Skip to main content

Articles

Page 2 of 18

  1. Communications industry has remarkably changed with the development of fifth-generation cellular networks. Image, as an indispensable component of communication, has attracted wide attention. Thus, finding a s...

    Authors: Guangyi Yang, Xingyu Ding, Tian Huang, Kun Cheng and Weizheng Jin
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:48
  2. This paper deals with the current Blockchain adopted in the various types of trading markets supporting smart contracts that process text-based transaction information only when exchanging cryptocurrencies. Ev...

    Authors: Seong-Kyu Kim and Jun-Ho Huh
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:47
  3. Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis...

    Authors: Zhangjie Fu, Fan Wang and Xu Cheng
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:46
  4. An amendment to this paper has been published and can be accessed via the original article.

    Authors: Giuseppe Conti, Christos Kyrkou, Theocharis Theocharides, Gustavo Hernández-Peñaloza and David Jiménez
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:45

    The original article was published in EURASIP Journal on Image and Video Processing 2020 2020:31

  5. Image completion is an approach to fill a damaged region (hole) in an image. In this study, we adopt a novel method which can repair a target region with structural constraints in an architectural scene. An ob...

    Authors: Qiaochuan Chen, Guangyao Li, Qingguo Xiao, Li Xie and Mang Xiao
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:44
  6. In (k,n) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provi...

    Authors: Zheng Ma, Yan Ma, Xiaohong Huang, Manjun Zhang and Yanxiao Liu
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:42
  7. A high-quality underwater image is essential to many industrial and academic applications in the field of image processing and analysis. Unfortunately, underwater images frequently demonstrate poor visual qual...

    Authors: Herng-Hua Chang, Po-Fang Chen, Jun-Kai Guo and Chia-Chi Sung
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:41
  8. When embedding secret message into image by steganography with matrix encoding, there are still no effective methods to recover the stego key because it is difficult to statistically distinguish the stego coef...

    Authors: Jiufen Liu, Chunfang Yang, Junchao Wang and Yanan Shi
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:40
  9. Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) m...

    Authors: Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan and Yao Qiu
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:39
  10. Stereo matching is one of the most important topics in computer vision and aims at generating precise depth maps for various applications. The major challenge of stereo matching is to suppress inevitable error...

    Authors: Chih-Shuan Huang, Ya-Han Huang, Din-Yuen Chan and Jar-Ferr Yang
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:38
  11. In order to protect the intellectual property of neural network, an owner may select a set of trigger samples and their corresponding labels to train a network, and prove the ownership by the trigger set witho...

    Authors: Renjie Zhu, Xinpeng Zhang, Mengte Shi and Zhenjun Tang
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:37
  12. To fundamentally resist the steganalysis, coverless information hiding has been proposed, and it has become a research hotspot in the field of covert communication. However, the current methods not only requir...

    Authors: Yi Cao, Zhili Zhou, Q. M. Jonathan Wu, Chengsheng Yuan and Xingming Sun
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:36
  13. This paper proposes a new neural network learning method to improve the performance for action recognition in video. Most human action recognition methods use a clip-level training strategy, which divides the ...

    Authors: Qinghongya Shi, Hong-Bo Zhang, Hao-Tian Ren, Ji-Xiang Du and Qing Lei
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:35
  14. Textual content appearing in videos represents an interesting index for semantic retrieval of videos (from archives), generation of alerts (live streams), as well as high level applications like opinion mining...

    Authors: Ali Mirza, Ossama Zeshan, Muhammad Atif and Imran Siddiqi
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:34
  15. In this paper, a new reversible data hiding scheme in encrypted binary image is proposed by shared pixel prediction and halving compression. We first divide binary image into non-overlapping pure color blocks ...

    Authors: Fengyong Li, Lianming Zhang and Weimin Wei
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:33
  16. The early hepatic fibrosis staging is very important for timely diagnosis, prognosis, and treatment of all chronic liver diseases. Diffraction-enhanced imaging, which can provide much more information on soft ...

    Authors: Jing Wang, Hui Li, Xiuling Zhou, Xiao-Zhi Gao and Ming Wang
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:32
  17. This paper presents a framework for complete simulation and verification of Serial Digital Interface (SDI) video using a verilog test-bench and geared toward FPGAs. This framework permits simulating the entire...

    Authors: Giuseppe Conti, Christos Kyrkou, Theocharis Theocharides, Gustavo Hernández-Peñaloza and David Jiménez
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:31

    The Correction to this article has been published in EURASIP Journal on Image and Video Processing 2020 2020:45

  18. As a large number of images are transmitted through social networks every moment, terrorists may hide data into images to convey secret data. Various types of images are mixed up in the social networks, and it...

    Authors: Huaqi Wang, Zhenxing Qian, Guorui Feng and Xinpeng Zhang
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:30
  19. The anchor-free method based on key point detection has made great progress. However, the anchor-free method is too dependent on using a convolutional network to generate a rough heatmap. This is difficult to ...

    Authors: He Yang, Beibei Fan and Lingling Guo
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:29
  20. In recent years, researchers have been making great progress in the steganalysis technology based on convolution neural networks (CNN). However, experts ignore the contribution of nonlinear residual and joint ...

    Authors: Ze Wang, Mingzhi Chen, Yu Yang, Min Lei and Zhexuan Dong
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:28
  21. The core of a content-based image retrieval (CBIR) system is based on an effective understanding of the visual contents of images due to which a CBIR system can be termed as accurate. One of the most prominent...

    Authors: Ruqia Bibi, Zahid Mehmood, Rehan Mehmood Yousaf, Muhammad Tahir, Amjad Rehman, Muhammad Sardaraz and Muhammad Rashid
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:27
  22. The accuracy of the applied technique for automated nuclei segmentation is critical in obtaining high-quality and efficient diagnostic results. Unfortunately, multiple objects in histopathological images are c...

    Authors: Lukasz Roszkowiak, Anna Korzynska, Dorota Pijanowska, Ramon Bosch, Marylene Lejeune and Carlos Lopez
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:26
  23. Deep learning technology has enabled successful modeling of complex facial features when high-quality images are available. Nonetheless, accurate modeling and recognition of human faces in real-world scenarios...

    Authors: Samadhi P. K. Wickrama Arachchilage and Ebroul Izquierdo
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:25
  24. This paper addresses the recognitions of human actions in videos. Human action recognition can be seen as the automatic labeling of a video according to the actions occurring in it. It has become one of the mo...

    Authors: Yuxuan Zhao, Ka Lok Man, Jeremy Smith, Kamran Siddique and Sheng-Uei Guan
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:24
  25. Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the field of information hiding. At present, most coverless info...

    Authors: Nan Pan, Jiaohua Qin, Yun Tan, Xuyu Xiang and Guimin Hou
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:23
  26. This work presents a shallow network based on subspaces with applications in image classification. Recently, shallow networks based on PCA filter banks have been employed to solve many computer vision-related ...

    Authors: Bernardo B. Gatto, Lincon S. Souza, Eulanda M. dos Santos, Kazuhiro Fukui, Waldir S. S. Júnior and Kenny V. dos Santos
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:22
  27. Image hashing is an efficient technology for processing digital images and has been successfully used in image copy detection, image retrieval, image authentication, image quality assessment, and so on. In thi...

    Authors: Zhenjun Tang, Hanyun Zhang, Shenglian Lu, Heng Yao and Xianquan Zhang
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:21
  28. The feature extraction technique is applied on least enclosing rectangle (LER) of the segmented object to increase the processing speed. The main intuition of this salp swarm algorithm relays on reducing the c...

    Authors: Jemilda G. and Baulkani S.
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:20
  29. Recent technological advances have enabled the development of compact and portable cameras for the generation of large volumes of video content. Several applications have benefited from such significant growth...

    Authors: Marcos Roberto e Souza and Helio Pedrini
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:19
  30. The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of co...

    Authors: Xintao Duan, Baoxia Li, Daidou Guo, Zhen Zhang and Yuanyuan Ma
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:18
  31. Real-time multichannel video analysis is significant for intelligent transportation. Considering that deep learning and correlation filter (CF) tracking are time-consuming, a vehicle tracking method for traffi...

    Authors: Bo Yang, Mingyue Tang, Shaohui Chen, Gang Wang, Yan Tan and Bijun Li
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:17
  32. The wireless capsule endoscope (WCE) is a pill-sized device taking images, which are transmitting to an on-body receiver, while traveling through the digestive system. Since image data is transmitted through t...

    Authors: Pål Anders Floor, Ivar Farup, Marius Pedersen and Øistein Hovde
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:14
  33. Semi-structured data is a widely used text format for data interchange and storage. This paper proposes a robust watermarking scheme of data protection for semi-structured data, which uses JSON format as an ex...

    Authors: Jiahuan He, Qichao Ying, Zhenxing Qian, Guorui Feng and Xinpeng Zhang
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:12
  34. The technique of reversible data hiding enables an original image to be restored from a stego-image with no loss of host information, and it is known as a reversible data hiding algorithm (RDH). Our goal is to...

    Authors: Kuo-Ming Hung, Chi-Hsiao Yih, Cheng-Hsiang Yeh and Li-Ming Chen
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:8
  35. The methods combining correlation filters (CFs) with the features of convolutional neural network (CNN) are good at object tracking. However, the high-level features of a typical CNN without residual structure...

    Authors: Yue Yuan, Jun Chu, Lu Leng, Jun Miao and Byung-Gyu Kim
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:7
  36. Image acquisition under bad weather conditions is prone to yield image with low contrast, faded color, and overall poor visibility. Different computer vision applications including surveillance, object classif...

    Authors: Aneela Sabir, Khawar Khurshid and Ahmad Salman
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:6
  37. Image fusion technology combines information from different source images of the same target and performs extremely effective information complementation, which is widely used for the transportation field, med...

    Authors: Lin He, Xiaomin Yang, Lu Lu, Wei Wu, Awais Ahmad and Gwanggil Jeon
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:5
  38. In view of the problem that the conventional tracker does not adapt to abrupt motion, we propose a tracking algorithm based on the hybrid extended ant lion optimizer with sine cosine algorithm (EALO-SCA) in th...

    Authors: Huanlong Zhang, Zeng Gao, Jie Zhang, Junfeng Liu, Zhicheng Nie and Jianwei Zhang
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:4
  39. The Vese-Chan model for multiphase image segmentation uses m binary label functions to construct 2m characteristic functions for different phases/regions systematically; the terms in this model have moderate degr...

    Authors: Jie Wang, Zisen Xu, Zhenkuan Pan, Weibo Wei and Guodong Wang
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:3
  40. Deep neural networks are vulnerable to adversarial samples, posing potential threats to the applications deployed with deep learning models in practical conditions. A typical example is the fingerprint livenes...

    Authors: Jianwei Fei, Zhihua Xia, Peipeng Yu and Fengjun Xiao
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:1
  41. In steganography, the cover medium is widely treated as a mere container for the embedded information, even though it affects the stego-image quality, security, and robustness. In addition, there is no consens...

    Authors: Sa’ed Abed, Suood Abdulaziz Al-Roomi and Mohammad Al-Shayeji
    Citation: EURASIP Journal on Image and Video Processing 2019 2019:87
  42. Free viewpoint video is generated on the basis of a video plus depth (V+D) virtual point rendering framework. Because of the limited bandwidth of video transmission, depth-image-based rendering (DIBR) has beco...

    Authors: Li Yao, Qiurui Lu and Xiaomin Li
    Citation: EURASIP Journal on Image and Video Processing 2019 2019:86

Webinar Series

Learn more about the EURASIP Journal on Image and Video Processing free monthly webinar series

Annual Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here


EURASIP Best paper awards 2021

We are pleased to announce that the following paper published in EURASIP Journal on Image and Video Processing has been awarded a EURASIP best paper award!


Research

DIBR synthesized image quality assessment based on morphological multiscale approach
Dragana Sandić-Stanković, Dragan Kukolj, and Patrick Le Callet

The award ceremony will take place at the upcoming virtual edition of EUSIPCO to be held in August 2021. For more information see the EURASIP newsletter.