![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Rectifying Noisy Labels with Sequential Prior: Multi-scale Temporal Feature Affinity Learning for Robust Video Segmentation
Noisy label problems are inevitably in existence within medical image segmentation causing severe performance degradation. Previous segmentation methods for noisy label problems only utilize a single image whi...
-
Article
Image steganalysis based on attention augmented convolution
Steganalysis, as the opposite technique to steganography, has been applied to determine whether secret information is embedded in an image. The existing adaptive steganography methods embed secret information ...
-
Article
Gas Absorption and Mass Transfer in a Pore-Array Intensified Tube-in-Tube Microchannel
A pore-array intensified tube-in-tube microchannel (PA-TMC), which is characterized by high throughput and low pressure drop, was developed as a gas–liquid contactor. The sulfite oxidation method was used to d...
-
Article
Effects of rotor and stator geometry on dissolution process and power consumption in jet-flow high shear mixers
The jet-flow high shear mixer (JF-HSM) is a new type of intensified equipment with special configurations of the rotor and the stator. The mass transfer property and power consumption were studied in the solid...
-
Chapter and Conference Paper
A Generative Steganography Method Based on WGAN-GP
With the development of Generative Adversarial Networks (GAN), GAN-based steganography and steganalysis techniques have attracted much attention from researchers. In this paper, we propose a novel image stegan...
-
Chapter and Conference Paper
Secure Personal Health Records Sharing Based on Blockchain and IPFS
Personal Health Records (PHR) system has attracted intensive attention due to its universal accessibility and low cost in economics. Because of high cost of storing data and access control, most PHR systems ad...
-
Chapter and Conference Paper
Characterizing Label Errors: Confident Learning for Noisy-Labeled Image Segmentation
Convolutional neural networks (CNNs) have achieved remarkable performance in image processing for its mighty capability to fit huge amount of data. However, if the training data are corrupted by noisy labels, ...
-
Chapter and Conference Paper
Reversible Data Hiding Algorithm in Homomorphic Encrypted Domain Based on EC-EG
This paper proposes a reversible data hiding algorithm in homomorphic encrypted domain based on EC-EG. First, original image is segmented. The square grid pixel group randomly selected by image owner has one r...
-
Chapter and Conference Paper
A Lossless Data Hiding Scheme in Public Key Encrypted Domain Based on Homomorphic Key-Switching
This paper proposes a lossless data hiding in encrypted domain (RDH-ED) scheme. To realize the data extraction directly from the encrypted domain without the private key, a key-switching based least-significan...
-
Article
Reversible data hiding in JPEG images based on zero coefficients and distortion cost function
Recently, reversible data hiding (RDH) in joint photographic experts group (JPEG) images has received a great deal of attention since the JPEG image is one of the most popularly used image formats nowadays. Ge...
-
Article
Numerical investigation on the efficient mixing of overbridged split-and-recombine micromixer at low Reynolds number
It is promising to design a novel structured micromixer that can be easily processed but also exhibit high mixing efficiency as well as low pressure drop at a wide range of Reynolds numbers. The overbridged st...
-
Article
High-fidelity reversible data hiding by Quadtree-based pixel value ordering
Recently, the pixel value ordering (PVO) method has received a great deal of attention in the field of high-fidelity reversible data hiding. To improve the embedding performance of the PVO-based method, a quad...
-
Chapter and Conference Paper
Novel Iterative Attention Focusing Strategy for Joint Pathology Localization and Prediction of MCI Progression
Mild Cognitive Impairment (MCI) is the prodromal stage of Alzheimer’s disease (AD), with a high incident rate converting to AD. Hence, it is critical to identify MCI patients who will convert to AD patients fo...
-
Chapter and Conference Paper
High-Fidelity Reversible Data Hiding Algorithm Based on SVD
The conventional reversible data hiding (RDH) is limited by the problem of distortion caused by embedding the secret data on the original carrier image. Therefore, in this work, a high-fidelity RDH algorithm w...
-
Chapter and Conference Paper
Multi-Task Convolutional Neural Network for Joint Bone Age Assessment and Ossification Center Detection from Hand Radiograph
Bone age assessment is a common clinical procedure to diagnose endocrine and metabolic disorders in children. Recently, a variety of convolutional neural network based approaches have been developed to automat...
-
Chapter and Conference Paper
Regression-Based Line Detection Network for Delineation of Largely Deformed Brain Midline
Brain midline shift is often caused by various clinical conditions such as high intracranial pressure, which can be deadly. To facilitate clinical evaluation, automated methods have been proposed to classify ...
-
Chapter and Conference Paper
Dynamic Spectral Graph Convolution Networks with Assistant Task Training for Early MCI Diagnosis
Functional brain connectome, also known as inter-regional functional connectivity (FC) matrix, is recently considered providing decisive markers for early mild cognitive impairment (eMCI). However, in most exi...
-
Article
Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding
Reversible data hiding in encrypted images (RDHEI) is a technique that makes contributions to cloud data management in privacy preservation and data security. A novel framework of RDHEI with high embedding cap...
-
Chapter and Conference Paper
An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble
In order to enhance the detection rate of ensemble classifiers in steganalysis, concern the problems that the accuracy of basic classifier is low and the kind of basic classifier is single in typical ensemble...
-
Chapter and Conference Paper
Generative Steganography Based on GANs
Traditional steganography algorithms embed secret information by modifying the content of the images, which makes it difficult to fundamentally resist the detection of statistically based steganalysis algorit...