As information technology advances rapidly, the demand for data security continues to grow. Chaos theory and algebraic groups have become a focal point in cryptographic research, providing a foundation for designing m...
As information technology advances rapidly, the demand for data security continues to grow. Chaos theory and algebraic groups have become a focal point in cryptographic research, providing a foundation for designing more robust block cipher algorithms. This article introduces a password algorithm based on chaos and algebraic groups, proposing the Lorenz chaos-geometric Goppa code composite password algorithm that has demonstrated significant achievements in imageprocessing. In comparison to traditional methods, this algorithm exhibits the shortest key length and reduced error rates in imageprocessing, offering a more reliable data protection solution for practical applications. This research opens up new possibilities for enhancing the security and performance in the field of cryptography.
Face morphing attacks have posed severe threats to Face Recognition systems (FRS), which are operated in border control and passport issuance use cases. Correspondingly, morphing attack detection algorithms (MAD) are ...
详细信息
ISBN:
(纸本)9798350365474
Face morphing attacks have posed severe threats to Face Recognition systems (FRS), which are operated in border control and passport issuance use cases. Correspondingly, morphing attack detection algorithms (MAD) are needed to defend against such attacks. MAD approaches must be robust enough to handle unknown attacks in an open-set scenario where attacks can originate from various morphing generation algorithms, post-processing and the diversity of printers/scanners. The problem of generalization is further pronounced when the detection has to be made on a single suspected image. In this paper, we propose a generalized single-image-based MAD (S-MAD) algorithm by learning the encoding from Vision Transformer (ViT) architecture. Compared to CNN-based architectures, ViT model has the advantage on integrating local and global information and hence can be suitable to detect the morphing traces widely distributed among the face region. Extensive experiments are carried out on face morphing datasets generated using publicly available FRGC face datasets. Several state-of-the-art (SOTA) MAD algorithms, including representative ones that have been publicly evaluated, have been selected and benchmarked with our ViT-based approach. Obtained results demonstrate the improved detection performance of the proposed S-MAD method on inter-dataset testing (when different data is used for training and testing) and comparable performance on intra-dataset testing (when the same data is used for training and testing) experimental protocol.
Vector quantization based on the Gauss mixture model (GMM) and the quadratic discriminant analysis (QDA) distortion measure has been shown to perform well in statistical image classification problems. Previous work in...
详细信息
The sparse and redundant representations of signal theory have aroused extensive and deep research in recent years, and been widely applied to imageprocessing. Aiming to study the performance and suitability of the s...
详细信息
Schools in many parts of the world use robots as social peers in order to interact with children and young students for a rich experience. Such use has shown significant enhancement of children's learning. This pr...
详细信息
ISBN:
(纸本)9781450363792
Schools in many parts of the world use robots as social peers in order to interact with children and young students for a rich experience. Such use has shown significant enhancement of children's learning. This project uses the humanoid robot NAO which provides object recognition of colours, shapes, typed words, and handwritten digits and operators. The recognition of typed words provides performance of the corresponding movements in the sign language. Five classifiers including neural networks are used for the handwritten recognition of digits and operators. The accuracy of the object recognition algorithms are within the range of 82%-91% when tested on images captured by the robot including the movements which represent words in the sign language. The five classifiers for handwritten recognition produce highly accurate results which are within the range of 87%-98%. This project will serve as a promising provision for an affective touch for children and young students.
In the area of biomedical imageprocessing, medical image segmentation plays a crucial role. Today due to the deep sculptures of deep neural networks and innovative by-passes like the Transformers this field has rejuv...
详细信息
We propose a segmentation approach which integrates region growing and edge detection in a regularization framework. Our method is a modified active contour model and uses region statistics in addition to gradient inf...
详细信息
ISBN:
(纸本)0819417823
We propose a segmentation approach which integrates region growing and edge detection in a regularization framework. Our method is a modified active contour model and uses region statistics in addition to gradient information. We formulate the active contour model using a Bayesian approach. We have implemented this integrated approach and characterized its performance on synthetic images and on 36 short-axis cardiac ultrasound images. The resulting boundaries are compared to true boundaries in the case of the synthetic images and to manually outlined boundaries in the case of ultrasound images. The results are also compared with those obtained using the balloon force to expand the active contour model. We found that our integrated algorithm detects boundaries more accurately than the active contour method using a balloon force. Furthermore, the integrated algorithm is less sensitive to the placement of the initial contour inside the LV cavity than the active contour algorithm using a balloon force.
Biometric systems have great importance in modern society. Today, we can find biometric systems using hardware technologies to provide an increasingly fast response. Partly this is possible due to the use of algorithm...
详细信息
Blind image steganalysis is the classification problem of determining whether an image contains any hidden data or not. This blind process doesn't need any prior information about the embedding algorithm which is ...
详细信息
ISBN:
(纸本)9781728140698
Blind image steganalysis is the classification problem of determining whether an image contains any hidden data or not. This blind process doesn't need any prior information about the embedding algorithm which is used to hide data on the examined images. Recently, Convolutional Neural Network (CNN) is presented to deal with the blind image steganalysis classification problem. Most of the CNN-based image steganalysis approaches can't cope with low payloads. Improved Gaussian Convolutional Neural Network (IGNCNN) is presented with a transfer learning method in order to deal with stego-images with low payloads. IGNCNN contains a pre-processing layer which is consisted of a fixed coefficients (data-set independent) high pass filter (HPF). IGNCNN also is a fixed learning rate based-CNN. In this paper, a dynamic learning rate-based CNN approach is proposed, in order to highly minimize the detection error cost. Nevertheless, the proposed approach uses a dataset dependent-based Gaussian HPF instead, as a preprocessing layer, in order to well-choose a cutoff frequency depending on the training dataset. Experiments are performed on graphical processing units (GPUs) with the standard BOSSbase 1.01 dataset exposed to the S-UNIWARD and WOW image steganographic algorithms. Results show that the proposed approach outperforms computing approaches, GNCNN, improved GNCNN, SRM and SRM+EC, by an average increase of 7.4%, 5.3%, 4.1% and 2.8% respectively in terms of accuracy metric.
Some of the recently developed image reconstruction algorithms for cone-beam computed tomography (CBCT) involve the. computation of the finite Hilbert transform. We have previously studied noise property of the finite...
详细信息
ISBN:
(纸本)9780819470973
Some of the recently developed image reconstruction algorithms for cone-beam computed tomography (CBCT) involve the. computation of the finite Hilbert transform. We have previously studied noise property of the finite Hilbert transform and observed that it can be used for potentially improving the image noise property within a region of interest (ROI) in IGRT. Imaging radiation dose is one of the critical issues in IGRT, and in addition to existing dose-reduction schemes by use of ROI imaging, it is possible to achieve further patient dose reduction through modulating beam intensity so-that a sub-ROI in the ROI be exposed by high flux of x-ray photons and the rest of the ROI be exposed by low flux of them. In this work, we investigate the technique for obtaining sub-ROI images, which is supposed to include the target under treatment, with high contrast-to-noise ratio (CNR) and the images within the rest of the ROI with low CNR. Numerical studies have been conducted as a preliminary in this work.
暂无评论