Feature Extraction

A Two-Phase Scheme by Integration of Deep and Corner Feature for Balanced Copy-Move Forgery Localization featured image

A Two-Phase Scheme by Integration of Deep and Corner Feature for Balanced Copy-Move Forgery Localization

In the era of Industry 4.0, the widespread application of digitization, automation, and Internet technology in industrial production has led to a significant increase in image …

avatar
Tong Liu
A Two-Phase Scheme by Integration of Deep and Corner Feature for Balanced Copy-Move Forgery Localization featured image

A Two-Phase Scheme by Integration of Deep and Corner Feature for Balanced Copy-Move Forgery Localization

In the era of Industry 4.0, the widespread application of digitization, automation, and Internet technology in industrial production has led to a significant increase in image …

Tong liu
RNPM: Neural-Guided Embedding Region Selection and Error Correction for Robust Audio Multi-Watermarking featured image

RNPM: Neural-Guided Embedding Region Selection and Error Correction for Robust Audio Multi-Watermarking

Robust audio watermarking plays a crucial role in copyright protection; however, existing techniques suffer from low embedding capacity and limited robustness under severe signal …

Qiutong li
PFPS: Polymerized Feature Panoptic Segmentation Based on Fully Convolutional Networks featured image

PFPS: Polymerized Feature Panoptic Segmentation Based on Fully Convolutional Networks

Panoptic segmentation requires the prediction of a pixel-level mask with a category label in an image. In recent years, panoptic segmentation has been gaining more attention since …

Shucheng ji
Image Manipulation Localization Using Dual-Shallow Feature Pyramid Fusion and Boundary Contextual Incoherence Enhancement featured image

Image Manipulation Localization Using Dual-Shallow Feature Pyramid Fusion and Boundary Contextual Incoherence Enhancement

This paper proposes a novel end-to-end network for Image Manipulation Localization (IML) comprising three modules: feature fusion, encoder, and decoder. To address the limitations …

Yan xiang
Image Self-Recovery Based on Authentication Feature Extraction featured image

Image Self-Recovery Based on Authentication Feature Extraction

This paper proposes a novel image self-recovery scheme based on authentication feature extraction. The Authentication Feature Extraction method is proposed to calculate the …

avatar
Tong Liu