期刊文献+
共找到1,289篇文章
< 1 2 65 >
每页显示 20 50 100
Enhancing visual security: An image encryption scheme based on parallel compressive sensing and edge detection embedding
1
作者 王一铭 黄树锋 +2 位作者 陈煌 杨健 蔡述庭 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期287-302,共16页
A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete... A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality. 展开更多
关键词 visual security image encryption parallel compressive sensing edge detection embedding
在线阅读 下载PDF
The Soft X-ray Imager(SXI)on the SMILE Mission 被引量:4
2
作者 S.Sembay A.L.Alme +83 位作者 D.Agnolon T.Arnold A.Beardmore A.Belén Balado Margeli C.Bicknell C.Bouldin G.Branduardi-Raymont T.Crawford J.P.Breuer T.Buggey G.Butcher R.Canchal J.A.Carter A.Cheney Y.Collado-Vega H.Connor T.Crawford N.Eaton C.Feldman C.Forsyth T.Frantzen G.Galgóczi J.Garcia G.Y.Genov C.Gordillo H-P.Gröbelbauer M.Guedel Y.Guo M.Hailey D.Hall R.Hampson J.Hasiba O.Hetherington A.Holland S-Y.Hsieh M.W.J.Hubbard H.Jeszenszky M.Jones T.Kennedy K.Koch-Mehrin S.Kögl S.Krucker K.D.Kuntz C.Lakin G.Laky O.Lylund A.Martindale J.Miguel Mas Hesse R.Nakamura K.Oksavik N.Østgaard H.Ottacher R.Ottensamer C.Pagani S.Parsons P.Patel J.Pearson G.Peikert F.S.Porter T.Pouliantis B.H.Qureshi W.Raab G.Randal A.M.Read N.M.M.Roque M.E.Rostad C.Runciman S.Sachdev A.Samsonov M.Soman D.Sibeck S.Smit J.Søndergaard R.Speight S.Stavland M.Steller TianRan Sun J.Thornhill W.Thomas K.Ullaland B.Walsh D.Walton C.Wang S.Yang 《Earth and Planetary Physics》 EI CSCD 2024年第1期5-14,共10页
The Soft X-ray Imager(SXI)is part of the scientific payload of the Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)mission.SMILE is a joint science mission between the European Space Agency(ESA)and the Chinese... The Soft X-ray Imager(SXI)is part of the scientific payload of the Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)mission.SMILE is a joint science mission between the European Space Agency(ESA)and the Chinese Academy of Sciences(CAS)and is due for launch in 2025.SXI is a compact X-ray telescope with a wide field-of-view(FOV)capable of encompassing large portions of Earth’s magnetosphere from the vantage point of the SMILE orbit.SXI is sensitive to the soft X-rays produced by the Solar Wind Charge eXchange(SWCX)process produced when heavy ions of solar wind origin interact with neutral particles in Earth’s exosphere.SWCX provides a mechanism for boundary detection within the magnetosphere,such as the position of Earth’s magnetopause,because the solar wind heavy ions have a very low density in regions of closed magnetic field lines.The sensitivity of the SXI is such that it can potentially track movements of the magnetopause on timescales of a few minutes and the orbit of SMILE will enable such movements to be tracked for segments lasting many hours.SXI is led by the University of Leicester in the United Kingdom(UK)with collaborating organisations on hardware,software and science support within the UK,Europe,China and the United States. 展开更多
关键词 Soft x-ray imaging micropore optics large area CCD
在线阅读 下载PDF
Using restored two-dimensional X-ray images to reconstruct the three-dimensional magnetopause 被引量:2
3
作者 RongCong Wang JiaQi Wang +3 位作者 DaLin Li TianRan Sun XiaoDong Peng YiHong Guo 《Earth and Planetary Physics》 EI CSCD 2024年第1期133-154,共22页
Astronomical imaging technologies are basic tools for the exploration of the universe,providing basic data for the research of astronomy and space physics.The Soft X-ray Imager(SXI)carried by the Solar wind Magnetosph... Astronomical imaging technologies are basic tools for the exploration of the universe,providing basic data for the research of astronomy and space physics.The Soft X-ray Imager(SXI)carried by the Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)aims to capture two-dimensional(2-D)images of the Earth’s magnetosheath by using soft X-ray imaging.However,the observed 2-D images are affected by many noise factors,destroying the contained information,which is not conducive to the subsequent reconstruction of the three-dimensional(3-D)structure of the magnetopause.The analysis of SXI-simulated observation images shows that such damage cannot be evaluated with traditional restoration models.This makes it difficult to establish the mapping relationship between SXIsimulated observation images and target images by using mathematical models.We propose an image restoration algorithm for SXIsimulated observation images that can recover large-scale structure information on the magnetosphere.The idea is to train a patch estimator by selecting noise–clean patch pairs with the same distribution through the Classification–Expectation Maximization algorithm to achieve the restoration estimation of the SXI-simulated observation image,whose mapping relationship with the target image is established by the patch estimator.The Classification–Expectation Maximization algorithm is used to select multiple patch clusters with the same distribution and then train different patch estimators so as to improve the accuracy of the estimator.Experimental results showed that our image restoration algorithm is superior to other classical image restoration algorithms in the SXI-simulated observation image restoration task,according to the peak signal-to-noise ratio and structural similarity.The restoration results of SXI-simulated observation images are used in the tangent fitting approach and the computed tomography approach toward magnetospheric reconstruction techniques,significantly improving the reconstruction results.Hence,the proposed technology may be feasible for processing SXI-simulated observation images. 展开更多
关键词 Solar wind Magnetosphere Ionosphere Link Explorer(SMILE) soft x-ray imager MAGNETOPAUSE image restoration
在线阅读 下载PDF
SMILE soft X-ray Imager flight model CCD370 pre-flight device characterisation 被引量:1
4
作者 S.Parsons D.J.Hall +4 位作者 O.Hetherington T.W.Buggey T.Arnold M.W.J.Hubbard A.Holland 《Earth and Planetary Physics》 EI CSCD 2024年第1期25-38,共14页
Throughout the SMILE mission the satellite will be bombarded by radiation which gradually damages the focal plane devices and degrades their performance.In order to understand the changes of the CCD370s within the sof... Throughout the SMILE mission the satellite will be bombarded by radiation which gradually damages the focal plane devices and degrades their performance.In order to understand the changes of the CCD370s within the soft X-ray Imager,an initial characterisation of the devices has been carried out to give a baseline performance level.Three CCDs have been characterised,the two flight devices and the flight spa re.This has been carried out at the Open University in a bespo ke cleanroom measure ment facility.The results show that there is a cluster of bright pixels in the flight spa re which increases in size with tempe rature.However at the nominal ope rating tempe rature(-120℃) it is within the procure ment specifications.Overall,the devices meet the specifications when ope rating at -120℃ in 6 × 6 binned frame transfer science mode.The se rial charge transfer inefficiency degrades with temperature in full frame mode.However any charge losses are recovered when binning/frame transfer is implemented. 展开更多
关键词 CCD soft x-ray imager characterisation SMILE
在线阅读 下载PDF
Simulation of the SMILE Soft X-ray Imager response to a southward interplanetary magnetic field turning 被引量:1
5
作者 Andrey Samsonov Graziella Branduardi-Raymont +3 位作者 Steven Sembay Andrew Read David Sibeck Lutz Rastaetter 《Earth and Planetary Physics》 EI CSCD 2024年第1期39-46,共8页
The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)Soft X-ray Imager(SXI)will shine a spotlight on magnetopause dynamics during magnetic reconnection.We simulate an event with a southward interplanetary magne... The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)Soft X-ray Imager(SXI)will shine a spotlight on magnetopause dynamics during magnetic reconnection.We simulate an event with a southward interplanetary magnetic field turning and produce SXI count maps with a 5-minute integration time.By making assumptions about the magnetopause shape,we find the magnetopause standoff distance from the count maps and compare it with the one obtained directly from the magnetohydrodynamic(MHD)simulation.The root mean square deviations between the reconstructed and MHD standoff distances do not exceed 0.2 RE(Earth radius)and the maximal difference equals 0.24 RE during the 25-minute interval around the southward turning. 展开更多
关键词 MAGNETOPAUSE magnetic reconnection solar wind charge exchange southward interplanetary magnetic field numerical modeling Solar wind Magnetosphere Ionosphere Link Explorer(SMILE) Soft x-ray imager
在线阅读 下载PDF
Signal estimation bias in x-ray dark-field imaging using dual phase grating interferometer
6
作者 Zhi-Li Wang Zun Zhang +1 位作者 Heng Chen Xin Ge 《Chinese Physics B》 2025年第3期550-558,共9页
In x-ray dark-field imaging using dual phase grating interferometer,multi-contrast signals are extracted from a set of acquired phase-stepping data by using the least-squares fitting algorithm.The extracted mean inten... In x-ray dark-field imaging using dual phase grating interferometer,multi-contrast signals are extracted from a set of acquired phase-stepping data by using the least-squares fitting algorithm.The extracted mean intensity,amplitude and visibility signals may be intrinsically biased.However,it is still unclear how large these biases are and how the data acquisition parameters influence the biases in the extracted signals.This work set out to address these questions.Analytical expressions of the biases of the extracted signals were theoretically derived by using a second-order Taylor series expansion.Extensive numerical simulations were performed to validate the theoretical results.It is illustrated that while the estimated mean intensity signal is always unbiased,the estimated amplitude and visibility signals are both positively biased.While the biases of the estimated amplitude signals are proportional to the inverse of the total number of phase steps,the biases of the estimated visibility signals are inversely proportional to the product of the total number of phase steps and the mean number of photons counted per phase step.Meanwhile,it is demonstrated that the dependence of the biases on the mean visibility is quite different from that of Talbot-Lau interferometer due to the difference in the intensity model.We expect that these results can be useful for data acquisition optimizations and interpretation of x-ray dark-field images. 展开更多
关键词 x-ray imaging dual phase grating interferometer dark-field imaging signal bias
在线阅读 下载PDF
Secure Image Communication Using Galois Field,Hyper 3D Logistic Map,and B92 Quantum Protocol
7
作者 De Rosal Ignatius Moses Setiadi Nova Rijati +2 位作者 Ahmad Rofiqul Muslikh Bonifacius Vicky Indriyono Aceng Sambas 《Computers, Materials & Continua》 SCIE EI 2024年第12期4435-4463,共29页
In this paper,we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext en... In this paper,we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext encryption.Specifically,we leverage the B92 Quantum Key Distribution(QKD)protocol to secure the distribution of encryption keys,which are further processed through Galois Field(GF(28))operations for increased security.The encrypted plaintext is secured using a newly developed Hyper 3D Logistic Map(H3LM),a chaotic system that generates complex and unpredictable sequences,thereby ensuring strong confusion and diffusion in the encryption process.This hybrid approach offers a robust defense against quantum and classical cryptographic attacks,combining the advantages of quantum-level key distribution with the unpredictability of hyperchaos-based encryption.The proposed method demonstrates high sensitivity to key changes and resilience to noise,compression,and cropping attacks,ensuring both secure key transmission and robust image encryption. 展开更多
关键词 Galois field hyper 3D logistic map hyperchaotic map image security improved logistic map secure communication quantum security
在线阅读 下载PDF
Automated Algorithms for Detecting and Classifying X-Ray Images of Spine Fractures
8
作者 Fayez Alfayez 《Computers, Materials & Continua》 SCIE EI 2024年第4期1539-1560,共22页
This paper emphasizes a faster digital processing time while presenting an accurate method for identifying spinefractures in X-ray pictures. The study focuses on efficiency by utilizing many methods that include pictu... This paper emphasizes a faster digital processing time while presenting an accurate method for identifying spinefractures in X-ray pictures. The study focuses on efficiency by utilizing many methods that include picturesegmentation, feature reduction, and image classification. Two important elements are investigated to reducethe classification time: Using feature reduction software and leveraging the capabilities of sophisticated digitalprocessing hardware. The researchers use different algorithms for picture enhancement, including theWiener andKalman filters, and they look into two background correction techniques. The article presents a technique forextracting textural features and evaluates three picture segmentation algorithms and three fractured spine detectionalgorithms using transformdomain, PowerDensity Spectrum(PDS), andHigher-Order Statistics (HOS) for featureextraction.With an emphasis on reducing digital processing time, this all-encompassing method helps to create asimplified system for classifying fractured spine fractures. A feature reduction program code has been built toimprove the processing speed for picture classification. Overall, the proposed approach shows great potential forsignificantly reducing classification time in clinical settings where time is critical. In comparison to other transformdomains, the texture features’ discrete cosine transform (DCT) yielded an exceptional classification rate, and theprocess of extracting features from the transform domain took less time. More capable hardware can also result inquicker execution times for the feature extraction algorithms. 展开更多
关键词 Feature reduction image classification x-ray images
在线阅读 下载PDF
Pulmonary Edema and Pleural Effusion Detection Using Efficient Net-V1-B4 Architecture and AdamW Optimizer from Chest X-Rays Images
9
作者 Anas AbuKaraki Tawfi Alrawashdeh +4 位作者 Sumaya Abusaleh Malek Zakarya Alksasbeh Bilal Alqudah Khalid Alemerien Hamzah Alshamaseen 《Computers, Materials & Continua》 SCIE EI 2024年第7期1055-1073,共19页
This paper presents a novelmulticlass systemdesigned to detect pleural effusion and pulmonary edema on chest Xray images,addressing the critical need for early detection in healthcare.A new comprehensive dataset was f... This paper presents a novelmulticlass systemdesigned to detect pleural effusion and pulmonary edema on chest Xray images,addressing the critical need for early detection in healthcare.A new comprehensive dataset was formed by combining 28,309 samples from the ChestX-ray14,PadChest,and CheXpert databases,with 10,287,6022,and 12,000 samples representing Pleural Effusion,Pulmonary Edema,and Normal cases,respectively.Consequently,the preprocessing step involves applying the Contrast Limited Adaptive Histogram Equalization(CLAHE)method to boost the local contrast of the X-ray samples,then resizing the images to 380×380 dimensions,followed by using the data augmentation technique.The classification task employs a deep learning model based on the EfficientNet-V1-B4 architecture and is trained using the AdamW optimizer.The proposed multiclass system achieved an accuracy(ACC)of 98.3%,recall of 98.3%,precision of 98.7%,and F1-score of 98.7%.Moreover,the robustness of the model was revealed by the Receiver Operating Characteristic(ROC)analysis,which demonstrated an Area Under the Curve(AUC)of 1.00 for edema and normal cases and 0.99 for effusion.The experimental results demonstrate the superiority of the proposedmulti-class system,which has the potential to assist clinicians in timely and accurate diagnosis,leading to improved patient outcomes.Notably,ablation-CAM visualization at the last convolutional layer portrayed further enhanced diagnostic capabilities with heat maps on X-ray images,which will aid clinicians in interpreting and localizing abnormalities more effectively. 展开更多
关键词 image classification decision support system EfficientNet-V1-B4 AdamW optimizer pulmonary edema pleural effusion chest x-rays
在线阅读 下载PDF
Secure Digital Image Watermarking Technique Based on ResNet-50 Architecture
10
作者 Satya Narayan Das Mrutyunjaya Panda 《Intelligent Automation & Soft Computing》 2024年第6期1073-1100,共28页
In today’s world of massive data and interconnected networks,it’s crucial to burgeon a secure and efficient digital watermarking method to protect the copyrights of digital content.Existing research primarily focuse... In today’s world of massive data and interconnected networks,it’s crucial to burgeon a secure and efficient digital watermarking method to protect the copyrights of digital content.Existing research primarily focuses on deep learning-based approaches to improve the quality of watermarked images,but they have some flaws.To overcome this,the deep learning digital image watermarking model with highly secure algorithms is proposed to secure the digital image.Recently,quantum logistic maps,which combine the concept of quantum computing with traditional techniques,have been considered a niche and promising area of research that has attracted researchers’attention to further research in digital watermarking.This research uses the chaotic behaviour of the quantum logistic map with Rivest–Shamir–Adleman(RSA)and Secure Hash(SHA-3)algorithms for a robust watermark embedding process,where a watermark is embedded into the host image.This way,the quantum chaos method not only helps limit the chance of tampering with the image content through reverse engineering but also assists in maintaining a high level of imperceptibility and strong robustness with efficient extraction or detection of watermark images.Lifting Wavelet Transformation(LWT)is a potential and computationally efficient version of traditional Discrete Wavelet Transform(DWT)where the host image is divided into four sub-bands to offer a multi-resolution view of an image with greater flexibility in watermarking methodologies.Furthermore,considering the robustness against attacks,a pre-trained Residual Neural Network(ResNet-50),a convolutional neural network with 50 layers deep,is used to better learn the complex features and efficiently extract the watermark from the image.By integrating RSA and SHA-3 algorithms,the proposed model demonstrates improved imperceptibility,robustness,and accuracy in watermark extraction compared to traditional methods.It achieves a Peak Signal-to-Noise Ratio(PSNR)of 49.83%,a Structural Similarity Index Measure(SSIM)of 0.98,and a Number of Pixels Change Rate(NPCR)of 99.79%,respectively.These results reflect the model’s effectiveness in delivering superior quality and security.Consequently,our proposed approach offers accurate results,exceptional invisibility,and enhanced robustness compared to the existing digital image watermarking techniques. 展开更多
关键词 image watermarking quantum logistics Rivest-Shamir-Adleman(RSA) secure Hash(SHA-3) Lifting Wavelet Transformation(LWT) ResNet-50 deep learning secure communication
在线阅读 下载PDF
Comparative Study of Four Classification Techniques for the Detection of Threats in Baggage from X-Ray Images
11
作者 Boka Trinité Konan Hyacinthe Kouassi Konan +1 位作者 Jules Allani Olivier Asseu 《Open Journal of Applied Sciences》 2024年第12期3490-3499,共10页
Baggage screening is crucial for airport security. This paper examines various algorithms for firearm detection in X-ray images of baggage. The focus is on identifying steel barrel bores, which are essential for deton... Baggage screening is crucial for airport security. This paper examines various algorithms for firearm detection in X-ray images of baggage. The focus is on identifying steel barrel bores, which are essential for detonation. For this, the study uses a set of 22,000 X-ray scanned images. After preprocessing with filtering techniques to improve image quality, deep learning methods, such as Convolutional Neural Networks (CNNs), are applied for classification. The results are also compared with Autoencoder and Random Forest algorithms. The results are validated on a second dataset, highlighting the advantages of the adopted approach. Baggage screening is a very important part of the risk assessment and security screening process at airports. Automating the detection of dangerous objects from passenger baggage X-ray scanners can speed up and increase the efficiency of the entire security procedure. 展开更多
关键词 Deep Learning Baggage Control Convolutional Neural Networks image Filtering Object Detection Algorithms x-ray images Autoencoder Random Forests
在线阅读 下载PDF
Recent Advances in Passive Digital Image Security Forensics: A Brief Review 被引量:13
12
作者 Xiang Lin Jian-Hua Li +3 位作者 Shi-Lin Wang Alan-Wee-Chung Liew Feng Cheng Xiao-Sa Huang 《Engineering》 2018年第1期29-39,共11页
With the development of sophisticated image editing and manipulation tools, the originality and authen- ticity of a digital image is usually hard to determine visually, In order to detect digital image forgeries, vari... With the development of sophisticated image editing and manipulation tools, the originality and authen- ticity of a digital image is usually hard to determine visually, In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade, Compared with active forensics approaches that require embedding additional information, passive forensics approaches are more popular due to their wider application scenario, and have attracted increasing academic and industrial research interests, Generally speaking, passive digital image forensics detects image forgeries based on the fact that there are certain intrinsic patterns in the original image left during image acqui- sition or storage, or specific patterns in image forgeries left during the image storage or editing, By ana- lyzing the above patterns, the originality of an image can he authenticated, In this paper, a brief review on passive digital image forensic methods is presented in order to provide a comprehensive introduction on recent advances in this rapidly developing research area, These forensics approaches are divided into three categories based on the various kinds of traces they can he used to track-that is, traces left in image acquisition, traces left in image storage, and traces left in image editing, For each category, the forensics scenario, the underlying rationale, and state-of-the-art methodologies are elaborated, Moreover, the major limitations of the current image forensics approaches are discussed in order to point out some possible research directions or focuses in these areas, 展开更多
关键词 Digital image forensicsimage-tampering detectionMultimedia security
在线阅读 下载PDF
Local Features-Based Watermarking for Image Security in Social Media 被引量:1
13
作者 Shady Y.El-mashad Amani M.Yassen +1 位作者 Abdulwahab K.Alsammak Basem M.Elhalawany 《Computers, Materials & Continua》 SCIE EI 2021年第12期3857-3870,共14页
The last decade shows an explosion of using social media,which raises several challenges related to the security of personal files including images.These challenges include modifying,illegal copying,identity fraud,cop... The last decade shows an explosion of using social media,which raises several challenges related to the security of personal files including images.These challenges include modifying,illegal copying,identity fraud,copyright protection and ownership of images.Traditional digital watermarking techniques embed digital information inside another digital information without affecting the visual quality for security purposes.In this paper,we propose a hybrid digital watermarking and image processing approach to improve the image security level.Specifically,variants of the widely used Least-Significant Bit(LSB)watermarking technique are merged with a blob detection algorithm to embed information into the boundary pixels of the largest blob of a digital image.The proposed algorithms are tested using several experiments and techniques,which are followed by uploading the watermarked images into a social media site to evaluate the probability of extracting the embedding watermarks.The results show that the proposed approaches outperform the traditional LSB algorithm in terms of time,evaluation criteria and the percentage of pixels that have changed. 展开更多
关键词 Digital watermarking LSB social media blob detection image security
在线阅读 下载PDF
Adaptive Particle Swarm Optimization Data Hiding for High Security Secret Image Sharing
14
作者 S.Lakshmi Narayanan 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期931-946,共16页
The main aim of this work is to improve the security of data hiding forsecret image sharing. The privacy and security of digital information have becomea primary concern nowadays due to the enormous usage of digital t... The main aim of this work is to improve the security of data hiding forsecret image sharing. The privacy and security of digital information have becomea primary concern nowadays due to the enormous usage of digital technology.The security and the privacy of users’ images are ensured through reversible datahiding techniques. The efficiency of the existing data hiding techniques did notprovide optimum performance with multiple end nodes. These issues are solvedby using Separable Data Hiding and Adaptive Particle Swarm Optimization(SDHAPSO) algorithm to attain optimal performance. Image encryption, dataembedding, data extraction/image recovery are the main phases of the proposedapproach. DFT is generally used to extract the transform coefficient matrix fromthe original image. DFT coefficients are in float format, which assists in transforming the image to integral format using the round function. After obtainingthe encrypted image by data-hider, additional data embedding is formulated intohigh-frequency coefficients. The proposed SDHAPSO is mainly utilized for performance improvement through optimal pixel location selection within the imagefor secret bits concealment. In addition, the secret data embedding capacityenhancement is focused on image visual quality maintenance. Hence, it isobserved from the simulation results that the proposed SDHAPSO techniqueoffers high-level security outcomes with respect to higher PSNR, security level,lesser MSE and higher correlation than existing techniques. Hence, enhancedsensitive information protection is attained, which improves the overall systemperformance. 展开更多
关键词 image sharing separable data hiding using adaptive particle swarm optimization(SDHAPSO) security access control
在线阅读 下载PDF
National Memory—National Image—National Security——National Security Ideology and the Theoretical Model
15
作者 Gong Weibo 《学术界》 CSSCI 北大核心 2015年第3期313-317,共5页
National security faces the challenge of the "cross- national- sovereignty-management"model and the"commons"mode. Based on hypothesis,cross- regional security net is formed. As for China,it attache... National security faces the challenge of the "cross- national- sovereignty-management"model and the"commons"mode. Based on hypothesis,cross- regional security net is formed. As for China,it attaches importance to sovereign states and nations,pursuing the relatively stable evaluation of the international community. And based on the national memory and national communication,the state security awareness provides possibility for surpassing the so- called universal value of the West. 展开更多
关键词 国家安全 安全思想 记忆 形象 模型 相对稳定 国际社会 国家信息
在线阅读 下载PDF
Investigation of prior image constrained compressed sensing-based spectral X-ray CT image reconstruction
16
作者 周正东 余子丽 +1 位作者 张雯雯 管绍林 《Journal of Southeast University(English Edition)》 EI CAS 2016年第4期420-425,共6页
To improve spectral X-ray CT reconstructed image quality, the energy-weighted reconstructed image xbins^W and the separable paraboloidal surrogates(SPS) algorithm are proposed for the prior image constrained compres... To improve spectral X-ray CT reconstructed image quality, the energy-weighted reconstructed image xbins^W and the separable paraboloidal surrogates(SPS) algorithm are proposed for the prior image constrained compressed sensing(PICCS)-based spectral X-ray CT image reconstruction. The PICCS-based image reconstruction takes advantage of the compressed sensing theory, a prior image and an optimization algorithm to improve the image quality of CT reconstructions.To evaluate the performance of the proposed method, three optimization algorithms and three prior images are employed and compared in terms of reconstruction accuracy and noise characteristics of the reconstructed images in each energy bin.The experimental simulation results show that the image xbins^W is the best as the prior image in general with respect to the three optimization algorithms; and the SPS algorithm offers the best performance for the simulated phantom with respect to the three prior images. Compared with filtered back-projection(FBP), the PICCS via the SPS algorithm and xbins^W as the prior image can offer the noise reduction in the reconstructed images up to 80. 46%, 82. 51%, 88. 08% in each energy bin,respectively. M eanwhile, the root-mean-squared error in each energy bin is decreased by 15. 02%, 18. 15%, 34. 11% and the correlation coefficient is increased by 9. 98%, 11. 38%,15. 94%, respectively. 展开更多
关键词 spectral x-ray CT prior image compressed sensing optimization algorithm image reconstruction
在线阅读 下载PDF
X-ray image distortion correction based on SVR
17
作者 袁泽慧 李世中 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2015年第3期302-306,共5页
X-ray image has been widely used in many fields such as medical diagnosis,industrial inspection,and so on.Unfortunately,due to the physical characteristics of X-ray and imaging system,distortion of the projected image... X-ray image has been widely used in many fields such as medical diagnosis,industrial inspection,and so on.Unfortunately,due to the physical characteristics of X-ray and imaging system,distortion of the projected image will happen,which restrict the application of X-ray image,especially in high accuracy fields.Distortion correction can be performed using algorithms that can be classified as global or local according to the method used,both having specific advantages and disadvantages.In this paper,a new global method based on support vector regression(SVR)machine for distortion correction is proposed.In order to test the presented method,a calibration phantom is specially designed for this purpose.A comparison of the proposed method with the traditional global distortion correction techniques is performed.The experimental results show that the proposed correction method performs better than the traditional global one. 展开更多
关键词 x-ray image distortion correction support vector regression machine
在线阅读 下载PDF
Two-Dimensional Perovskite Single Crystals for High-Performance X-ray Imaging and Exploring MeV X-ray Detection 被引量:1
18
作者 Xieming Xu Yiheng Wu +5 位作者 Yi Zhang Xiaohui Li Fang Wang Xiaoming Jiang Shaofan Wu Shuaihua Wang 《Energy & Environmental Materials》 SCIE EI CAS CSCD 2024年第1期139-146,共8页
Scintillation semiconductors play increasingly important medical diagnosis and industrial inspection roles.Recently,two-dimensional(2D)perovskites have been shown to be promising materials for medical X-ray imaging,bu... Scintillation semiconductors play increasingly important medical diagnosis and industrial inspection roles.Recently,two-dimensional(2D)perovskites have been shown to be promising materials for medical X-ray imaging,but they are mostly used in low-energy(≤130 keV)regions.Direct detection of MeV X-rays,which ensure thorough penetration of the thick shell walls of containers,trucks,and aircraft,is also highly desired in practical industrial applications.Unfortunately,scintillation semiconductors for high-energy X-ray detection are currently scarce.Here,This paper reports a 2D(C_(4)H_(9)NH_(3))_(2)PbBr_(4)single crystal with outstanding sensitivity and stability toward X-ray radiation that provides an ultra-wide detectable X-ray range of between 8.20 nGy_(air)s^(-1)(50 keV)and 15.24 mGy_(air)s^(-1)(9 MeV).The(C_(4)H_(9)NH_(3))_(2)PbBr_(4)single-crystal detector with a vertical structure is used for high-performance X-ray imaging,delivering a good spatial resolution of 4.3 Ip mm^(-1)in a plane-scan imaging system.Low ionic migration in the 2D perovskite enables the vertical device to be operated with hundreds of keV to MeV X-ray radiation at high bias voltages,leading to a sensitivity of 46.90μC Gy_(air)-1 cm^(-2)(-1.16 Vμm^(-1))with 9 MeV X-ray radiation,demonstrating that 2D perovskites have enormous potential for high-energy industrial applications. 展开更多
关键词 MeV x-ray detection single-crystal x-ray detectors two-dimensional perovskites x-ray imaging
在线阅读 下载PDF
Beam and image experiment of beam deflection electron gun for distributed X-ray sources 被引量:7
19
作者 Cheng-Jun Tan Chuan-Xiang Tang +7 位作者 Wen-Hui Huang Qing-Xiu Jin Ying-Chao Du Qun Luo Pei-Dong Wu Dong-Hai Liu Lu-Ming Zhang Cong Xu 《Nuclear Science and Techniques》 SCIE CAS CSCD 2019年第3期127-138,共12页
Distributed X-ray sources comprise a single vacuum chamber containing multiple X-ray sources that are triggered and emit X-rays at a specific time and location. This process facilitates an application for innovative s... Distributed X-ray sources comprise a single vacuum chamber containing multiple X-ray sources that are triggered and emit X-rays at a specific time and location. This process facilitates an application for innovative system concepts in X-ray and computer tomography. This paper proposes a novel electron beam focusing, shaping,and deflection electron gun for distributed X-ray sources.The electron gun uses a dispenser cathode as an electron emitter, a mesh grid to control emission current, and two electrostatic lenses for beam shaping, focusing, and deflection. Novel focusing and deflecting electrodes were designed to increase the number of focal spots in the distributed source. Two identical half-rectangle opening electrodes are controlled by adjusting the potential of the two electrodes to control the electron beam trajectory, and then, multifocal spots are obtained on the anode target. The electron gun can increase the spatial density of the distributed X-ray sources, thereby improving the image quality. The beam experimental results show that the focal spot sizes of the deflected(deflected amplitude 10.5 mm)and non-deflected electron beams at full width at half maximum are 0.80 mm 90.50 mm and 0.55 mm 90.40 mm, respectively(anode voltage 160 kV; beam current 30 mA). The imaging experimental results demonstrate the excellent spatial resolution and time resolution of an imaging system built with the sources, which has an excellent imaging effect on a field-programmable gate array chip and a rotating metal disk. 展开更多
关键词 BEAM DEFLECTION electron GUN x-ray imaging DISTRIBUTED x-ray sources STATIONARY CT
在线阅读 下载PDF
Digital Watermarking Secure Scheme for Remote Sensing Image Protection 被引量:8
20
作者 Guanghui Yuan Qi Hao 《China Communications》 SCIE CSCD 2020年第4期88-98,共11页
As a means of copyright protection for multimedia data, digital watermarking technology has attracted more and more attention in various research fields. Researchers have begun to explore the feasibility of applying i... As a means of copyright protection for multimedia data, digital watermarking technology has attracted more and more attention in various research fields. Researchers have begun to explore the feasibility of applying it to remote sensing data recently. Because of the particularity of remote sensing image, higher requirements are put forward for its security and management, especially for the copyright protection, illegal use and authenticity identification of remote sensing image data. Therefore, this paper proposes to use image watermarking technology to achieve comprehensive security protection of remote sensing image data, while the use of cryptography technology increases the applicability and security of watermarking technology. The experimental results show that the scheme of remote sensing image digital watermarking technology has good performance in the imperceptibility and robustness of watermarking. 展开更多
关键词 data security WATERMARK REMOTE sensing image PROTECTION
在线阅读 下载PDF
上一页 1 2 65 下一页 到第
使用帮助 返回顶部