Handwritten signature verification is a commonly used method of identity authentication, but given its relatively lower fabrication difficulty compared to other biometric characteristics like facial recognition, desig...
详细信息
ISBN:
(数字)9798331507077
ISBN:
(纸本)9798331507084
Handwritten signature verification is a commonly used method of identity authentication, but given its relatively lower fabrication difficulty compared to other biometric characteristics like facial recognition, designing algorithms for this purpose poses greater challenges. Existing handwritten signature verification algorithms mainly suffer from two drawbacks: firstly, due to the private and confidentiality of signatures, there is often a lack of substantial high-quality signature images for model training. Secondly, the majority of existing algorithms are implemented using convolutional architectures, where the localized neighborhood operations of CNNs limit the model's ability to capture the global interrelationships of signature strokes. To address these challenges, we introduce a self-supervised learning algorithm grounded in the Transformer framework. This approach incorporates convolutional cropping and grayscale inversion for the preprocessing of input images. Additionally, we integrate a convolutional image block encoding module into the network to supplement the network with local contextual information. The superiority of our proposed algorithm over current state-of-the-art self-supervised algorithms is validated through t-SNE visualization modeling and comparative ablation studies, demonstrating its feasibility.
If we only care about the status of a particular vertex, instead of doing global diagnosis, Hsu and Tan introduced the concept of local diagnosis and proposed an extended star structure to diagnose a vertex under comp...
详细信息
Most of the current deep learning-based approaches for speech enhancement only operate in the spectrogram or wave-form domain. Although a cross-domain transformer combining waveform- and spectrogram-domain inputs has ...
Most of the current deep learning-based approaches for speech enhancement only operate in the spectrogram or wave-form domain. Although a cross-domain transformer combining waveform- and spectrogram-domain inputs has been proposed, its performance can be further improved. In this paper, we present a novel deep complex hybrid transformer that integrates both spectrogram and waveform domains approaches to improve the performance of speech enhancement. The proposed model consists of two parts: a complex Swin-Unet in the spectrogram domain and a dual-path transformer network (DPTnet) in the waveform domain. We first construct a complex Swin- $V$ net network in the spectrogram domain and perform speech enhancement in the complex audio spectrum. We then introduce improved DPT by adding memory-compressed attention. Our model is capable of learning multi-domain features to reduce existing noise on different domains in a complementary way. The experimental results on the BirdSoundsDenoising dataset and the VCTK+DEMAND dataset indicate that our method can achieve better performance compared to state-of-the-art methods.
Currently, in consumer electronics industry, quite a number of E-healthcare products highly depend on consumers' facial biometrics for both disease diagnosis and identity authen-tication. In light of this, various...
详细信息
This study delves into the dynamics of the Gierer–Meinhardt (GM) reaction–diffusion (RD) system, focusing on finite-time stability (FTS) and synchronization (FTSYN) within integer-order spatiotemporal partial differ...
详细信息
Spectral hypergraph theory mainly concerns using hypergraph spectra to obtain structural information about the given hypergraphs. The study of cospectral hypergraphs is important since it reveals which hypergraph prop...
For many cloud-based IoT device learning applications, including sensible clinical data analytics, phrase search - which allows retrieval of files containing a given term - plays a crucial role. In order to prevent se...
详细信息
ISBN:
(纸本)9798350375237
For many cloud-based IoT device learning applications, including sensible clinical data analytics, phrase search - which allows retrieval of files containing a given term - plays a crucial role. In order to prevent sensitive information from being exposed by third-party providers, data owners typically encrypt files (such as medical records) before sending them to the cloud. Having said that, this does make the search operation quite challenging and current searchable encryption systems for multiple keyword searches can't do word searches because they can't determine the location connection of multiple key phrases in a query word using encrypted data stored on the cloud server side. This study presents a model called MCLPS, which stands for 'Modified Cyber Law for Phrase Searching.' Its purpose is to identify specific phrases in a cloud environment. To test how well the model works, it is cross-validated with the traditional BET. The safety of information in the cloud has long been an important concern for cloud service providers and their clients, despite the fact that there are several elements that could affect data security during searches. The reason behind this is the presence of dangers posed by both external data sources and internal partners, namely, their employees. Therefore, due to its massive structure, maintaining this security perfect is an ongoing headache and difficult effort in the cloud. In most cases, this is achieved by encrypting data at all times and taking extra precautions to ensure that data is not compromised during the audition or any other internal exercises. For safe phrase search in cloud IoT, this study suggested the MCLPS model and the BET encryption technique. The data integration, recovery, indexing, sliding, encryption, decryption, and transfer processes are all encompassed in the suggested works. This proposed study introduces a new approach to encrypted searching that allows encrypted phrase searches, and the MCLPS ad BET proced
Steganography a cryptographic technique enables the concealment of confidential data within multimedia files like images and videos. This method facilitates the exchange of encrypted information through unconventional...
详细信息
ISBN:
(数字)9798350354171
ISBN:
(纸本)9798350354188
Steganography a cryptographic technique enables the concealment of confidential data within multimedia files like images and videos. This method facilitates the exchange of encrypted information through unconventional means, ensuring that only intended recipients can decipher the hidden message. The LSB technique has attracted significant attention in the literature due to its capability to conceal secret message bits within the least significant parts of image pixels. Although LSB has performed well in image steganography, there is some way to go in terms of its development, especially in the ways in which messages are dealt with. This paper presents a new technique of image steganography basing on the LSB method and the BROTLI algorithm. It uses the compression algorithm to compress message text. After that, to scramble the text, one LSB embedding technique is then used to hide the compressed text in the cover image. Applying the methods of data analysis on the benchmark images, the new approach developed outperforms the standard methods that exist at the present stage. This supports the idea of performing BROTLI on data with a view of compressing the data to be embedded in LSBs.
The importance of green energy is growing in the modern world. That's why, in terms of environmental impact, electric vehicles are the best option for commuters and car owners alike. Lithium-ion batteries are comm...
详细信息
A Neumaier graph is a non-complete edge-regular graph containing a regular clique. In this work, we prove several results on the existence of small strictly Neumaier graphs. In particular, we present a theoretical pro...
详细信息
暂无评论