cells, the...
-
Article
A novel compressive sensing-based framework for image compression-encryption with S-box
In this paper, we find that compressive sensing (CS) with the chaotic measurement matrix has a strong sensitivity to plaintext. Because of the quantification executed after CS, however, the plaintext sensitivi...
-
Chapter and Conference Paper
Using GitHub Open Sources and Database Methods Designed to Auto-Generate Chinese Tang Dynasty Poetry
Writing a Tang-Dynasty poetry in Chinese is very popular and useful in the tradition Chinese culture education field, In this paper we use GitHub open sources “jieba” Algorithm for text segmentation of Chinese...
-
Chapter and Conference Paper
Learning from Rankings with Multi-level Features for No-Reference Image Quality Assessment
Deep neural networks for image quality assessment have been suffering from a lack of training data for a long time, as it is expensive and laborious to collect sufficient subjective mean opinion scores (MOS). ...
-
Chapter and Conference Paper
Machine Learning Based Tongue Image Recognition for Diabetes Diagnosis
Tongue diagnosis of Traditional Chinese Medicine (TCM) is of great significance in the diagnosis of diabetes. To reduce the subjectivity of doctors in clinical diagnosis, this paper proposes a method for diabe...
-
Chapter and Conference Paper
Application of High-Throughput Sequencing Data Mining in Comparison of Gene Expression Profile in Renal Cell Carcinoma and Normal Renal Cell by RNA-Seq
Because of the advantages of RNA sequencing technology, this study selected SOLID technology as the transcriptome research method for clear cell renal cell carcinoma. The transcriptome sequencing of clear cell...
-
Chapter and Conference Paper
Reset Attack: An Attack Against Homomorphic Encryption-Based Privacy-Preserving Deep Learning System
In some existing privacy-preserving deep learning systems, additively homomorphic encryption enables ciphertext computation across the gradients. Therefore, many learning participants can perform neural networ...
-
Chapter and Conference Paper
A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code
QR code has been widely used in our daily life due to its convenience, and the security of QR code becomes a rising problem. In this paper, we introduce a new algorithm that adds the edge of the gray image to ...
-
Chapter and Conference Paper
Research on Online Leakage Assessment
Leakage assessment is the most common approach applied for assessing side-channel information leakage and validating the effectiveness of side-channel countermeasures. Established evaluation approaches are usu...
-
Chapter and Conference Paper
UDC 2020 Challenge on Image Restoration of Under-Display Camera: Methods and Results
This paper is the report of the first Under-Display Camera (UDC) image restoration challenge in conjunction with the RLQ workshop at ECCV 2020. The challenge is based on a newly-collected database of Under-Dis...
-
Article
Object and patch based anomaly detection and localization in crowded scenes
Detecting and localizing anomalies in crowded scenes is an ongoing challenge for public security. Existing approaches are mainly based on patches and trajectories. However, they fall short in semantic understa...
-
Article
Efficient protection using chaos for Context-Adaptive Binary Arithmetic Coding in H.264/Advanced Video Coding
Recently, video encryption has been widely investigated to enhance the protection for video data, yet the encryption efficiency may not be considered sufficiently so that some encryption schemes are unsuitable...
-
Article
A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization
This paper proposes a novel robust image watermarking scheme in Discrete Cosine Transform (DCT) domain for active forensics. We investigate the relation between the positions and the modification magnitudes of...
-
Article
Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection
This paper intents to solve the challenging problem of steganographer detection in the real world from a new perspective: side channel attack. We propose utilizing the behavior of actors in the social network ...