nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accelerating video encoding using cluster computing
|
Elkabbany, Ghada F. |
|
|
|
25-26 |
p. 17427-17444 |
artikel |
2 |
A combination of CSP-based method with soft margin SVM classifier and generalized RBF kernel for imagery-based brain computer interface applications
|
Hekmatmanesh, Amin |
|
|
|
25-26 |
p. 17521-17549 |
artikel |
3 |
A comprehensive system for image scene classification
|
Sorkhi, Ali Ghanbari |
|
|
|
25-26 |
p. 18033-18058 |
artikel |
4 |
Adaptive PVD and LSB based high capacity data hiding scheme
|
Singh, Samayveer |
|
|
|
25-26 |
p. 18815-18837 |
artikel |
5 |
A flexible and configurable GPGPU stereo matching framework
|
Ivan, Andre |
|
|
|
25-26 |
p. 18367-18386 |
artikel |
6 |
A high-capacity performance-preserving blind technique for reversible information hiding via MIDI files using delta times
|
Liu, Yi-Hsin |
|
|
|
25-26 |
p. 17281-17302 |
artikel |
7 |
A multidimensional chaotic image encryption algorithm based on the region of interest
|
Liu, Yang |
|
|
|
25-26 |
p. 17669-17705 |
artikel |
8 |
An adaptive framework to image watermarking based on the twin support vector regression and genetic algorithm in lifting wavelet transform domain
|
Mehta, Rajesh |
|
|
|
25-26 |
p. 18657-18678 |
artikel |
9 |
An automated system for cucumber leaf diseased spot detection and classification using improved saliency method and deep features selection
|
Khan, Muhammad Attique |
|
|
|
25-26 |
p. 18627-18656 |
artikel |
10 |
An efficient bi-layer content based image retrieval system
|
Singh, Sachendra |
|
|
|
25-26 |
p. 17731-17759 |
artikel |
11 |
An efficient method for image forgery detection based on trigonometric transforms and deep learning
|
Al_Azrak, Faten Maher |
|
|
|
25-26 |
p. 18221-18243 |
artikel |
12 |
An image segmentation approach based on fuzzy c-means and dynamic particle swarm optimization algorithm
|
Dhanachandra, Nameirakpam |
|
|
|
25-26 |
p. 18839-18858 |
artikel |
13 |
An image segmentation approach on improved implicit surface model in straddle strategy
|
Zhao, Hailei |
|
|
|
25-26 |
p. 17991-18003 |
artikel |
14 |
A novel framework and concept-based semantic search Interface for abnormal crowd behaviour analysis in surveillance videos
|
Hatirnaz, Eren |
|
|
|
25-26 |
p. 17579-17617 |
artikel |
15 |
A novel quantum steganography-Steganalysis system for audio signals
|
Chaharlang, Javad |
|
|
|
25-26 |
p. 17551-17577 |
artikel |
16 |
Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography
|
Pramanik, Sabyasachi |
|
|
|
25-26 |
p. 17463-17482 |
artikel |
17 |
A real-time recognition method of static gesture based on DSSD
|
Zhang, Yong |
|
|
|
25-26 |
p. 17445-17461 |
artikel |
18 |
A Reversible Data Hiding Scheme for Interpolated Images Based on Pixel Intensity Range
|
Malik, Aruna |
|
|
|
25-26 |
p. 18005-18031 |
artikel |
19 |
A robust image watermarking scheme in hybrid transform domains resisting to rotation attacks
|
Zheng, Peijia |
|
|
|
25-26 |
p. 18343-18365 |
artikel |
20 |
A robust salient object detection using edge enhanced global topographical saliency
|
Singh, Surya Kant |
|
|
|
25-26 |
p. 17885-17902 |
artikel |
21 |
A scalable system for the monitoring of video transmission components in delay-sensitive networked applications
|
Bulfone, Andrea |
|
|
|
25-26 |
p. 18727-18745 |
artikel |
22 |
A secure image authentication scheme based on dual fragile watermark
|
Gong, Xinhui |
|
|
|
25-26 |
p. 18071-18088 |
artikel |
23 |
A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator
|
Mondal, Bhaskar |
|
|
|
25-26 |
p. 17497-17520 |
artikel |
24 |
A self-recovery watermarking scheme based on block truncation coding and quantum chaos map
|
Hemida, Omer |
|
|
|
25-26 |
p. 18695-18725 |
artikel |
25 |
A unified saliency detection framework for visible and infrared images
|
Zhang, Xufan |
|
|
|
25-26 |
p. 17331-17348 |
artikel |
26 |
Blind image recovery approach combing sparse and low-rank regularizations
|
Feng, Lei |
|
|
|
25-26 |
p. 18059-18070 |
artikel |
27 |
Camera operation estimation from video shot using 2D motion vector histogram
|
Prasertsakul, Pawin |
|
|
|
25-26 |
p. 17403-17426 |
artikel |
28 |
Contextual adaptive fourth-order smoothing
|
Chen, Yong |
|
|
|
25-26 |
p. 18435-18446 |
artikel |
29 |
Correction to: Underwater image enhancement using an edge-preserving filtering Retinex algorithm
|
Zhuang, Peixian |
|
|
|
25-26 |
p. 17279 |
artikel |
30 |
Cycle-consistent generative adversarial neural networks based low quality fingerprint enhancement
|
Karabulut, Dogus |
|
|
|
25-26 |
p. 18569-18589 |
artikel |
31 |
Design and evaluation of a hand gesture recognition approach for real-time interactions
|
Shanthakumar, Vaidyanath Areyur |
|
|
|
25-26 |
p. 17707-17730 |
artikel |
32 |
Design of Multimedia Education Network Security and Intrusion Detection System
|
Liu, Yansong |
|
|
|
25-26 |
p. 18801-18814 |
artikel |
33 |
Detecting moving objects from dynamic background combining subspace learning with mixed norm approach
|
Lu, Yuqiu |
|
|
|
25-26 |
p. 18747-18766 |
artikel |
34 |
ECC joins first time with SC-FDMA for Mission “security”
|
Padmapriya, V. M. |
|
|
|
25-26 |
p. 17945-17967 |
artikel |
35 |
Empirical analysis of deep learning networks for affective video tagging
|
Mishra, Anju |
|
|
|
25-26 |
p. 18611-18626 |
artikel |
36 |
Ensembled deep convolution neural network-based breast cancer classification with misclassification reduction algorithms
|
Murtaza, Ghulam |
|
|
|
25-26 |
p. 18447-18479 |
artikel |
37 |
Estimating the imageability of words by mining visual characteristics from crawled image data
|
Kastner, Marc A. |
|
|
|
25-26 |
p. 18167-18199 |
artikel |
38 |
Evaluation of driver drowsiness using respiration analysis by thermal imaging on a driving simulator
|
Kiashari, Serajeddin Ebrahimian Hadi |
|
|
|
25-26 |
p. 17793-17815 |
artikel |
39 |
Fractional Local Neighborhood Intensity Pattern for Image Retrieval using Genetic Algorithm
|
Ghose, Shuvozit |
|
|
|
25-26 |
p. 18527-18552 |
artikel |
40 |
Frame duplication and shuffling forgery detection technique in surveillance videos based on temporal average and gray level co-occurrence matrix
|
Fadl, Sondos |
|
|
|
25-26 |
p. 17619-17643 |
artikel |
41 |
FTBME: feature transferring based multi-model ensemble
|
Yang, A. Yongquan |
|
|
|
25-26 |
p. 18767-18799 |
artikel |
42 |
Heterogeneous domain adaptation with label and structural consistency
|
Huang, Junchu |
|
|
|
25-26 |
p. 17923-17943 |
artikel |
43 |
Homography vs similarity transformation in aerial mosaicking: which is the best at different altitudes?
|
Avola, Danilo |
|
|
|
25-26 |
p. 18387-18404 |
artikel |
44 |
HS-based reversible data hiding scheme using median prediction error
|
Wang, Weiqing |
|
|
|
25-26 |
p. 18143-18165 |
artikel |
45 |
Improving the DBLSTM for on-line Arabic handwriting recognition
|
Maalej, Rania |
|
|
|
25-26 |
p. 17969-17990 |
artikel |
46 |
KUMBH MELA: a case study for dense crowd counting and modeling
|
Pandey, Anurag |
|
|
|
25-26 |
p. 17837-17858 |
artikel |
47 |
Large scale image tamper detection and restoration
|
Sarkar, D. |
|
|
|
25-26 |
p. 17761-17791 |
artikel |
48 |
Median filters combined with denoising convolutional neural network for Gaussian and impulse noises
|
Noor, Alam |
|
|
|
25-26 |
p. 18553-18568 |
artikel |
49 |
Mixture linear prediction Gammatone Cepstral features for robust speaker verification under transmission channel noise
|
Krobba, Ahmed |
|
|
|
25-26 |
p. 18679-18693 |
artikel |
50 |
Morphological edge detection and brain tumor segmentation in Magnetic Resonance (MR) images based on region growing and performance evaluation of modified Fuzzy C-Means (FCM) algorithm
|
Sheela, C. Jaspin Jeba |
|
|
|
25-26 |
p. 17483-17496 |
artikel |
51 |
Multi-channel chaotic encryption algorithm for color image based on DNA coding
|
Wang, Yujing |
|
|
|
25-26 |
p. 18317-18342 |
artikel |
52 |
Multispectral particle filter tracking using adaptive decision-based fusion of visible and thermal sequences
|
Pourmomtaz, Negin |
|
|
|
25-26 |
p. 18405-18434 |
artikel |
53 |
Optimal feed forward neural network based automatic moving vehicle detection system in traffic surveillance system
|
Smitha, J. A. |
|
|
|
25-26 |
p. 18591-18610 |
artikel |
54 |
Optimal fusion aided face recognition from visible and thermal face images
|
Kanmani, Madheswari |
|
|
|
25-26 |
p. 17859-17883 |
artikel |
55 |
Optimization methods of video images processing for mobile object recognition
|
Xiao, Shuo |
|
|
|
25-26 |
p. 17245-17255 |
artikel |
56 |
Particle swarm optimization with deep learning for human action recognition
|
Berlin, S. Jeba |
|
|
|
25-26 |
p. 17349-17371 |
artikel |
57 |
Photoelectric performance analysis of infrared detector based on image processing
|
Wang, Yinling |
|
|
|
25-26 |
p. 18515-18526 |
artikel |
58 |
Prediction mode based H.265/HEVC video watermarking resisting re-compression attack
|
Gaj, Sibaji |
|
|
|
25-26 |
p. 18089-18119 |
artikel |
59 |
Real-time traffic sign detection and classification towards real traffic scene
|
Wu, Yiqiang |
|
|
|
25-26 |
p. 18201-18219 |
artikel |
60 |
Saliency-based bit plane detection for network applications
|
Kaljahi, Maryam Asadzadeh |
|
|
|
25-26 |
p. 18495-18513 |
artikel |
61 |
Semantic classification of business ontology while migrating business
|
Asfand-e-yar, Muhammad |
|
|
|
25-26 |
p. 17903-17921 |
artikel |
62 |
Sketch based modeling and editing via shape space exploration
|
Liu, Juncheng |
|
|
|
25-26 |
p. 18121-18142 |
artikel |
63 |
Smart expansion of target key for more handlers to access multimedia counting-based secret sharing
|
Gutub, Adnan |
|
|
|
25-26 |
p. 17373-17401 |
artikel |
64 |
Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map
|
Sathiyamurthi, P. |
|
|
|
25-26 |
p. 17817-17835 |
artikel |
65 |
The use of augmented reality in the diagnosis and treatment of autistic children: a review and a new system
|
Wedyan, Mohammad |
|
|
|
25-26 |
p. 18245-18291 |
artikel |
66 |
TS-CSW: text steganalysis and hidden capacity estimation based on convolutional sliding windows
|
Yang, Zhongliang |
|
|
|
25-26 |
p. 18293-18316 |
artikel |
67 |
Underwater image enhancement using an edge-preserving filtering Retinex algorithm
|
Zhuang, Peixian |
|
|
|
25-26 |
p. 17257-17277 |
artikel |
68 |
Visual analysis for evaluation of community detection algorithms
|
Linhares, Claudio D. G. |
|
|
|
25-26 |
p. 17645-17667 |
artikel |
69 |
Voxel-based 3D face reconstruction and its application to face recognition using sequential deep learning
|
Sharma, Sahil |
|
|
|
25-26 |
p. 17303-17330 |
artikel |
70 |
What is damaged: a benchmark dataset for abnormal traffic object classification
|
Wang, Chen |
|
|
|
25-26 |
p. 18481-18494 |
artikel |