- Advanced Steganography and Watermarking Techniques
- Computer Graphics and Visualization Techniques
- Image Processing Techniques and Applications
- Image and Signal Denoising Methods
- Thin-Film Transistor Technologies
- Advanced Image Fusion Techniques
- Cardiac Imaging and Diagnostics
- Silicon Carbide Semiconductor Technologies
- Underwater Acoustics Research
- Remote Sensing and Land Use
- Advanced Image Processing Techniques
- Atrial Fibrillation Management and Outcomes
- Remote-Sensing Image Classification
- Advanced MRI Techniques and Applications
- Image Processing and 3D Reconstruction
- Power Transformer Diagnostics and Insulation
- Advanced Measurement and Detection Methods
- Remote Sensing and LiDAR Applications
- Simulation and Modeling Applications
- Handwritten Text Recognition Techniques
- Optical Systems and Laser Technology
- Chaos-based Image/Signal Encryption
- Advanced SAR Imaging Techniques
Heilongjiang University of Science and Technology
2024
Xinjiang University
2023
Space Engineering University
2020-2021
Xi'an University of Science and Technology
2017
National Chin-Yi University of Technology
2015
With the popularity of PDF documents, security a document becomes increasingly prominent. This paper presents watermarking algorithm based on structure, where signal is hided in discarded page object. The can be resistant to some attacks, such as deleting words, adding pages and rotation. simulation results show that simple robustness strong.
Abstract The segmentation of atrial scars in LGE-MRI images has huge potential value for clinical diagnosis and subsequent treatment. In practice, are usually manually calibrated by experienced experts, which is time-consuming prone to errors. However, automatic also faces difficulties due myocardial scars’ small size variable shape. present study introduces a dual branch network, incorporating edge attention, deep supervision strategy. Edge attention introduced fully utilize the spatial...
A new algorithm based on PDF document structure and the words generated from hidden information is proposed in this paper. Through software Fontographer we generate two font files with same character codes. The secrete key stored first file it contains shapes formed words. private blank characters are second they do not possess shapes. embedded a document, transmitted to third party. In watermark extraction stage, need download party, then replace characters' it. Since overlapped original...
SAR has high application value in both military and civil fields because of its unique working characteristics, the inevitable existence coherent speckle noise images, a great impact on recognition processing images later, therefore, this paper firstly performs suppression then constructs convolutional neural network to fully learn feature information through classify them recognition. For published MSTAR dataset, method achieves better results three ten classes datasets.
According to the processing characteristics of remote sensing image super-resolution, this paper studies a super resolution method based on improved residual network. First, we optimize structure block meet needs super-resolution tasks; then, further deepen network level, so that has stronger learning ability. The reconstruction results images dataset show achieves better visual effect, and objective evaluation index is significantly improved, which proves effectiveness proposed method.
The traditional image mosaic method directly replaces the remote sensing target into corresponding area of background image, but "splicing traces" are prone to appear. This paper proposes a fusion and images under wavelet multi-frequency based on principal component analysis. First, decomposed by wavelet, then weight low-frequency coefficient is calculated analysis method, high-frequency fused absolute maximum finally inversely transformed realize synthesis simulation. simulation results...
The insulated gate bipolar transistor (IGBT) has the process of asymptotic and nonlinear degradation. It is great significance to analyse its aging predict remaining useful life for safe reliable operation power system. Therefore, this research introduces a method based on Empirical Wavelet Transform combined with Long Short Term Memory Network (EWT-LSTM) IGBT devices, select collector-emitter off instantaneous peak voltage as characteristic signal device aging. Firstly, EWT used decompose...
As PDF documents used extensively, security issues become increasingly more prominent. This paper presents an object-oriented document page watermarking algorithm, in which a watermark signal is embedded as legitimate object. The object not pseudo-page to access the reader, thus ensuring regular display function. simulation results demonstrate simpleness and robustness, invisibility, also with capacity of algorithm guaranteed.
To address the problem of poor applicability existing generative adversarial network (GAN) evaluation system, this paper introduces remote sensing image information quantity calculation system into indicator proposes an end-to-end GAN method based on single-pixel indicator, and uses EDS, ENDS, InfoDS to evaluate stability generator training process, mode collapse, diversity generation, failure is effectively monitored, which independent loss function, learning rate.