1 | -- | 0 | Jianwei Fei, Zhihua Xia, Peipeng Yu, Fengjun Xiao. Adversarial attacks on fingerprint liveness detection |
2 | -- | 0 | Mingming Hu, Jingtao Guo. Facial attribute-controlled sketch-to-image translation with generative adversarial networks |
3 | -- | 0 | Jie Wang, Zisen Xu, Zhenkuan Pan, Weibo Wei, Guodong Wang 0001. The Vese-Chan model without redundant parameter estimation for multiphase image segmentation |
4 | -- | 0 | Huanlong Zhang, Zeng Gao, Jie Zhang, Junfeng Liu, Zhicheng Nie, Jianwei Zhang. Hybridizing extended ant lion optimizer with sine cosine algorithm approach for abrupt motion tracking |
5 | -- | 0 | Lin He, Xiaomin Yang, Lu Lu 0005, Wei Wu 0002, Awais Ahmad 0001, Gwanggil Jeon. A novel multi-focus image fusion method for improving imaging systems by using cascade-forest model |
6 | -- | 0 | Aneela Sabir, Khawar Khurshid, Ahmad Salman. Segmentation-based image defogging using modified dark channel prior |
7 | -- | 0 | Yue Yuan, Jun Chu, Lu Leng, Jun Miao, Byung-Gyu Kim. A scale-adaptive object-tracking algorithm with occlusion detection |
8 | -- | 0 | Kuo-Ming Hung, Chi-Hsiao Yih, Cheng-Hsiang Yeh, Li-Ming Chen 0001. A high capacity reversible data hiding through multi-directional gradient prediction, non-linear regression analysis and embedding selection |
10 | -- | 0 | Zhen Wang, Fu-Zhen Sun, Long-Bo Zhang, Pingping Liu. Minimal residual ordinal loss hashing with an adaptive optimization mechanism |
11 | -- | 0 | Soon-kak Kwon, Dong-Seok Lee. Zoom motion estimation for color and depth videos using depth information |
12 | -- | 0 | Jiahuan He, Qichao Ying, Zhenxing Qian, Guorui Feng, Xinpeng Zhang. Semi-structured data protection scheme based on robust watermarking |
14 | -- | 0 | Pål Anders Floor, Ivar Farup, Marius Pedersen, Øistein Hovde. Error reduction through post processing for wireless capsule endoscope video |
15 | -- | 0 | Fan Zhang, Fenlin Liu, Xiangyang Luo. Geolocation of covert communication entity on the Internet for post-steganalysis |
16 | -- | 0 | Mingji Yu, Yuchen Liu, Hu Sun, Heng Yao, Tong Qiao. Adaptive and separable multiary reversible data hiding in encryption domain |
17 | -- | 0 | Bo Yang, Mingyue Tang, Shaohui Chen, Gang Wang, Yan Tan, Bijun Li. A vehicle tracking algorithm combining detector and tracker |
18 | -- | 0 | Xintao Duan, Baoxia Li, Daidou Guo, Zhen Zhang, Yuanyuan Ma. A coverless steganography method based on generative adversarial network |
19 | -- | 0 | Marcos Roberto e Souza, Hélio Pedrini. Visual rhythms for qualitative evaluation of video stabilization |
20 | -- | 0 | G. Jemilda, S. Baulkani. Integration of new moving object segmentation and classification techniques using optimal salp swarm-based feature fusion with linear multi k-SVM classifier |
21 | -- | 0 | Zhenjun Tang, Hanyun Zhang, Shenglian Lu, Heng Yao, Xianquan Zhang. Robust image hashing with compressed sensing and ordinal measures |
22 | -- | 0 | Bernardo B. Gatto, Lincon Sales de Souza, Eulanda Miranda dos Santos, Kazuhiro Fukui, Waldir Sabino da Silva Jr., Kenny V. dos Santos. A semi-supervised convolutional neural network based on subspace representation for image classification |
23 | -- | 0 | Nan Pan, Jiaohua Qin, Yun Tan, Xuyu Xiang, Guimin Hou. A video coverless information hiding algorithm based on semantic segmentation |
24 | -- | 0 | Yuxuan Zhao, Ka Lok Man, Jeremy S. Smith, Kamran Siddique, Sheng Uei Guan. Improved two-stream model for human action recognition |
25 | -- | 0 | Samadhi Wickrama Arachchilage, Ebroul Izquierdo. Deep-learned faces: a survey |
26 | -- | 0 | Lukasz Roszkowiak, Anna Korzynska, Dorota G. Pijanowska, Ramón Bosch, Marylène Lejeune, Carlos López 0002. Clustered nuclei splitting based on recurrent distance transform in digital pathology images |
27 | -- | 0 | Bibi Ruqia, Zahid Mehmood, Rehan Mehmood Yousaf, Muhammad Tahir 0004, Amjad Rehman, Muhammad Sardaraz, Muhammad Rashid. BoVW model based on adaptive local and global visual words modeling and log-based relevance feedback for semantic retrieval of the images |
28 | -- | 0 | Ze Wang, Mingzhi Chen, Yu Yang 0005, Min Lei, Zhexuan Dong. Joint multi-domain feature learning for image steganalysis based on CNN |
29 | -- | 0 | He Yang, Beibei Fan, Lingling Guo. Anchor-free object detection with mask attention |
30 | -- | 0 | Huaqi Wang, Zhenxing Qian, Guorui Feng, Xinpeng Zhang. Defeating data hiding in social networks using generative adversarial network |
31 | -- | 0 | Giuseppe Conti, Christos Kyrkou, Theocharis Theocharides, Gustavo Hernández-Peñaloza, David Jiménez. A novel FPGA-based test-bench framework for SDI stream verification |
32 | -- | 0 | Jing Wang, Hui Li, Xiuling Zhou, Xiao Zhi Gao, Ming Wang. A study of hepatic fibrosis staging methods using diffraction enhanced imaging |
33 | -- | 0 | Fengyong Li, Lianming Zhang, Weimin Wei. Reversible data hiding in encrypted binary image with shared pixel prediction and halving compression |
34 | -- | 0 | Ali Mirza, Ossama Zeshan, Muhammad Atif, Imran Siddiqi. Detection and recognition of cursive text from video frames |
35 | -- | 0 | Qinghongya Shi, Hong-Bo Zhang, Hao-Tian Ren, Ji-Xiang Du, Qing Lei. Consistent constraint-based video-level learning for action recognition |
36 | -- | 0 | Yi Cao, Zhili Zhou, Q. M. Jonathan Wu, Chengsheng Yuan, Xingming Sun. Coverless information hiding based on the generation of anime characters |
37 | -- | 0 | Renjie Zhu, Xinpeng Zhang, Mengte Shi, Zhenjun Tang. Secure neural network watermarking protocol against forging attack |
38 | -- | 0 | Chih-Shuan Huang, Ya-Han Huang, Din-Yuen Chan, Jar-Ferr Yang. Shape-reserved stereo matching with segment-based cost aggregation and dual-path refinement |
39 | -- | 0 | Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Yao Qiu. Coverless image steganography based on DenseNet feature mapping |
40 | -- | 0 | Jiu-fen Liu, Chunfang Yang, Junchao Wang, Yanan Shi. Stego key recovery method for F5 steganography with matrix encoding |
41 | -- | 0 | Herng-Hua Chang, Po-Fang Chen, Jun-Kai Guo, Chia-Chi Sung. A self-adaptive single underwater image restoration algorithm for improving graphic quality |
42 | -- | 0 | Zheng Ma, Yan Ma, Xiaohong Huang, Manjun Zhang, Yanxiao Liu. Applying cheating identifiable secret sharing scheme in multimedia security |
43 | -- | 0 | Sujuan Yan, Hong Jin. An improved localization method for lesion area in gynecological ultrasound image |
44 | -- | 0 | Qiaochuan Chen, Guangyao Li, Qingguo Xiao, Li Xie 0003, Mang Xiao. Image completion via transformation and structural constraints |
45 | -- | 0 | Giuseppe Conti, Christos Kyrkou, Theocharis Theocharides, Gustavo Hernández-Peñaloza, David Jiménez. Correction to: A novel FPGA-based test-bench framework for SDI stream verification |
46 | -- | 0 | Zhangjie Fu, Fan Wang, Xu Cheng 0003. The secure steganography for hiding images via GAN |
47 | -- | 0 | Seong-Kyu Kim, Jun Ho Huh. Autochain platform: expert automatic algorithm Blockchain technology for house rental dApp image application model |
48 | -- | 0 | Guangyi Yang, Xingyu Ding, Tian Huang, Kun Cheng, Weizheng Jin. Explicit-implicit dual stream network for image quality assessment |
49 | -- | 0 | Yu Liu 0008, Huaxin Xiao, Hanlin Tan, Ping Li. Are RGB-based salient object detection methods unsuitable for light field data? |
50 | -- | 0 | Minhui Chang, Lei Zhang 0107. Image restoration based on sparse representation using feature classification learning |
51 | -- | 0 | Xu Cheng 0003, Chen Song, Yongxiang Gu, Beijing Chen. Learning attention for object tracking with adversarial learning network |
52 | -- | 0 | Wenming Huang, Dengrui Hu, Zhenrong Deng, Jianyun Nie. Named entity recognition for Chinese judgment documents based on BiLSTM and CRF |
53 | -- | 0 | Xuezhuan Zhao, Lishen Pei, Tao Li, Zheng Zhang. Online social image ranking in diversified preferences |