With the development of the Internet, information carriers and communication methods have become diversified. As an important carrier for obtaining information, images are easily copied and tampered with during the co...
详细信息
digitalimages are captured by various fixed and mobile cameras, compressed with traditional and novel techniques, transmitted through different communication channels, and stored in various storage devices. Distortio...
详细信息
National traditional culture and traditional technology are the products of historical precipitation and indispensable precious resources. The establishment of national cultural database is of great significance for t...
详细信息
Aiming at the problems of complicated information processing and error analysis steps and low efficiency of the existing turntable data acquisition system, an optical testing turntable data acquisition system based on...
详细信息
With the rapid development of big data and Internet of Things (IoT), more and more digital products are emerging. However, this has also brought about a growing problem of copyright violation. digitalimage robust wat...
详细信息
The images from the linear array sensors circular scanning perpendicular to orbit have the properties of super wide breadth and high resolution, which also comes with the problem of stereo matching. One method to impr...
详细信息
This paper presents a method to simulate the dynamic handwriting process by constructing visually smooth stroke trajectories and utilizing variated stroke width to highlight Chinese calligraphy characteristic in real ...
详细信息
The digitalimage of embroidery has complex edge structure and high repetition rate texture features. Post-processing such as region detection is a challenging task. A long embroidery image data set for learning and t...
详细信息
Single-modal change detection methods based on optical or Synthetic Aperture Radar (SAR) images face challenges such as degradation due to adverse weather or noise interference. In contrast, multimodal change detectio...
详细信息
With the rapid development of the internet and information technology, the traditional encryption methods suffer from drawbacks such as poor processing capacity and low security, making them vulnerable to attacks. Thi...
详细信息
暂无评论