Deep learning in skin disease image recognition: A review

LF Li, X Wang, WJ Hu, NN Xiong, YX Du, BS Li - Ieee Access, 2020 - ieeexplore.ieee.org
The application of deep learning methods to diagnose diseases has become a new
research topic in the medical field. In the field of medicine, skin disease is one of the most …

A review of image steganalysis techniques for digital forensics

K Karampidis, E Kavallieratou… - Journal of information …, 2018 - Elsevier
Steganalysis and steganography are the two different sides of the same coin.
Steganography tries to hide messages in plain sight while steganalysis tries to detect their …

DeepMIH: Deep invertible network for multiple image hiding

Z Guan, J Jing, X Deng, M Xu, L Jiang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Multiple image hiding aims to hide multiple secret images into a single cover image, and
then recover all secret images perfectly. Such high-capacity hiding may easily lead to …

A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing

Z Xia, X Wang, L Zhang, Z Qin, X Sun… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
With the increasing importance of images in people's daily life, content-based image
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …

Study on an improved adaptive PSO algorithm for solving multi-objective gate assignment

W Deng, H Zhao, X Yang, J Xiong, M Sun, B Li - Applied Soft Computing, 2017 - Elsevier
Gate is a key resource in the airport, which can realize rapid and safe docking, ensure the
effective connection between flights and improve the capacity and service efficiency of …

Fingerprint liveness detection based on multi-scale LPQ and PCA

C Yuan, X Sun, R Lv - China Communications, 2016 - ieeexplore.ieee.org
Fingerprint authentication system is used to verify users' identification according to the
characteristics of their fingerprints. However, this system has some security and privacy …

[图书][B] Digital watermarking and steganography: fundamentals and techniques

FY Shih - 2017 - taylorfrancis.com
This book intends to provide a comprehensive overview on different aspects of mechanisms
and techniques for information security. It is written for students, researchers, and …

Fast and fully-automated detection and segmentation of pulmonary nodules in thoracic CT scans using deep convolutional neural networks

X Huang, W Sun, TLB Tseng, C Li, W Qian - Computerized Medical Imaging …, 2019 - Elsevier
Deep learning techniques have been extensively used in computerized pulmonary nodule
analysis in recent years. Many reported studies still utilized hybrid methods for diagnosis, in …

Coverless image steganography without embedding

Z Zhou, H Sun, R Harit, X Chen, X Sun - Cloud Computing and Security …, 2015 - Springer
The traditional image steganography technologies designate a cover image and embed
secret data into it to form the stego-image. However, the modification traces caused by the …

A survey of hardware Trojan threat and defense

H Li, Q Liu, J Zhang - Integration, 2016 - Elsevier
Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with
various means to steal the internal sensitive data or modify original functionality, which may …