Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    (kn) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability

    In the traditional secret image sharing (SIS) scheme, the secret image is divided into several noise-like shares, which lack authentication and may attract the attention of malicious users. Therefore, the auth...

    Fei Hu, Weihai Li, Nenghai Yu in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    DBA-UNet: a double U-shaped boundary attention network for maxillary sinus anatomical structure segmentation in CBCT images

    Accurate identification of the maxillary sinus and maxillary sinus septum on cone beam computed tomography (CBCT) is essential for appropriate surgical methods. However, the large-scale gap and the prior knowl...

    Yi Zhang, Kun Qian, Zhiyuan Zhu, Hai Yu, Bo Zhang in Signal, Image and Video Processing (2023)

  3. No Access

    Chapter and Conference Paper

    Research on Virtual and Real Spatial Data Interconnection Map** Technology for Digital Twin

    In recent years, distributed photovoltaics, decentralized wind power, new loads, electric vehicles, etc. have been connected to the power grid in a wide range, and the distribution network has become more acti...

    Zhimin He, Lin Peng, Hai Yu, He Wang in 3D Imaging—Multidimensional Signal Process… (2023)

  4. No Access

    Chapter and Conference Paper

    Research on Application Technology of Multi-source Fusion of 3D Digital Resources in Power Grid

    In view of the technical requirements of 3D model resource fusion in power grid infrastructure and operation and inspection, this paper studies the spatial transformation of multi-media heterogeneous models, p...

    Hai Yu, Zhimin He, Lin Peng, Jian Shen in 3D Imaging—Multidimensional Signal Process… (2023)

  5. No Access

    Article

    \(\hbox {ABDF}^{2}\) -Net: an adaptive bi-directional features fusion network for real-time detection of threat object

    To achieve automatic detection of threat objects for X-ray baggage screening, we propose an adaptive bi-directional features fusion network ( $...

    Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang in Journal of Real-Time Image Processing (2022)

  6. No Access

    Article

    An ultrahigh-resolution image encryption algorithm using random super-pixel strategy

    Almost all existing image encryption algorithms are only suitable for low-resolution images in the standard image library. When they are used to encrypt high-resolution images, they will inevitably suffer from...

    Wei Zhang, Weijie Han, Zhiliang Zhu, Hai Yu in Multimedia Tools and Applications (2021)

  7. No Access

    Article

    AFTD-Net: real-time anchor-free detection network of threat objects for X-ray baggage screening

    X-ray baggage screening is a vitally important task to detect all kinds of threat objects at controlled access positions, which can prevent crime and guard personal safety. It is generally performed by screene...

    Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang in Journal of Real-Time Image Processing (2021)

  8. No Access

    Article

    An automated detection model of threat objects for X-ray baggage inspection based on depthwise separable convolution

    X-ray baggage inspection is an essential task to detect threat objects at important controlled access places, which can guard personal safety and prevent crime. Generally, it is carried out by screeners to vis...

    Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang in Journal of Real-Time Image Processing (2021)

  9. No Access

    Article

    A novel compressive sensing-based framework for image compression-encryption with S-box

    In this paper, we find that compressive sensing (CS) with the chaotic measurement matrix has a strong sensitivity to plaintext. Because of the quantification executed after CS, however, the plaintext sensitivi...

    Zhiliang Zhu, Yanjie Song, Wei Zhang, Hai Yu in Multimedia Tools and Applications (2020)

  10. No Access

    Article

    Real-time attacks on robust watermarking tools in the wild by CNN

    Robust watermarking is a widely used technology to protect image copyright. Robustness, the ability to resist various distortions, is the most important property of robust watermarking algorithm. So to improve...

    Linfeng Geng, Weiming Zhang, Haozhe Chen, Han Fang in Journal of Real-Time Image Processing (2020)

  11. No Access

    Chapter and Conference Paper

    A Method for Precise Positioning and Rapid Correction of Blue License Plate

    To alleviate the problems of slow speed and weak correction ability of existing license plate correction methods under complex conditions, this paper presents a faster license plate positioning method based on...

    Jiawei Wu, Zhaochai Yu, Zuchang Zhang in Advances in Intelligent Information Hiding… (2020)

  12. No Access

    Article

    Object and patch based anomaly detection and localization in crowded scenes

    Detecting and localizing anomalies in crowded scenes is an ongoing challenge for public security. Existing approaches are mainly based on patches and trajectories. However, they fall short in semantic understa...

    **aodan Li, Weihai Li, Bin Liu, Nenghai Yu in Multimedia Tools and Applications (2019)

  13. No Access

    Article

    Efficient protection using chaos for Context-Adaptive Binary Arithmetic Coding in H.264/Advanced Video Coding

    Recently, video encryption has been widely investigated to enhance the protection for video data, yet the encryption efficiency may not be considered sufficiently so that some encryption schemes are unsuitable...

    Yanjie Song, Zhiliang Zhu, Wei Zhang, Hai Yu in Multimedia Tools and Applications (2019)

  14. No Access

    Article

    A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization

    This paper proposes a novel robust image watermarking scheme in Discrete Cosine Transform (DCT) domain for active forensics. We investigate the relation between the positions and the modification magnitudes of...

    Han Fang, Hang Zhou, Zehua Ma, Weiming Zhang in Multimedia Tools and Applications (2019)

  15. No Access

    Article

    Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection

    This paper intents to solve the challenging problem of steganographer detection in the real world from a new perspective: side channel attack. We propose utilizing the behavior of actors in the social network ...

    Li Li, Weiming Zhang, Kejiang Chen, Hongyue Zha in Multimedia Tools and Applications (2019)

  16. No Access

    Article

    A no-reference quality assessment for contrast-distorted image based on improved learning method

    No-reference image quality assessment (NR-IQA), which aims to predict image quality without accessing to reference images, is a fundamental and challenging problem in the field of image processing. Nevertheles...

    Yaojun Wu, Yonghe Zhu, Yang Yang, Weiming Zhang in Multimedia Tools and Applications (2019)

  17. No Access

    Article

    Which gray level should be given the smallest cost for adaptive steganography?

    Currently, the most successful approach to steganography in digital image is distortion-minimization framework, which reduces the steganographers’ work to the design of distortion function with the aid of prac...

    Yao Wei, Weiming Zhang, Weihai Li, Nenghai Yu, ** Sun in Multimedia Tools and Applications (2018)

  18. No Access

    Article

    A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images

    In this paper, we attempt to investigate the secure archiving of medical images which are stored on semi-trusted cloud servers, and focus on addressing the complicated and challenging integrity control and pri...

    Yang Yang, Weiming Zhang, Dong Liang, Nenghai Yu in Multimedia Tools and Applications (2018)

  19. No Access

    Article

    Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification

    This study proposes a reversible data hiding (RDH) algorithm for 3D mesh models based on the optimal three-dimensional prediction-error histogram (PEH) modification with recursive construction coding (RCC). Fi...

    Ruiqi Jiang, Weiming Zhang, Dongdong Hou, Hui Wang in Multimedia Tools and Applications (2018)

  20. No Access

    Chapter and Conference Paper

    Anomaly Detection with Passive Aggressive Online Gaussian Model Estimation

    Anomaly detection is an important topic for surveillance video analysis and public security management. One of the major challenges comes from the fact that there is no abnormal data for training in most cases...

    Zheran Hong, Bin Liu in Advances in Multimedia Information Processing – PCM 2017 (2018)

previous disabled Page of 2