A brief survey of visual saliency detection

I Ullah, M Jian, S Hussain, J Guo, H Yu, X Wang… - Multimedia Tools and …, 2020 - Springer
Salient object detection models mimic the behavior of human beings and capture the most
salient region/object from the images or scenes, this field contains many important …

A review on near-duplicate detection of images using computer vision techniques

KK Thyagharajan, G Kalaiarasi - Archives of Computational Methods in …, 2021 - Springer
Nowadays, digital content is widespread and simply redistributable, either lawfully or
unlawfully. For example, after images are posted on the internet, other web users can modify …

Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection

T Chen, X Li, H Yin, J Zhang - … in knowledge discovery and data mining …, 2018 - Springer
The proliferation of social media in communication and information dissemination has made
it an ideal platform for spreading rumors. Automatically debunking rumors at their stage of …

Map** of urban surface water bodies from Sentinel-2 MSI imagery at 10 m resolution via NDWI-based image sharpening

X Yang, S Zhao, X Qin, N Zhao, L Liang - Remote Sensing, 2017 - mdpi.com
This study conducts an exploratory evaluation of the performance of the newly available
Sentinel-2A Multispectral Instrument (MSI) imagery for map** water bodies using the …

Improving metaheuristic algorithms with information feedback models

GG Wang, Y Tan - IEEE transactions on cybernetics, 2017 - ieeexplore.ieee.org
In most metaheuristic algorithms, the updating process fails to make use of information
available from individuals in previous iterations. If this useful information could be exploited …

A secured distributed detection system based on IPFS and blockchain for industrial image and video data security

R Kumar, R Tripathi, N Marchang, G Srivastava… - Journal of Parallel and …, 2021 - Elsevier
Copyright infringement adversely affects the interest of copyright holders of images and
videos which are uploaded to different websites and peer-to-peer image sharing systems …

EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing

Z **a, NN **ong, AV Vasilakos, X Sun - Information Sciences, 2017 - Elsevier
The content-based image retrieval (CBIR) has been widely studied along with the increasing
importance of images in our daily life. Compared with the text documents, images consume …

A survey on image tampering and its detection in real-world photos

L Zheng, Y Zhang, VLL Thing - Journal of Visual Communication and …, 2019 - Elsevier
Editing a real-world photo through computer software or mobile applications is one of the
easiest things one can do today before sharing the doctored image on one's social …

A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment

L Qi, X Zhang, W Dou, C Hu, C Yang, J Chen - Future Generation …, 2018 - Elsevier
With the increasing popularity of service computing paradigm, tremendous resources or
services are emerging rapidly on the Web, imposing heavy burdens on the service selection …

[PDF][PDF] A Fusion Steganographic Algorithm Based on Faster R-CNN.

R Meng, SG Rice, J Wang, X Sun - Computers, Materials & …, 2018 - researchgate.net
The aim of information hiding is to embed the secret message in a normal cover media such
as image, video, voice or text, and then the secret message is transmitted through the …