Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
478 result(s) for "SVD (singular value decomposition)"
Sort by:
A sophisticated and provably grayscale image watermarking system using DWT-SVD domain
Digital watermarking has attracted increasing attentions as it has been the current solution to copyright protection and content authentication in today’s digital transformation, which has become an issue to be addressed in multimedia technology. In this paper, we propose an advanced image watermarking system based on the discrete wavelet transform (DWT) in combination with the singular value decomposition (SVD). Firstly, at the sender side, DWT is applied on a grayscale cover image and then eigendecomposition is performed on original HH (high–high) components. Similar operation is done on a grayscale watermark image. Then, two unitary and one diagonal matrices are combined to form a digital watermarked image applying inverse discrete wavelet transform (iDWT). The diagonal component of original image is transmitted through secured channel. At the receiver end, the watermark image is recovered using the watermarked image and diagonal component of the original image. Finally, we compare the original and recovered watermark image and obtained perfect normalized correlation. Simulation consequences indicate that the presented scheme can satisfy the needs of visual imperceptibility and also has high security and strong robustness against many common attacks and signal processing operations. The proposed digital image watermarking system is also compared to state-of-the-art methods to confirm the reliability and supremacy.
EdgeSVDNet: 5G-Enabled Detection and Classification of Vision-Threatening Diabetic Retinopathy in Retinal Fundus Images
The rise of vision-threatening diabetic retinopathy (VTDR) underscores the imperative for advanced and efficient early detection mechanisms. With the integration of the Internet of Things (IoT) and 5G technologies, there is transformative potential for VTDR diagnosis, facilitating real-time processing of the burgeoning volume of fundus images (FIs). Combined with artificial intelligence (AI), this offers a robust platform for managing vast healthcare datasets and achieving unparalleled disease detection precision. Our study introduces a novel AI-driven VTDR detection framework that integrates multiple models through majority voting. This comprehensive approach encompasses pre-processing, data augmentation, feature extraction using a hybrid convolutional neural network-singular value decomposition (CNN-SVD) model, and classification through an enhanced SVM-RBF combined with a decision tree (DT) and K-nearest neighbor (KNN). Validated on the IDRiD dataset, our model boasts an accuracy of 99.89%, a sensitivity of 84.40%, and a specificity of 100%, marking a significant improvement over the traditional method. The convergence of the IoT, 5G, and AI technologies herald a transformative era in healthcare, ensuring timely and accurate VTDR diagnoses, especially in geographically underserved regions.
Robust, imperceptible and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD and its authentication using SURF
In this proposed work, a dual image watermarking algorithm is used to protect the data against copyright violations. In this work, the DICOM image is used as a host image. Two watermark images used are the MNNIT logo and the personal data of the patient. This method utilizes the advantages of Schur decomposition, lifting wavelet transform (LWT), discrete cosine transform (DCT) and singular value decomposition (SVD). The scaling factor is a vital parameter of watermarking technique. The firefly optimization technique is used to get the optimized scaling factor. The Speeded-up robust features (SURF) are used for watermarking authentication. To evaluate the performance of the proposed algorithm, peak signal-to-noise ratio (PSNR), normalized correlation coefficient (NCC), and structural similarity index measurement (SSIM) are used. The proposed method is tested against various attacks such as Salt and Pepper noise, Gaussian noise, Gaussian low pass filter, Average filter, Median filter, Histogram equalization, Sharpening, Rotation and Region of interest filtering. The proposed algorithm shows a high level of robustness and imperceptibility. It is found that the features of the input host image and the watermarked image are matching correctly on applying the SURF technique.
A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection
With the growing use of the digital world and its associated challenges, the use of digital watermarking is a popular and appropriate way of protecting digital content against illegal distribution. Recently, the rapid development of Biology Information Technology and the use of biological systems have attracted the particular attention of computer security experts. For example, the linking of watermarking with chaotic mapping and DNA sequences is a relatively new field that is the subject of research these days. The purpose of this paper is to provide a new algorithm for digital video watermarking based on a combination of chaotic systems, Cellular Automata (CA), and DNA sequences. The proposed method in this paper is a practical application for copyright protection of digital videos with watermarking. The above-mentioned watermarking scheme is blind and consists of methods for Contourlet Transform (CT) and Singular Value Decomposition (SVD) with the condition of insertion into low-frequency sub-bands. Here, one-dimensional chaotic automata based on DNA with the ability of parallel implementation of various CA rules is designed. Finally, the proposed method is evaluated using common statistical criteria such as PSNR, NCC, and BER, and the results show the high resistance of the proposed algorithm to various types of attacks.
Real-time isolated hand sign language recognition using deep networks and SVD
One of the challenges in computer vision models, especially sign language, is real-time recognition. In this work, we present a simple yet low-complex and efficient model, comprising single shot detector, 2D convolutional neural network, singular value decomposition (SVD), and long short term memory, to real-time isolated hand sign language recognition (IHSLR) from RGB video. We employ the SVD method as an efficient, compact, and discriminative feature extractor from the estimated 3D hand keypoints coordinators. Despite the previous works that employ the estimated 3D hand keypoints coordinates as raw features, we propose a novel and revolutionary way to apply the SVD to the estimated 3D hand keypoints coordinates to get more discriminative features. SVD method is also applied to the geometric relations between the consecutive segments of each finger in each hand and also the angles between these sections. We perform a detailed analysis of recognition time and accuracy. One of our contributions is that this is the first time that the SVD method is applied to the hand pose parameters. Results on four datasets, RKS-PERSIANSIGN ( 99.5 ± 0.04 ), First-Person ( 91 ± 0.06 ), ASVID ( 93 ± 0.05 ), and isoGD ( 86.1 ± 0.04 ), confirm the efficiency of our method in both accuracy ( m e a n + s t d ) and time recognition. Furthermore, our model outperforms or gets competitive results with the state-of-the-art alternatives in IHSLR and hand action recognition.
Optimization of the structural complexity of artificial neural network for hardware-driven neuromorphic computing application
This work focuses on the optimization of the structural complexity of a single-layer feedforward neural network (SLFN) for neuromorphic hardware implementation. The singular value decomposition (SVD) method is used for the determination of the effective number of neurons in the hidden layer for Modified National Institute of Standards and Technology (MNIST) dataset classification. The proposed method is also verified on a SLFN using weights derived from a synaptic transistor device. The effectiveness of this methodology in estimating the reduced number of neurons in the hidden layer makes this method highly useful in optimizing complex neural network architectures for their hardware realization.
A Novel Discrete Internal Model Control Method for Underactuated System
This article provides a comparative analysis of two common control configurations used to control the side-stream distillation used to separate benzene, toluene and xylene as suggested by Doukas and Lyben. Their under-actuated model has been considered as the model of distillation column and the internal model controller is designed considering a Singular Value Decomposition (SVD) and Virtual Inputs (VI) techniques. An internal controller design based on VI is proposed in this article for this kind of underactuated systems. This design is used to control in parallel the distillation process and its model in real time. The proposed controller design is simple and systematic in relation with the desired closed loop specifications of the internal model control structure. Furthermore, the controller obtained ensure robustness to process variations. The SVD technique can realize the decoupling of under-actuated processes and wipe out unrealizable factors by introducing compensation terms, affecting the dynamic of the system. The aim of this article is to make a comparison between our proposed VI controller and the SVD approach. The results we obtained confirmed the potentials of the proposed controller based on VI considering the set point tracking and its robustness
Multi-level security of medical images based on encryption and watermarking for telemedicine applications
In this paper, a robust and hybrid domain watermarking scheme is proposed for the security of medical images in telemedicine applications. The secret identity of the patient is inserting into the cover medical image using the hybridization of ridgelet transform and singular value decomposition for the purposed of identification and authentication. For better security of watermarked medical image, the Arnold scrambling based encryption is applying to it before sending it at the receiver end. The main advantage of this scheme is multi-level security where secret patient information is inserted to cover medical image to get a secure watermarked medical image using watermarking. Then, encryption is applied to the watermarked medical image to generate its encrypted version. Thus, this proposed scheme provides multi-level security using watermarking and encryption. The advantage of multi-level security in the proposed scheme is that if an imposter or attacker tries to get patient identity from the medical image, he or she requires multiple information in terms of extraction steps and keys, etc. The other reason for proposed this scheme that it improves the payload capacity of many existing watermarking schemes. Experimental results of the scheme indicated that the proposed scheme provides high imperceptibility and more robustness against various types of attacks. Further, the performance of the proposed scheme is found better than existing medical watermarking schemes. Furthermore, quality checking of watermarked medical image is done by various quality measures which are indicated that the quality of the image has fulfilled the benefits of secure telemedicine applications.
Static and dynamic topology optimization: an innovative unifying approach
This paper presents a topology optimization approach that is innovative with respect to two distinct matters. First of all the proposed formulation is capable to handle static and dynamic topology optimization with virtually no modifications. Secondly, the approach is inherently a multi-input multi-output one, i.e., multiple objectives can be pursued in the presence of multiple loads. The input-to-output transfer matrix, say G , is the key ingredient that governs the algebraic mapping between applied loads and structural response. In statics G depends on the design variables only, whereas it depends on the frequency variable as well in the dynamic case. The Singular Value Decomposition (SVD) of G represents then the core of the proposed approach. Singular values are shown to be the gains of the input/output mapping and are used to compute proper norms of G that represent the goal functions to be minimized. Singular vectors provide at no extra cost the plant directions, i.e., the load combination factors that stress the structure the most. Numerical examples are discussed in much detail and open issues object of ongoing investigations are highlighted. A full Matlab code handling the static topology optimization problem is provided as an online Appendix to the manuscript. Its extension to the dynamic case may be gathered following the formulation proposed in Sect.  5 .
Computationally Efficient Decompositions of Oblique Projection Matrices
Oblique projection matrices arise in problems in weighted least squares, signal processing, and optimization. While these matrices can be potentially very large, their low-rank structure can be exploited for efficient computation. Here, we propose fast and scalable algorithms for computing their eigendecomposition and singular value decomposition (SVD). Numerical experiments that compare our proposed approaches to existing methods, including randomized SVD, are presented. In addition, we test their accuracy on linear systems from equality constrained optimization problems.