Y Zhou, Y Sun, M Yang, J Hou, Z Xiao, A Anand, L Sui - Heliyon, 2023 - cell.com
An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like …
Z Shuo, H Pijun, C Yongguang, B Wang - Heliyon, 2023 - cell.com
The conventional approach for images encryption entails transforming a regular image into an encrypted image that resembles noise. However, this noise-like encrypted image is …
M Qu, Y He, W Xu, D Liu, C An, S Liu, G Liu, F Cheng - Food Chemistry, 2024 - Elsevier
The MobileNetV3-based improved sine-cosine algorithm (ISCA-MobileNetV3) was combined with an artificial olfactory sensor (AOS) to address the redundancy in olfactory …
S Zhang, Q Liu, T Wang, W Liang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Cloud computing and the Internet of Things (IoT) provide robust technological support for the development of image retrieval services. Specifically, images are highly sensitive and …
D Li, Y Wu, Q Lü, K Zhang, Z Wang, J Wu - Neural Computing and …, 2024 - Springer
With the advancement of content-based medical image retrieval (CBMIR) technology which is used as a convenient assistant for medical diagnosis. However, the potential risk of …
Z Wang, Q Zhang, L Meng, Y Liu - Computers, Materials & …, 2023 - cdn.techscience.cn
To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security, retrieval efficiency, and retrieval accuracy. This research …