Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








164 Hits in 6.4 sec

Perceptual Hashing Based Forensics Scheme for the Integrity Authentication of High Resolution Remote Sensing Image

Kaimeng Ding, Fan Meng, Yueming Liu, Nan Xu, Wenjun Chen
2018 Information  
Secondly, the multi-scale edge features of the grid cells are extracted by the edge chains based on the adaptive strategy.  ...  In this paper, a perceptual hashing based forensics scheme is proposed for the integrity authentication of a HRRS image.  ...  [26] proposed a perceptual image hashing algorithm by combining latent low-rank representation and rotation invariant uniform local binary patterns.  ... 
doi:10.3390/info9090229 fatcat:qn37elavbndfjlmbs5v466fdmq

A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images

Kaimeng Ding, Yueming Liu, Qin Xu, Fuqiang Lu
2020 ISPRS International Journal of Geo-Information  
In this paper, we introduce the concept of subject-sensitive perceptual hash, which can be seen as a special case of conventional perceptual hash, for the integrity authentication of HRRS image.  ...  MUM-Net is the core of perceptual hash algorithm, and it uses focal loss as the loss function to overcome the imbalance between the positive and negative samples in the training samples.  ...  The biggest difference between MU sub-net and original U-net is that MU sub-net adds multi-scale inputs to extract richer content features.  ... 
doi:10.3390/ijgi9080485 fatcat:qy4bp5pymbgx3drfbefgouvelm

A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication

Abdul Subhani Shaik, Ram Kumar Karsh, Mohiul Islam, Surendra Pal Singh, Shaohua Wan
2022 Wireless Communications and Mobile Computing  
In this paper, a convolutional stacked denoising autoencoder (CSDAE) is utilized for producing hash codes that are robust against different content preserving operations (CPOs).  ...  Subsequently, tampered localization is done by comparing the decoder output of the manipulated image with the hash of the actual image.  ...  research scholars belonging to the Image Processing Lab of ECE Department, NIT Silchar, Assam, India, and all the members of the R&D Section, CMR College of Engineering & Technology, Hyderabad, India, for  ... 
doi:10.1155/2022/1645658 fatcat:qchb745jwzgntes3zc3uhwzf2e

High-Resolution Remote Sensing Image Integrity Authentication Method Considering Both Global and Local Features

Xingang Zhang, Haowen Yan, Liming Zhang, Hao Wang
2020 ISPRS International Journal of Geo-Information  
Due to this reason, a robust HRRS images integrity authentication algorithm using perceptual hashing technology considering both global and local features is proposed in this paper.  ...  Existing HRRS image integrity authentication methods are mostly binary decision-making processes, which cannot provide a further interpretable information (e.g., tamper localization, tamper type determination  ...  Three tampered images with different grid sizes are selected for multi-scale tampering localization tests, which reflect the same tampered area.  ... 
doi:10.3390/ijgi9040254 fatcat:ucrfgiseyffpxj3dm473jnfhiq

Large-scale multimedia signal processing for security and digital forensics [SI 1163]

Ebroul Izquierdo, Krishna Chandramouli, Anthony T. S. Ho, Hyoung Joong Kim
2021 Multimedia tools and applications  
The fusion of pores and minutiae at score level is used to re-rank the minutiae based latent matcher.  ...  ., introduces a new hash algorithm for the RGB image is proposed that is able to validate the integrity and localise the tampered region within the image.  ... 
doi:10.1007/s11042-021-11108-3 fatcat:g3oxcmd7fre3dpobr27zytff2y

Person Re-Identification over Encrypted Outsourced Surveillance Videos

Hang Cheng, Huaxiong Wang, Ximeng Liu, Yan Fang, Meiqing Wang, Xiaojun Zhang
2019 IEEE Transactions on Dependable and Secure Computing  
For more information, see  ...  Person re-identification (Re-ID) has attracted extensive attention due to its potential to identify a person of interest from different surveillance videos.  ...  Jingwei Hu for his linguistic assistance during the preparation of this manuscript. This work was supported by the Na-  ... 
doi:10.1109/tdsc.2019.2923653 fatcat:bomso2qrljd47jekrrzwmondvy

Effective of Modern Techniques on Content-Based Medical Image Retrieval: A Survey

Metwally Rashad, Sameer Nooh, Ibrahem Afifi, Mohamed Abdelfatah
2022 International journal of computer science and mobile computing  
Furthermore, the different publicly and standard databases used in measuring the performance of these frameworks also were covered.  ...  So, in this survey, the most advanced (CBMIR) frameworks that were used to reduce the issue of semantic gaps, high dimensionality feature maps were covered, disease diagnosis, and medical image security  ...  In [90] , an efficient and scalable histopathological image retrieval method was suggested for the learning of binary representation using densely connected multi-magnification hashing (DCMMH), where  ... 
doi:10.47760/ijcsmc.2022.v11i03.008 fatcat:656cjypw75h43mjfflbngdouia

SImProv: Scalable Image Provenance Framework for Robust Content Attribution [article]

Alexander Black, Tu Bui, Simon Jenni, Zhifei Zhang, Viswanathan Swaminanthan, John Collomosse
2022 arXiv   pre-print
finally a manipulation detection and visualization stage for localizing regions within the query that may have been manipulated to differ from the original.  ...  SImProv consists of three stages: a scalable search stage for retrieving top-k most similar images; a re-ranking and near-duplicated detection stage for identifying the original among the candidates; and  ...  PEN output is used for both re-ranking, near-duplicated detection and manipulation localization as described below. C.  ... 
arXiv:2206.14245v1 fatcat:yfkq6y76xvh6pgbtvb2opsbfbm

On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques

Arezou Soltani Panah, Ron Van Schyndel, Timos Sellis, Elisa Bertino
2016 IEEE Access  
For multimedia watermarks, invisibility is defined in human terms (that is, in terms of human sensory limitations).  ...  For example, a loose definition of robustness might be in terms of the resilience of a watermark against normal host data operations, and of invisibility as resilience of the data interpretation against  ...  authentication and tamper localization of 2d vector maps.  ... 
doi:10.1109/access.2016.2570812 fatcat:2xxteahvprepzekaqqbbyey7hi

A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems [article]

Aditya Sundararajan, Arif I. Sarwat, Alexander Pons
2019 arXiv   pre-print
Hence, this survey aims to be a starting point for researchers in comprehending the fundamental differences between TBS and WBS before understanding the core challenges associated with WBS and its design  ...  vulnerabilities, attacks and defenses for TBS and WBS.  ...  A multi-point Fuzzy commitment scheme for key management using ECG was proposed, and its performance evaluated by augmenting Gray coding into its binary encoder and error correcting codes to fine-tune  ... 
arXiv:1903.02548v1 fatcat:mkl32giawnb5lgornzq4w3ec74

Diversifying Relevant Search Results from Social Media using Community Contributed Images

Vaibhav Kalakota, Ajay Bansal
2021 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)  
A Locality-Sensitive Hashing (Datar et al. 2004 ) scheme for the approximate nearest neighbor problem has been used to find the images that are similar to the query image.  ...  Existing retrieval technology focuses almost , Global Color Naming Histogram, Global Histogram of Oriented Gradients, Global Color Moments on HSV Color Space, Global Locally Binary Patterns on gray scale  ...  The main contributions of this work are : • A novel fusion based clustering solution that can be used on different diverse image datasets without the problem of overfitting • A novel approach "Max a Min  ... 
doi:10.1109/compsac51774.2021.00060 fatcat:eswzgwlgnnhnzhy4d63n4w3n6a

Biometrics Recognition Using Deep Learning: A Survey [article]

Shervin Minaee, Amirali Abdolrashidi, Hang Su, Mohammed Bennamoun, David Zhang
2021 arXiv   pre-print
These models seem a natural fit for handling the ever-increasing scale of biometric recognition problems, from cellphone authentication to airport security systems.  ...  For each biometric, we first introduce the available datasets that are widely used in the literature and their characteristics.  ...  Nalini Ratha for reviewing this work, and providing very helpful comments and suggestions.  ... 
arXiv:1912.00271v3 fatcat:nobon7vrrrdnxe4pr3q2anl63y

ITNAC 2020 Program

2020 2020 30th International Telecommunication Networks and Applications Conference (ITNAC)  
In this paper, we propose a novel approach for trajectory design and Radio Resource Management (RRM) in UAV-aided networks using information retrieved from precise Radio Environmental Map (REM) based on  ...  Simulation results will show the performance achieved by the system for the different approaches and it will compare them with the previous use of statistical models. pp. 1-6 This paper proposes the concept  ...  The grey relational analysis is then used to rank the small cells prior to handover.  ... 
doi:10.1109/itnac50341.2020.9315174 fatcat:h64xc4n5xjc6ta5hqe3yhsvezi

Table of contents

2021 ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
MULTIMODAL ASSISTANTS Alkesh Patel, Akanksha Bindal, Hadas Kotek, Christopher Klein, Jason Williams, Apple, United States IVMSP-27.5: AN ADAPTIVE MULTI-SCALE AND MULTI-LEVEL FEATURES FUSION ..........  ...  , Georgios Tzimiropoulos, Samsung AI Cambridge, United Kingdom IVMSP-8.2: ROBUST BINARY LOSS FOR MULTI-CATEGORY CLASSIFICATION ......................................... 2470 WITH LABEL NOISE Defu Liu,  ... 
doi:10.1109/icassp39728.2021.9414617 fatcat:m5ugnnuk7nacbd6jr6gv2lsfby

Deep Learning in Information Security [article]

Stefan Thaler, Vlado Menkovski, Milan Petkovic
2018 arXiv   pre-print
Deep Learning is a sub-field of machine learning, which uses models that are composed of multiple layers.  ...  Consequently, representations that are used to solve a task are learned from the data instead of being manually designed.  ...  To construct images hashes that are not sensitive to subtle changes, they use a particular version of locality sensitive hashing which allows them to group similar image features next to each other.  ... 
arXiv:1809.04332v1 fatcat:xfb7lgrkw5cirdl3qvmg3ssnbi
« Previous Showing results 1 — 15 out of 164 results