The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose three regularization techniques to overcome drawbacks of local winner-take-all methods used in deep convolutional networks. Channel-Max inherits the max activation unit from Maxout networks, but otherwise adopts complementary subsets of input and filters with different kernel sizes as better companions to the max function. To balance the training on different pathways, Channel-Drop is employed...
This paper proposes a novel kind of graph-based features for image retrieval. For each color image, we divide it into R, G, B component images. For each component image, we view the 256 gray-levels as nodes and construct the Gray-level Co-occurrence Graph (GCG) by counting the number of occurrences for each possible gray-level pair as neighbors in the image. Based on the generated three directed weighted...
This paper proposes a method to encrypt an image in two shares with following properties. (1) The method is suitable for binary, gray level or color image encryption. (2) The bit error rates are adjustable, and thus the secret image can be recovered to different extents including lossless and nearly lossless. (3) Sizes of the share images are flexible to be changed, and thus the method can be used...
This paper proposes a visual secret sharing scheme for color image encryption with robust and progressive decryption abilities. Robust decryption means the secret content can be still decrypted from shares even the shares are corrupted with intentional or unintentional alterations. In progressive decryption, three levels quality of secret images can be decrypted with the same shares. A lower visual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.