نتایج جستجو برای: perceptual image hashing
تعداد نتایج: 428297 فیلتر نتایج به سال:
Similarity search is an important technique in many large scale vision applications. Hashing approach becomes popular for similarity search due to its computational and memory efficiency. Recently, it has been shown that the hashing quality could be improved by combining supervised information, e.g. semantic tags/labels, into hashing function learning. However, tag information is not fully expl...
Search through a database of encrypted images against a crumpled and encrypted query will remain privacy preserving only if comparisons between selective features derived from these images is executed in the encrypted domain itself. To facilitate this, the encryption process must remain transparent to specific image statistics computed in the spatial or transform domain. Consequently, the perce...
Histopathology is crucial to diagnosis of cancer, yet its interpretation is tedious and challenging. To facilitate this procedure, content-based image retrieval methods have been developed as case-based reasoning tools. Especially, with the rapid growth of digital histopathology, hashing-based retrieval approaches are gaining popularity due to their exceptional efficiency and scalability. Never...
Recently, content-based image retrieval has been investigated for histopathological image analysis, focusing on improving the accuracy and scalability. The main motivation is to interpret a new image (i.e., query image) by searching among a potentially large-scale database of training images in real-time. Hashing methods have been employed because of their promising performance. However, most p...
Image recognition is an important mechanism used in various scenarios. In the context of multimedia forensics, its most significant task to automatically detect already known child and adolescent pornography a large set images. When fighting disinformation, it identify images taken out or image montages. For this purpose, numerous methods based on robust hashing feature extraction are known, re...
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness resisting steganographic tools. In this paper, a new steganography is presented hide secret data in more secure way and enhance robustness against attacks. This method depends on frequency domain. The embedding process consists several steps. Firstly, divided into no overlappin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید