Semantic communications can reduce the resource consumption by transmitting task-related semantic information extracted from source messages. However, when the source …
Web-crawled pretraining datasets underlie the impressive" zero-shot" evaluation performance of multimodal models, such as CLIP for classification and Stable-Diffusion for …
In order to contribute to the security of medical image, we present in this paper a blind and robust watermarking technique that allows the integration of the electronic patient's record …
C Qin, E Liu, G Feng, X Zhang - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
In this paper, a novel perceptual image hashing scheme based on convolutional neural network (CNN) with multiple constraints is proposed, in which our deep hashing network …
The goal of this work is to protect as much as possible the images exchanged in telemedicine, to avoid any confusion between the patient's radiographs, these images are …
T Ni, X Zhang, Q Zhao - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Recently, in-display fingerprint sensors have been widely adopted in newly-released smartphones. However, we find this new technique can leak information about the user's …
MR Anwar, D Apriani, IR Adianita - Aptisi Transactions on …, 2021 - att.aptisi.or.id
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols …
Image forensics is a rising topic as the trustworthy multimedia content is critical for modern society. Like other vision-related applications, forensic analysis relies heavily on the proper …
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common. These important advances for security and privacy …