Elections play a crucial part in any system of democracy, and it is imperative to guarantee that the voting process is carried out with impartiality and honesty. The destiny of our nation and the well-being of its in ...
详细信息
Due to rapid growth in technology there is a need to secure multimedia data like audio, video, text etc. available on the internet. In the proposed work, visual cryptography based watermarking techniques are proposed ...
详细信息
In the present research work, a system is developed that can detect objects in real-time using a combination of the ESP32 CAM module and Python programming. The goal was to show how affordable hardware and free softwa...
详细信息
ISBN:
(纸本)9798331540661;9798331540678
In the present research work, a system is developed that can detect objects in real-time using a combination of the ESP32 CAM module and Python programming. The goal was to show how affordable hardware and free software can be used to make a system that recognizes objects quickly and accurately. By using computer vision and machine learning tricks, the proposed system can figure out the different objects with great precision. The setup process involves putting some code onto the ESP32 CAM module, finding its IP address, and then making it work smoothly with Python. The proposed system was tested in different situations, like watching for things in surveillance, making tasks easier with automation, and helping out in assistive technologies.
Adversarial patch attacks pose a significant threat to the practical deployment of deep learning systems. However, existing research primarily focuses on image pre-processing defenses, which often result in reduced cl...
详细信息
ISBN:
(纸本)9798350349405;9798350349399
Adversarial patch attacks pose a significant threat to the practical deployment of deep learning systems. However, existing research primarily focuses on image pre-processing defenses, which often result in reduced classification accuracy for clean images and fail to effectively counter physically feasible attacks. In this paper, we investigate the behavior of adversarial patches as anomalies within the distribution of image information and leverage this insight to develop a robust defense strategy. Our proposed defense mechanism utilizes a clustering-based technique called DBSCAN to isolate anomalous image segments, which is carried out by a three-stage pipeline consisting of Segmenting, Isolating, and Blocking phases to identify and mitigate adversarial noise. Upon identifying adversarial components, we neutralize them by replacing them with the mean pixel value, surpassing alternative replacement options. Our model-agnostic defense mechanism is evaluated across multiple models and datasets, demonstrating its effectiveness in countering various adversarial patch attacks in image classification tasks. Our proposed approach significantly improves accuracy, increasing from 38.8% without the defense to 67.1% with the defense against LaVAN and GoogleAp attacks, surpassing prominent state-of-theart methods such as LGS [1] (53.86%) and Jujutsu [2] (60%).
The successful operation of a telecommunication system depends on the maintaining and transferring of high compression three-dimension medical images that produce reconstructions of excellent quality after decompressi...
详细信息
Cameras for capturing depth images typically suffer from low spatial resolution, whereas RGB cameras offer high resolution. A common approach to address these drawbacks of depth cameras is to combine them with RGB cam...
详细信息
ISBN:
(纸本)9798350377217;9798350377200
Cameras for capturing depth images typically suffer from low spatial resolution, whereas RGB cameras offer high resolution. A common approach to address these drawbacks of depth cameras is to combine them with RGB cameras using a fusion algorithm. We propose, implement and benchmark a new spatial upscaling algorithm based on edge extrapolation and compare it to state-of-the-art spatial upscaling methods. The edge extrapolation algorithm is very efficient and achieves cutting edge performance. It produces high-resolution depth maps with particularly clean edges, but like other state-of-the-art methods, it also exhibits certain specific artifacts. The new algorithm first interpolates the depth image and combines it with an RGB image to extract an edge map. The blurred edges of the interpolated depth map are then replaced by an extrapolation from neighboring pixels for the final high-resolution depth map. The algorithm is benchmarked using the Middlebury and DIML datasets, as well as a number of new 3D time-of-flight depth images.
The primary objective of our project is to execute the internet Key Exchange (IKE) protocol, which is commonly utilized for secure key exchange in virtual private networks (VPNs) and other secure connections. Our proj...
详细信息
Automatic modulation recognition is an important fundamental technology in the field of wireless communication, and effective modulation identification of target signals is a necessary prerequisite for applications su...
详细信息
We propose a learning-basedimage restoration algorithm for a single decoded image with a high-quality foreground and an extremely degraded background for video coding for machines (VCM). First, we develop an encoder ...
详细信息
ISBN:
(纸本)9781728198354
We propose a learning-basedimage restoration algorithm for a single decoded image with a high-quality foreground and an extremely degraded background for video coding for machines (VCM). First, we develop an encoder that extracts multiscale features and learns latent vectors. Then, a background generator with style and feature fusion blocks generates guided features that contain the prior background information in the input image. Finally, the decoder restores the degraded background region by merging the image features from the encoder and prior background information from the generator. Experimental results show that the proposed algorithm achieves better performance than state-of-the-art algorithms.
Due to the absence or mismatch of semantic information, existing few-shot image generation methods suffer from unsatisfactory generation quality and diversity, which have minimal benefits as data augmentation for down...
详细信息
暂无评论