吉林大学学报(工学版) ›› 2016, Vol. 46 ›› Issue (4): 1232-1238.doi: 10.13229/j.cnki.jdxbgxb201604032
• Orginal Article • Previous Articles Next Articles
SHEN Xuan-jing1, 2, FAN Zi-long1, 2, LYU Ying-da3, CHEN Hai-peng1, 2
CLC Number:
[1] 王春哲, 李杰, 李明晶,等. 一种多扭曲失真图像的质量评价方法[J]. 液晶与显示, 2015, 30(04):681-686. Wang Chun-zhe, Li Jie, Li Ming-jing, et al. Image quality assessment algorithm for multi-distorted image[J].Chinese Journal of Liquid Crystals and Displays , 2015, 30(4): 681-686. [2] 曹雷, 陈洪斌, 邱琪, 等. 盲图像复原研究现状[J]. 中国光学, 2014,7(1): 68-78. Cao Lei, Chen Hong-bin, Qiu Qi, et al. Research status of blind image restoration[J]. Chinese Optics, 2014,7(1): 68-78. [3] 柯洪昌, 孙宏彬. 图像序列的显著性目标区域检测方法[J]. 中国光学, 2015,8(5): 768-774. Ke Hong-chang, Sun Hong-bin. A saliency target area detection method of image sequence[J]. Chinese Optics, 2015,8(5): 768-774. [4] 张振东, 陈健, 王伟国, 等. 基于SSIM_NCCDFT的超分辨率复原评价方法研究[J]. 液晶与显示, 2015, 30(4): 713-721. Zhang Zhen-dong, Chen Jian, Wang Wei-guo, et al. Evaluation method of super-resolution restoration based on SSIM_NCCDFT[J].Chinese Journal of Liquid Crystals and Displays, 2015, 30(4): 713-721. [5] 朱艳玲. 数字图像取证的关键技术研究[D]. 北京:北京邮电大学计算机学院, 2011. Zhu Yan-ling. Study on key technology for digital image forensies[D].Beijing: School of Computer Science,Beijing University of Posts and Telecommunications, 2011. [6] 胡东辉, 王丽娜, 江夏秋. 盲环境下的数字图像可信性评估模型研究[J]. 计算机学报, 2009, 32(4): 675-687. Hu Dong-hui,Wang Li-na, Jiang Xia-qiu. Research on trust worthiness evaluation model for digital image in blind environment[J]. Chinese Journal of Computers,2009, 32(4): 675-687. [7] 孟宪哲. 盲环境下数字图像篡改鉴定的关键理论与技术研究[D]. 北京: 北京邮电大学计算机学院2013. Meng Xian-zhe. Study of the key theories and algorithms on image forensics[D]. Beijing: School of Computer Science,Beijing University of Posts and Telecommunications, 2013. [8] Tan X, Triggs B. Enhanced Local Texture Feature sets for Face Recognition under Difficult Lighting Conditions[M]. Berlin Heidelberg:Springer, 2007: 168-182. [9] Li Z, Ye J, Shi Y Q. Distinguishing computer graphics from photographic images using local binary patterns[C]∥International Conference on Digital Forensics and Watermaking,Springer Berlin Heidelberg, 2012, 7809: 228-241. [10] 刘晓霞, 李峰, 熊兵. 基于韦伯局部特征的图像拼接检测[J]. 计算机工程与应用, 2013, 49(12): 140-143. Liu Xiao-xia, Li Feng, Xiong Bing. Image splicing detection using Weber local descriptors[J]. Computer Engineering and Applications, 2013, 49(12):140-143. [11] 薛宁静. 多类支持向量机分类器对比研究[J]. 计算机工程与设计, 2011,32(5),1792-1795. Xue Ning-jing. Comparison of multi-class support vector machines[J]. Computer Engineering and Design,2011,32(5),1792-1795. [12] Ng T T, Chang S F, Hsu J, et al. Columbia photographic images and photorealistic computer graphics dataset[R]. Columbia University, Advent Technical Report, 2005:205-2004-5. [13] The DVMM Laboratory of Columbia University. Columbia image splicing detection evaluation dataset[DB/OL].[ 2010-08-26]. http:∥www.ee. columbia.edu/ln/dvmm/downloads/AuthSplicedData-Set/ dlform.html. [14] Gao X, Qiu B, Shen J J, et al. A smart phone image database for single image recapture detection[C]∥International Conference on Digital Watermarking, 2010, 6526:90-104. [15] Chang C C, Lin C J. LIBSVM: a library for support vector machines[J]. ACM Transactions on Intelligent Systems and Technology (TIST), 2011, 2(3):389-396. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|