Comparison of different image data augmentation approaches

L Nanni, M Paci, S Brahnam, A Lumini - Journal of imaging, 2021 - mdpi.com
Convolutional neural networks (CNNs) have gained prominence in the research literature
on image classification over the last decade. One shortcoming of CNNs, however, is their …

Biometric authentication and image encryption for image security in cloud framework

V Kakkad, M Patel, M Shah - Multiscale and Multidisciplinary Modeling …, 2019 - Springer
Cloud computing is a major blooming technology which has numerous applications in
today's market and is rightly so hyped. Images are a major part of today's internet data traffic …

Prospect of using artificial intelligence for microwave nondestructive testing technique: A review

NHMM Shrifan, MF Akbar, NAM Isa - IEEE Access, 2019 - ieeexplore.ieee.org
The development in materials technology has produced stronger, lighter, stiffer, and more
durable electrically insulating composites which are replacing metals in many applications …

[KÖNYV][B] Some commonly used speech feature extraction algorithms

SA Alim, NKA Rashid - 2018 - books.google.com
Speech is a complex naturally acquired human motor ability. It is characterized in adults with
the production of about 14 different sounds per second via the harmonized actions of …

Student attendance system in classroom using face recognition technique

S Lukas, AR Mitra, RI Desanti… - … on Information and …, 2016 - ieeexplore.ieee.org
Authentication is one of the significant issues in the era of information system. Among other
things, human face recognition (HFR) is one of known techniques which can be used for …

Medical image watermarking for ownership & tamper detection

HS Alshanbari - Multimedia tools and applications, 2021 - Springer
Image watermarking can provide ownership identification as well as tamper protection.
Transform domain based image watermarking has been proven to be more robust than the …

A comprehensive experimental study for analyzing the effects of data augmentation techniques on voice classification

H Bakır, AN Çayır, TS Navruz - Multimedia Tools and Applications, 2024 - Springer
It is not always possible to find enough data for deep learning studies. So, various data
augmentation techniques have been developed and thus the success of deep learning …

[PDF][PDF] A brief survey on modern iris feature extraction methods

HM Ahmed, MA Taha - Engineering and Technology Journal, 2021 - iasj.net
Engineering and Technology Journal A Brief Survey on Modern Iris Feature Extraction Methods
Page 1 Engineering and Technology Journal Vol. 39, Part A (2021), No. 01, Pages 123-129 …

RETRACTED ARTICLE: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique

K Shankar, M Elhoseny, RS Kumar… - Journal of Ambient …, 2020 - Springer
Abstract Secret Image Sharing (SIS) scheme is to encrypt a secret image into 'n'specious
shadows. It is unable to reveal any data on the secret image if at least one of the shadows is …

Novel quantum image compression and encryption algorithm based on DQWT and 3D hyper-chaotic Henon map

NR Zhou, LX Huang, LH Gong, QW Zeng - Quantum Information …, 2020 - Springer
A novel quantum image compression and encryption algorithm with Daubechies D^(4) D (4)
quantum wavelet transform (DQWT) and 3D hyper-chaotic Henon map is presented. The …