A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Perceptual Hashing Based Forensics Scheme for the Integrity Authentication of High Resolution Remote Sensing Image
2018
Information
Secondly, the multi-scale edge features of the grid cells are extracted by the edge chains based on the adaptive strategy. ...
In this paper, a perceptual hashing based forensics scheme is proposed for the integrity authentication of a HRRS image. ...
[26] proposed a perceptual image hashing algorithm by combining latent low-rank representation and rotation invariant uniform local binary patterns. ...
doi:10.3390/info9090229
fatcat:qn37elavbndfjlmbs5v466fdmq
A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images
2020
ISPRS International Journal of Geo-Information
In this paper, we introduce the concept of subject-sensitive perceptual hash, which can be seen as a special case of conventional perceptual hash, for the integrity authentication of HRRS image. ...
MUM-Net is the core of perceptual hash algorithm, and it uses focal loss as the loss function to overcome the imbalance between the positive and negative samples in the training samples. ...
The biggest difference between MU sub-net and original U-net is that MU sub-net adds multi-scale inputs to extract richer content features. ...
doi:10.3390/ijgi9080485
fatcat:qy4bp5pymbgx3drfbefgouvelm
A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication
2022
Wireless Communications and Mobile Computing
In this paper, a convolutional stacked denoising autoencoder (CSDAE) is utilized for producing hash codes that are robust against different content preserving operations (CPOs). ...
Subsequently, tampered localization is done by comparing the decoder output of the manipulated image with the hash of the actual image. ...
research scholars belonging to the Image Processing Lab of ECE Department, NIT Silchar, Assam, India, and all the members of the R&D Section, CMR College of Engineering & Technology, Hyderabad, India, for ...
doi:10.1155/2022/1645658
fatcat:qchb745jwzgntes3zc3uhwzf2e
High-Resolution Remote Sensing Image Integrity Authentication Method Considering Both Global and Local Features
2020
ISPRS International Journal of Geo-Information
Due to this reason, a robust HRRS images integrity authentication algorithm using perceptual hashing technology considering both global and local features is proposed in this paper. ...
Existing HRRS image integrity authentication methods are mostly binary decision-making processes, which cannot provide a further interpretable information (e.g., tamper localization, tamper type determination ...
Three tampered images with different grid sizes are selected for multi-scale tampering localization tests, which reflect the same tampered area. ...
doi:10.3390/ijgi9040254
fatcat:ucrfgiseyffpxj3dm473jnfhiq
Large-scale multimedia signal processing for security and digital forensics [SI 1163]
2021
Multimedia tools and applications
The fusion of pores and minutiae at score level is used to re-rank the minutiae based latent matcher. ...
., introduces a new hash algorithm for the RGB image is proposed that is able to validate the integrity and localise the tampered region within the image. ...
doi:10.1007/s11042-021-11108-3
fatcat:g3oxcmd7fre3dpobr27zytff2y
Person Re-Identification over Encrypted Outsourced Surveillance Videos
2019
IEEE Transactions on Dependable and Secure Computing
For more information, see ...
Person re-identification (Re-ID) has attracted extensive attention due to its potential to identify a person of interest from different surveillance videos. ...
Jingwei Hu for his linguistic assistance during the preparation of this manuscript. This work was supported by the Na- ...
doi:10.1109/tdsc.2019.2923653
fatcat:bomso2qrljd47jekrrzwmondvy
Effective of Modern Techniques on Content-Based Medical Image Retrieval: A Survey
2022
International journal of computer science and mobile computing
Furthermore, the different publicly and standard databases used in measuring the performance of these frameworks also were covered. ...
So, in this survey, the most advanced (CBMIR) frameworks that were used to reduce the issue of semantic gaps, high dimensionality feature maps were covered, disease diagnosis, and medical image security ...
In [90] , an efficient and scalable histopathological image retrieval method was suggested for the learning of binary representation using densely connected multi-magnification hashing (DCMMH), where ...
doi:10.47760/ijcsmc.2022.v11i03.008
fatcat:656cjypw75h43mjfflbngdouia
SImProv: Scalable Image Provenance Framework for Robust Content Attribution
[article]
2022
arXiv
pre-print
finally a manipulation detection and visualization stage for localizing regions within the query that may have been manipulated to differ from the original. ...
SImProv consists of three stages: a scalable search stage for retrieving top-k most similar images; a re-ranking and near-duplicated detection stage for identifying the original among the candidates; and ...
PEN output is used for both re-ranking, near-duplicated detection and manipulation localization as described below.
C. ...
arXiv:2206.14245v1
fatcat:yfkq6y76xvh6pgbtvb2opsbfbm
On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques
2016
IEEE Access
For multimedia watermarks, invisibility is defined in human terms (that is, in terms of human sensory limitations). ...
For example, a loose definition of robustness might be in terms of the resilience of a watermark against normal host data operations, and of invisibility as resilience of the data interpretation against ...
authentication and tamper localization of 2d vector maps. ...
doi:10.1109/access.2016.2570812
fatcat:2xxteahvprepzekaqqbbyey7hi
A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems
[article]
2019
arXiv
pre-print
Hence, this survey aims to be a starting point for researchers in comprehending the fundamental differences between TBS and WBS before understanding the core challenges associated with WBS and its design ...
vulnerabilities, attacks and defenses for TBS and WBS. ...
A multi-point Fuzzy commitment scheme for key management using ECG was proposed, and its performance evaluated by augmenting Gray coding into its binary encoder and error correcting codes to fine-tune ...
arXiv:1903.02548v1
fatcat:mkl32giawnb5lgornzq4w3ec74
Diversifying Relevant Search Results from Social Media using Community Contributed Images
2021
2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)
A Locality-Sensitive Hashing (Datar et al. 2004 ) scheme for the approximate nearest neighbor problem has been used to find the images that are similar to the query image. ...
Existing retrieval technology focuses almost
, Global Color Naming Histogram, Global Histogram of Oriented Gradients, Global Color Moments on HSV Color Space, Global Locally Binary Patterns on gray scale ...
The main contributions of this work are : • A novel fusion based clustering solution that can be used on different diverse image datasets without the problem of overfitting • A novel approach "Max a Min ...
doi:10.1109/compsac51774.2021.00060
fatcat:eswzgwlgnnhnzhy4d63n4w3n6a
Biometrics Recognition Using Deep Learning: A Survey
[article]
2021
arXiv
pre-print
These models seem a natural fit for handling the ever-increasing scale of biometric recognition problems, from cellphone authentication to airport security systems. ...
For each biometric, we first introduce the available datasets that are widely used in the literature and their characteristics. ...
Nalini Ratha for reviewing this work, and providing very helpful comments and suggestions. ...
arXiv:1912.00271v3
fatcat:nobon7vrrrdnxe4pr3q2anl63y
ITNAC 2020 Program
2020
2020 30th International Telecommunication Networks and Applications Conference (ITNAC)
In this paper, we propose a novel approach for trajectory design and Radio Resource Management (RRM) in UAV-aided networks using information retrieved from precise Radio Environmental Map (REM) based on ...
Simulation results will show the performance achieved by the system for the different approaches and it will compare them with the previous use of statistical models. pp. 1-6 This paper proposes the concept ...
The grey relational analysis is then used to rank the small cells prior to handover. ...
doi:10.1109/itnac50341.2020.9315174
fatcat:h64xc4n5xjc6ta5hqe3yhsvezi
Table of contents
2021
ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
MULTIMODAL ASSISTANTS Alkesh Patel, Akanksha Bindal, Hadas Kotek, Christopher Klein, Jason Williams, Apple, United States IVMSP-27.5: AN ADAPTIVE MULTI-SCALE AND MULTI-LEVEL FEATURES FUSION .......... ...
, Georgios Tzimiropoulos, Samsung AI Cambridge, United Kingdom IVMSP-8.2: ROBUST BINARY LOSS FOR MULTI-CATEGORY CLASSIFICATION ......................................... 2470 WITH LABEL NOISE Defu Liu, ...
doi:10.1109/icassp39728.2021.9414617
fatcat:m5ugnnuk7nacbd6jr6gv2lsfby
Deep Learning in Information Security
[article]
2018
arXiv
pre-print
Deep Learning is a sub-field of machine learning, which uses models that are composed of multiple layers. ...
Consequently, representations that are used to solve a task are learned from the data instead of being manually designed. ...
To construct images
hashes that are not sensitive to subtle changes, they use a particular version of locality sensitive hashing which allows
them to group similar image features next to each other. ...
arXiv:1809.04332v1
fatcat:xfb7lgrkw5cirdl3qvmg3ssnbi
« Previous
Showing results 1 — 15 out of 164 results