In this paper, we propose a novel attack model called the Got Plaintext Attack (GPA), where the attacker only requires one plaintext and the ciphertext image set stored in the cloud to attack the content of the cipher...
详细信息
image preprocessing is important for deep learning image recognition tasks, and this paper introduces a new method called a bionic precoder, inspired by the human retinal visual system, to improve deep learning image ...
详细信息
Stereo image super-resolution (SR) has achieved great progress in recent years. However, the existing methods are unable to obtain rich cross-view information at a low computational cost. In addition, these methods tr...
详细信息
The proceedings contain 125 papers. The topics discussed include: two-stream federated learning: reduce the communication costs;a new update strategy for blocks with low correlation in 3-D recursive search;eye movemen...
ISBN:
(纸本)9781538644584
The proceedings contain 125 papers. The topics discussed include: two-stream federated learning: reduce the communication costs;a new update strategy for blocks with low correlation in 3-D recursive search;eye movement pattern modeling and visual comfort viewing S3D images;motion trajectory based spatial-temporal degradation measurement for video quality assessment;two-pass rate control for constant quality in high efficiency video coding;adaptive motion vector prediction for omnidirectional video;generative adversarial network-based frame extrapolation for video coding;a CNN-based in-loop filter with CU classification for HEVC;synthesizing 3D acoustic-articulatory mapping trajectories: predicting articulatory movements by long-term recurrent convolutional neural network;analysis of smoothed LHE methods for processingimages with optical illusions;and deep network with spatial and channel attention for person re-identification.
The growing demand for trustworthy picture forgery detection techniques to maintain the integrity of visual content across a range of applications is addressed in this work. To improve picture authentication accuracy ...
详细信息
Learned image compression (LIC) methods have made significant advances in recent years. In LIC, entropy model is an essential component, which utilizes conditional information to predict the probability distribution o...
详细信息
With the development of neural networks, the coding efficiency of learned image compression methods gradually exceeds that of traditional image codecs that are carefully designed and optimized by experts. However, the...
详细信息
Note-taking methods and devices have improved tremendously over the past few decades, and people are finding new ways to write notes and take photos. Automatic extraction, recognition, and retrieval are necessary to p...
详细信息
Computer imaging technology is a kind of use of digital photography, using a computer as amedium to realize interactive communication and interaction between humans and machines through the collection and processing o...
详细信息
ISBN:
(纸本)9783031243660;9783031243677
Computer imaging technology is a kind of use of digital photography, using a computer as amedium to realize interactive communication and interaction between humans and machines through the collection and processing of images and the editing and storage of graphic information. The purpose of this paper to study the design of the 3D imagevisual communication system based on computer image technology is to improve the mastery of 3D image technology and design the visual communication system. This article mainly uses experimental and comparative methods to analyze the feature extraction situation of the 3D imagevisual communication system, and finds that the error of the improved RANSAC algorithm in image feature extraction is about 54%, while the unimproved algorithm and other algorithms The error is greater. This shows that the improved algorithm proposed in this paper is incomparable in the 3D imagevisual communication system.
Traditional image coding standards are typically optimized with a focus on human perception, which conflicts with the fact that most of the images are now analyzed by machines. To enable a variety of downstream intell...
详细信息
暂无评论