Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
478
result(s) for
"SVD (singular value decomposition)"
Sort by:
A sophisticated and provably grayscale image watermarking system using DWT-SVD domain
by
Naffouti, Seif Eddine
,
Sakly, Anis
,
Kricha, Anis
in
Algorithms
,
Artificial Intelligence
,
Computer Graphics
2023
Digital watermarking has attracted increasing attentions as it has been the current solution to copyright protection and content authentication in today’s digital transformation, which has become an issue to be addressed in multimedia technology. In this paper, we propose an advanced image watermarking system based on the discrete wavelet transform (DWT) in combination with the singular value decomposition (SVD). Firstly, at the sender side, DWT is applied on a grayscale cover image and then eigendecomposition is performed on original HH (high–high) components. Similar operation is done on a grayscale watermark image. Then, two unitary and one diagonal matrices are combined to form a digital watermarked image applying inverse discrete wavelet transform (iDWT). The diagonal component of original image is transmitted through secured channel. At the receiver end, the watermark image is recovered using the watermarked image and diagonal component of the original image. Finally, we compare the original and recovered watermark image and obtained perfect normalized correlation. Simulation consequences indicate that the presented scheme can satisfy the needs of visual imperceptibility and also has high security and strong robustness against many common attacks and signal processing operations. The proposed digital image watermarking system is also compared to state-of-the-art methods to confirm the reliability and supremacy.
Journal Article
EdgeSVDNet: 5G-Enabled Detection and Classification of Vision-Threatening Diabetic Retinopathy in Retinal Fundus Images
by
Baig, Talha Imtiaz
,
Shafiq, Muhammad
,
Liu, Xiaowen
in
Accuracy
,
Artificial intelligence
,
Artificial neural networks
2023
The rise of vision-threatening diabetic retinopathy (VTDR) underscores the imperative for advanced and efficient early detection mechanisms. With the integration of the Internet of Things (IoT) and 5G technologies, there is transformative potential for VTDR diagnosis, facilitating real-time processing of the burgeoning volume of fundus images (FIs). Combined with artificial intelligence (AI), this offers a robust platform for managing vast healthcare datasets and achieving unparalleled disease detection precision. Our study introduces a novel AI-driven VTDR detection framework that integrates multiple models through majority voting. This comprehensive approach encompasses pre-processing, data augmentation, feature extraction using a hybrid convolutional neural network-singular value decomposition (CNN-SVD) model, and classification through an enhanced SVM-RBF combined with a decision tree (DT) and K-nearest neighbor (KNN). Validated on the IDRiD dataset, our model boasts an accuracy of 99.89%, a sensitivity of 84.40%, and a specificity of 100%, marking a significant improvement over the traditional method. The convergence of the IoT, 5G, and AI technologies herald a transformative era in healthcare, ensuring timely and accurate VTDR diagnoses, especially in geographically underserved regions.
Journal Article
Robust, imperceptible and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD and its authentication using SURF
2023
In this proposed work, a dual image watermarking algorithm is used to protect the data against copyright violations. In this work, the DICOM image is used as a host image. Two watermark images used are the MNNIT logo and the personal data of the patient. This method utilizes the advantages of Schur decomposition, lifting wavelet transform (LWT), discrete cosine transform (DCT) and singular value decomposition (SVD). The scaling factor is a vital parameter of watermarking technique. The firefly optimization technique is used to get the optimized scaling factor. The Speeded-up robust features (SURF) are used for watermarking authentication. To evaluate the performance of the proposed algorithm, peak signal-to-noise ratio (PSNR), normalized correlation coefficient (NCC), and structural similarity index measurement (SSIM) are used. The proposed method is tested against various attacks such as Salt and Pepper noise, Gaussian noise, Gaussian low pass filter, Average filter, Median filter, Histogram equalization, Sharpening, Rotation and Region of interest filtering. The proposed algorithm shows a high level of robustness and imperceptibility. It is found that the features of the input host image and the watermarked image are matching correctly on applying the SURF technique.
Journal Article
A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection
2023
With the growing use of the digital world and its associated challenges, the use of digital watermarking is a popular and appropriate way of protecting digital content against illegal distribution. Recently, the rapid development of Biology Information Technology and the use of biological systems have attracted the particular attention of computer security experts. For example, the linking of watermarking with chaotic mapping and DNA sequences is a relatively new field that is the subject of research these days. The purpose of this paper is to provide a new algorithm for digital video watermarking based on a combination of chaotic systems, Cellular Automata (CA), and DNA sequences. The proposed method in this paper is a practical application for copyright protection of digital videos with watermarking. The above-mentioned watermarking scheme is blind and consists of methods for Contourlet Transform (CT) and Singular Value Decomposition (SVD) with the condition of insertion into low-frequency sub-bands. Here, one-dimensional chaotic automata based on DNA with the ability of parallel implementation of various CA rules is designed. Finally, the proposed method is evaluated using common statistical criteria such as PSNR, NCC, and BER, and the results show the high resistance of the proposed algorithm to various types of attacks.
Journal Article
Real-time isolated hand sign language recognition using deep networks and SVD
by
Rastgoo, Razieh
,
Escalera, Sergio
,
Kiani, Kourosh
in
Accuracy
,
Angles (geometry)
,
Artificial Intelligence
2022
One of the challenges in computer vision models, especially sign language, is real-time recognition. In this work, we present a simple yet low-complex and efficient model, comprising single shot detector, 2D convolutional neural network, singular value decomposition (SVD), and long short term memory, to real-time isolated hand sign language recognition (IHSLR) from RGB video. We employ the SVD method as an efficient, compact, and discriminative feature extractor from the estimated 3D hand keypoints coordinators. Despite the previous works that employ the estimated 3D hand keypoints coordinates as raw features, we propose a novel and revolutionary way to apply the SVD to the estimated 3D hand keypoints coordinates to get more discriminative features. SVD method is also applied to the geometric relations between the consecutive segments of each finger in each hand and also the angles between these sections. We perform a detailed analysis of recognition time and accuracy. One of our contributions is that this is the first time that the SVD method is applied to the hand pose parameters. Results on four datasets, RKS-PERSIANSIGN (
99.5
±
0.04
), First-Person (
91
±
0.06
), ASVID (
93
±
0.05
), and isoGD (
86.1
±
0.04
), confirm the efficiency of our method in both accuracy (
m
e
a
n
+
s
t
d
) and time recognition. Furthermore, our model outperforms or gets competitive results with the state-of-the-art alternatives in IHSLR and hand action recognition.
Journal Article
Optimization of the structural complexity of artificial neural network for hardware-driven neuromorphic computing application
by
Park, Byung-Gook
,
Cho, Seongjae
,
Udaya Mohanan, Kannan
in
Artificial neural networks
,
Back propagation
,
Brain
2023
This work focuses on the optimization of the structural complexity of a single-layer feedforward neural network (SLFN) for neuromorphic hardware implementation. The singular value decomposition (SVD) method is used for the determination of the effective number of neurons in the hidden layer for Modified National Institute of Standards and Technology (MNIST) dataset classification. The proposed method is also verified on a SLFN using weights derived from a synaptic transistor device. The effectiveness of this methodology in estimating the reduced number of neurons in the hidden layer makes this method highly useful in optimizing complex neural network architectures for their hardware realization.
Journal Article
A Novel Discrete Internal Model Control Method for Underactuated System
by
Xibilia, Maria Gabriela
,
Beaojui, Islem
,
Saidi, Imen
in
Benzene
,
Closed loops
,
Comparative analysis
2021
This article provides a comparative analysis of two common control configurations used to control the side-stream distillation used to separate benzene, toluene and xylene as suggested by Doukas and Lyben. Their under-actuated model has been considered as the model of distillation column and the internal model controller is designed considering a Singular Value Decomposition (SVD) and Virtual Inputs (VI) techniques. An internal controller design based on VI is proposed in this article for this kind of underactuated systems. This design is used to control in parallel the distillation process and its model in real time. The proposed controller design is simple and systematic in relation with the desired closed loop specifications of the internal model control structure. Furthermore, the controller obtained ensure robustness to process variations. The SVD technique can realize the decoupling of under-actuated processes and wipe out unrealizable factors by introducing compensation terms, affecting the dynamic of the system. The aim of this article is to make a comparison between our proposed VI controller and the SVD approach. The results we obtained confirmed the potentials of the proposed controller based on VI considering the set point tracking and its robustness
Journal Article
Multi-level security of medical images based on encryption and watermarking for telemedicine applications
2021
In this paper, a robust and hybrid domain watermarking scheme is proposed for the security of medical images in telemedicine applications. The secret identity of the patient is inserting into the cover medical image using the hybridization of ridgelet transform and singular value decomposition for the purposed of identification and authentication. For better security of watermarked medical image, the Arnold scrambling based encryption is applying to it before sending it at the receiver end. The main advantage of this scheme is multi-level security where secret patient information is inserted to cover medical image to get a secure watermarked medical image using watermarking. Then, encryption is applied to the watermarked medical image to generate its encrypted version. Thus, this proposed scheme provides multi-level security using watermarking and encryption. The advantage of multi-level security in the proposed scheme is that if an imposter or attacker tries to get patient identity from the medical image, he or she requires multiple information in terms of extraction steps and keys, etc. The other reason for proposed this scheme that it improves the payload capacity of many existing watermarking schemes. Experimental results of the scheme indicated that the proposed scheme provides high imperceptibility and more robustness against various types of attacks. Further, the performance of the proposed scheme is found better than existing medical watermarking schemes. Furthermore, quality checking of watermarked medical image is done by various quality measures which are indicated that the quality of the image has fulfilled the benefits of secure telemedicine applications.
Journal Article
Static and dynamic topology optimization: an innovative unifying approach
by
Venini, Paolo
,
Pingaro, Marco
in
Computational Mathematics and Numerical Analysis
,
Engineering
,
Engineering Design
2023
This paper presents a topology optimization approach that is innovative with respect to two distinct matters. First of all the proposed formulation is capable to handle static and dynamic topology optimization with virtually no modifications. Secondly, the approach is inherently a multi-input multi-output one, i.e., multiple objectives can be pursued in the presence of multiple loads. The input-to-output transfer matrix, say
G
, is the key ingredient that governs the algebraic mapping between applied loads and structural response. In statics
G
depends on the design variables only, whereas it depends on the frequency variable as well in the dynamic case. The Singular Value Decomposition (SVD) of
G
represents then the core of the proposed approach. Singular values are shown to be the gains of the input/output mapping and are used to compute proper norms of
G
that represent the goal functions to be minimized. Singular vectors provide at no extra cost the plant directions, i.e., the load combination factors that stress the structure the most. Numerical examples are discussed in much detail and open issues object of ongoing investigations are highlighted. A full Matlab code handling the static topology optimization problem is provided as an online Appendix to the manuscript. Its extension to the dynamic case may be gathered following the formulation proposed in Sect.
5
.
Journal Article
Computationally Efficient Decompositions of Oblique Projection Matrices
by
Brust, Johannes J.
,
Marcia, Roummel F.
,
Petra, Cosmin G.
in
eigendecomposition
,
MATHEMATICS AND COMPUTING
,
oblique projection matrices
2020
Oblique projection matrices arise in problems in weighted least squares, signal processing, and optimization. While these matrices can be potentially very large, their low-rank structure can be exploited for efficient computation. Here, we propose fast and scalable algorithms for computing their eigendecomposition and singular value decomposition (SVD). Numerical experiments that compare our proposed approaches to existing methods, including randomized SVD, are presented. In addition, we test their accuracy on linear systems from equality constrained optimization problems.
Journal Article