A hybrid ResNet50-vision transformer model with an attention mechanism for aerial image classification. [PDF]
Aboghanem A +3 more
europepmc +1 more source
Extracting the central crop row with CCRDNet for universal in-row navigation in agriculture. [PDF]
Zheng H, Wang Q.
europepmc +1 more source
Opening the black box: explainable AI for automated bioturbation analysis in cores and outcrops. [PDF]
Ayranci K +4 more
europepmc +1 more source
Related searches:
Quadri-directional searching algorithm for secret image sharing using meaningful shadows
Journal of Visual Communication and Image Representation, 2015A low computational complexity for secret image sharing.High quality of generated shares.No secret information is leaked from shares, thus it guarantees high security.Satisfy four criteria: security, accuracy, computational complexity, shadow size. Contrary to conventional protecting data such as cryptographic techniques which encrypt the data with a ...
Ngoc-Tu Huynh +2 more
openaire +3 more sources
Secret sharing: using meaningful image shadows based on Gray code
Multimedia Tools and Applications, 2016Steganography, such as secret sharing, is an important technique to use for protecting transmitted confidential data from the attention of any adversaries. Gray code is a commonly encountered binary labeling that was proposed by Frank Gray of Bell Laboratories in 1940 to prevent errors when using pulse-code modulation to transmit signals.
Ting-Fang Cheng +2 more
openaire +3 more sources
Adaptive image sharing based on the quadri-directional search strategy with meaningful shadows
Multimedia Tools and Applications, 2016Image sharing is a technique that is used to protect the security of a secret image by placing it into shadows. In this paper, we propose a new image sharing scheme based on the quadri-directional search strategy with meaningful shadows. In the proposed scheme, a modulus reference table is generated and used to share different sizes of the secret image.
Thai-Son Nguyen +2 more
openaire +3 more sources
Implementation of TiOISSS with meaningful shadows and with an additional authentication image
Journal of Visual Communication and Image Representation, 2016The proposed scheme implements TiOISSS with meaningful shadows.The proposed scheme uses additional authentication image, to enhance the security.Adaptive halftoning is used to improve the quality of decoded secret image.The proposed scheme demonstrates better quality and security.
S. Srividhya +2 more
openaire +3 more sources
Meaningful secret image sharing resist to typical image processing of shadows
Multimedia Tools and Applications, 2022Yue Jiang +4 more
openaire +3 more sources
Invertible secret sharing: Using meaningful shadows based on Sorted Indexed Code
Optik, 2020Abstract The need for secret sharing using meaningful shadow images is an important method to protect the transmitted data that does not attract the attention of adversary, which has become obvious in the past few years. The recovery of the cover image without any distortion and security of the embedded secret string efficiently needs to be addressed.
Shailendra Kumar Tripathi +4 more
openaire +1 more source

