Zobrazeno 1 - 10
of 170
pro vyhledávání: '"Zhihua Xia"'
Publikováno v:
IET Image Processing, Vol 17, Iss 2, Pp 323-336 (2023)
Abstract With the advent of the screen‐reading era, the confidential documents displayed on the screen can be easily captured by a camera without leaving any traces. Thus, this paper proposes a novel screen‐shooting resilient watermarking scheme
Externí odkaz:
https://doaj.org/article/a22469105eb24bc39cb6402fde7e7ee9
Autor:
Quanlong Xu, Zhihua Xia, Jingmei Zhang, Zhiyi Wei, Qin Guo, Huile Jin, Hua Tang, Shouzhu Li, Xuecong Pan, Zhi Su, Shun Wang
Publikováno v:
Carbon Energy, Vol 5, Iss 2, Pp n/a-n/a (2023)
Abstract The persistent increase of CO2 levels in the atmosphere, already exceeding 400 ppm, urges the exploration of CO2 emission reduction and recycling technologies. Ideally, photocatalytic conversion of CO2 into valuable hydrocarbons realizes sol
Externí odkaz:
https://doaj.org/article/6c260dfd5acc4d598e00272371eebcaf
Publikováno v:
IET Biometrics, Vol 10, Iss 6, Pp 607-624 (2021)
Abstract Recently, deepfake videos, generated by deep learning algorithms, have attracted widespread attention. Deepfake technology can be used to perform face manipulation with high realism. So far, there have been a large amount of deepfake videos
Externí odkaz:
https://doaj.org/article/cc749a4b455d48ff97642ea2bfa127a8
Publikováno v:
EURASIP Journal on Image and Video Processing, Vol 2020, Iss 1, Pp 1-11 (2020)
Abstract Deep neural networks are vulnerable to adversarial samples, posing potential threats to the applications deployed with deep learning models in practical conditions. A typical example is the fingerprint liveness detection module in fingerprin
Externí odkaz:
https://doaj.org/article/23677acf3ee34f488b68f39265d59d8f
Publikováno v:
IEEE Access, Vol 8, Pp 61138-61147 (2020)
With the rapid growth of the number of images, many content-based image retrieval methods have been extensively used in our daily life. In general, image retrieval services are very expensive in terms of computing and storage. Therefore, outsourcing
Externí odkaz:
https://doaj.org/article/e80abd8655c647ae86e50bfe8bcf367d
Publikováno v:
IEEE Access, Vol 7, Pp 26953-26966 (2019)
Due to the lack of pre-judgment of fingerprints, fingerprint authentication systems are frequently vulnerable to artificial replicas. Anonymous people can impersonate authorized users to complete various authentication operations, thereby disrupting
Externí odkaz:
https://doaj.org/article/49400ddae9d34213adb0e3d4469f4a26
Publikováno v:
IEEE Access, Vol 6, Pp 30392-30401 (2018)
The smart campus can monitor students in real time by analyzing students' images, but a large number of images bring an unbearable burden to the smart campus. The convenience of cloud computing has attracted smart campus to outsource their huge amoun
Externí odkaz:
https://doaj.org/article/0613449f4ea743e9a89e192289f217f7
Publikováno v:
IEEE Access, Vol 6, Pp 46695-46705 (2018)
The handwritten signature is a widely accepted biometric trait for the individual authentication. This paper proposes a secure and dynamic signature verification method which applies to the mobile phone. A key point for signature verification is to e
Externí odkaz:
https://doaj.org/article/d89759e1786e4ac890693a716c0d0982
Publikováno v:
IEEE Access, Vol 6, Pp 60635-60644 (2018)
This paper proposes a high-capacity reversible data hiding scheme for encrypted multimedia data by using Somewhat Homomorphic Encryption. In an image, three adjacent pixels are selected as a group for the whole process. In the encryption part, the or
Externí odkaz:
https://doaj.org/article/236dffcf2b3a485eb49d14e9deb2e960
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 13 (2017)
Vehicular ad hoc networks are traffic applications of the Internet of Things, which are composed of vehicle nodes, roadside units, service providers, and other components. In a vehicular ad hoc network, data transmission and management rely heavily o
Externí odkaz:
https://doaj.org/article/4b7c9fe976ba496ab028a5a96b100a63