首页 > 最新文献

Multimedia Tools and Applications最新文献

英文 中文
A framework for robotic grasping of 3D objects in a tabletop environment 桌面环境中三维物体的机器人抓取框架
IF 3.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-04 DOI: 10.1007/s11042-024-20178-y
Sainul Islam Ansary, Atul Mishra, Sankha Deb, Alok Kanti Deb

Automatic grasping of unknown 3D objects is still a very challenging problem in robotics. Such challenges mainly originate from the limitations of perception systems and implementations of the grasp planning methods for handling arbitrary 3D objects on real robot platforms. This paper presents a complete framework for robotic grasping of unknown 3D objects in a tabletop environment. The framework comprises of a 3D perception system for obtaining the complete point cloud of the objects, followed by a module for finding the best grasp by an object-slicing based grasp planner, a module for trajectory generation for pick and place operations, and finally performing the planned grasps on a real robot platform. The proposed 3D object perception captures the complete geometry information of the target object using two depth cameras placed at different locations. A hole-filling algorithm is also proposed to quickly fill the missing data points in the captured point cloud of target object. The object-slicing based grasp planner is extended to handle the obstacles posed by the neighbouring objects on a tabletop environment. Then, the proposed framework is tested on common household objects by performing pick and place operations on a real robot fitted with an adaptive gripper. Moreover, finding the best feasible grasp in the presence of neighbouring objects is also demonstrated such as avoiding the table-top and surrounding objects.

自动抓取未知三维物体仍然是机器人技术中一个极具挑战性的问题。这些挑战主要源于感知系统的局限性,以及在真实机器人平台上处理任意三维物体的抓取规划方法的实现。本文介绍了在桌面环境中机器人抓取未知三维物体的完整框架。该框架由三维感知系统(用于获取物体的完整点云)、基于物体切片的抓取规划模块(用于找到最佳抓取点)、轨迹生成模块(用于拾取和放置操作)以及最后在真实机器人平台上执行规划的抓取操作组成。拟议的三维物体感知利用放置在不同位置的两个深度摄像头捕捉目标物体的完整几何信息。此外,还提出了一种填洞算法,用于快速填补捕捉到的目标物体点云中缺失的数据点。基于物体切片的抓取规划器被扩展用于处理桌面环境中相邻物体造成的障碍。然后,通过在装有自适应抓手的真实机器人上执行拾放操作,对所提出的框架进行了测试。此外,还演示了在存在邻近物体的情况下找到最佳可行抓取方式,如避开桌面和周围物体。
{"title":"A framework for robotic grasping of 3D objects in a tabletop environment","authors":"Sainul Islam Ansary, Atul Mishra, Sankha Deb, Alok Kanti Deb","doi":"10.1007/s11042-024-20178-y","DOIUrl":"https://doi.org/10.1007/s11042-024-20178-y","url":null,"abstract":"<p><i>A</i>utomatic grasping of unknown 3D objects is still a very challenging problem in robotics. Such challenges mainly originate from the limitations of perception systems and implementations of the grasp planning methods for handling arbitrary 3D objects on real robot platforms. This paper presents a complete framework for robotic grasping of unknown 3D objects in a tabletop environment. The framework comprises of a 3D perception system for obtaining the complete point cloud of the objects, followed by a module for finding the best grasp by an object-slicing based grasp planner, a module for trajectory generation for pick and place operations, and finally performing the planned grasps on a real robot platform. The proposed 3D object perception captures the complete geometry information of the target object using two depth cameras placed at different locations. A hole-filling algorithm is also proposed to quickly fill the missing data points in the captured point cloud of target object. The object-slicing based grasp planner is extended to handle the obstacles posed by the neighbouring objects on a tabletop environment. Then, the proposed framework is tested on common household objects by performing pick and place operations on a real robot fitted with an adaptive gripper. Moreover, finding the best feasible grasp in the presence of neighbouring objects is also demonstrated such as avoiding the table-top and surrounding objects.</p>","PeriodicalId":18770,"journal":{"name":"Multimedia Tools and Applications","volume":"2 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An autoencoder based unsupervised clustering approach to analyze the effect of E-learning on the mental health of Indian students during the Covid-19 pandemic 基于自编码器的无监督聚类方法分析电子学习对印度学生在 Covid-19 大流行期间心理健康的影响
IF 3.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-04 DOI: 10.1007/s11042-024-19983-2
Pritha Banerjee, Chandan Jana, Jayita Saha, Chandreyee Chowdhury

Due to the Covid-19 pandemic, the education system in India has changed to remote that is, online study mode. Though there are works on the effect of teaching learning on Indian students, the effect of online mode and associated mental state, particularly when the entire country is going through a crisis could not be found in the literature. Our goal is to analyze data and find some pattern through which we can understand the effectiveness of the online study and also try to figure out the stress level. The dataset we collected from 500 undergraduate college students during April-May, 2021 is in questionnaire format. Our contribution in this paper are - (i) publishing a dataset of student feedbacks, and (ii) designing a data processing pipeline involving autoencoders followed by clustering approach. The dataset is in text format so for our analysis we have converted the dataset into a numerical format using the concept of a binary bag of words. Dimensionality reduction is applied through autoencoder for an effective latent space representation. Finally, for finding patterns out of this dimensionally reduced feature space, we have applied unsupervised learning algorithms - kMeans and DBSCAN. A thorough analysis of the clustering process reveals that the absence of social communication in purely online education provokes isolation irrespective of the urban or rural background of the students. However, it could supplement offline classes as a substantial number of students welcomed the concept of online learning as reported in the data.

由于 "Covid-19 "大流行,印度的教育系统已转向远程教育,即在线学习模式。虽然有作品研究了教学对印度学生的影响,但关于在线学习模式的影响以及相关的心理状态,尤其是在整个国家正经历危机的时候,在文献中却找不到。我们的目标是分析数据,找到一些模式,从而了解在线学习的效果,并尝试找出压力水平。我们在 2021 年 4 月至 5 月期间以问卷形式从 500 名本科大学生中收集了数据集。我们在本文中的贡献是:(i) 发布了一个学生反馈数据集;(ii) 设计了一个数据处理管道,包括自动编码器和聚类方法。数据集是文本格式的,因此为了进行分析,我们使用二进制词袋的概念将数据集转换为数字格式。通过自动编码器进行降维,以实现有效的潜在空间表示。最后,为了从这个降维特征空间中找出模式,我们采用了无监督学习算法--kMeans 和 DBSCAN。对聚类过程的全面分析表明,无论学生的背景是城市还是农村,纯在线教育中社会交流的缺失都会造成孤立。然而,由于数据显示相当多的学生欢迎在线学习的概念,因此在线教育可以作为线下课堂的补充。
{"title":"An autoencoder based unsupervised clustering approach to analyze the effect of E-learning on the mental health of Indian students during the Covid-19 pandemic","authors":"Pritha Banerjee, Chandan Jana, Jayita Saha, Chandreyee Chowdhury","doi":"10.1007/s11042-024-19983-2","DOIUrl":"https://doi.org/10.1007/s11042-024-19983-2","url":null,"abstract":"<p>Due to the Covid-19 pandemic, the education system in India has changed to remote that is, online study mode. Though there are works on the effect of teaching learning on Indian students, the effect of online mode and associated mental state, particularly when the entire country is going through a crisis could not be found in the literature. Our goal is to analyze data and find some pattern through which we can understand the effectiveness of the online study and also try to figure out the stress level. The dataset we collected from 500 undergraduate college students during April-May, 2021 is in questionnaire format. Our contribution in this paper are - (i) publishing a dataset of student feedbacks, and (ii) designing a data processing pipeline involving autoencoders followed by clustering approach. The dataset is in text format so for our analysis we have converted the dataset into a numerical format using the concept of a binary bag of words. Dimensionality reduction is applied through autoencoder for an effective latent space representation. Finally, for finding patterns out of this dimensionally reduced feature space, we have applied unsupervised learning algorithms - kMeans and DBSCAN. A thorough analysis of the clustering process reveals that the absence of social communication in purely online education provokes isolation irrespective of the urban or rural background of the students. However, it could supplement offline classes as a substantial number of students welcomed the concept of online learning as reported in the data.</p>","PeriodicalId":18770,"journal":{"name":"Multimedia Tools and Applications","volume":"7 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A TinyML model for sidewalk obstacle detection: aiding the blind and visually impaired people 人行道障碍物检测 TinyML 模型:为盲人和视障人士提供帮助
IF 3.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1007/s11042-024-20070-9
Ahmed Boussihmed, Khalid El Makkaoui, Ibrahim Ouahbi, Yassine Maleh, Abdelaziz Chetouani

This paper presents a pioneering study on the feasibility of implementing deep learning on resource-restricted IoT devices for real-world applications. We introduce a TinyML model configured for sidewalk obstacle detection tailored explicitly to assist those with visual impairments-a demographic often hindered by urban navigation challenges. Our investigation primarily focuses on adapting traditionally computationally intensive deep learning models to the stringent confines of IoT systems, where both memory and processing power are markedly limited. With a remarkably small footprint of just 1.93 MB and a robust mean average precision (mAP) of 50%, the proposed model achieves breakthrough outcomes, making it particularly well-suited for lightweight IoT devices. We demonstrate an exceptional inference speed of 96.2 milliseconds on a standard CPU, signifying a substantial step toward real-time processing in assistive technologies. The implications of this research are profound, emphasizing TinyML’s potential to bridge the gap between advanced machine learning capabilities and the accessibility demands of assistive devices for visually impaired individuals.

本文开创性地研究了在资源受限的物联网设备上实施深度学习在现实世界中应用的可行性。我们介绍了为人行道障碍物检测而配置的 TinyML 模型,该模型专门为视觉障碍者量身定制,而视觉障碍者往往会受到城市导航挑战的阻碍。我们的研究主要集中在将传统计算密集型深度学习模型适应物联网系统的严格限制,因为物联网系统的内存和处理能力都明显有限。我们提出的模型占用空间极小,仅为 1.93 MB,平均精确度(mAP)高达 50%,取得了突破性的成果,特别适用于轻量级物联网设备。我们展示了在标准 CPU 上 96.2 毫秒的超快推理速度,这标志着向辅助技术的实时处理迈出了实质性的一步。这项研究意义深远,它强调了 TinyML 在缩小先进机器学习能力与视障人士辅助设备无障碍需求之间差距的潜力。
{"title":"A TinyML model for sidewalk obstacle detection: aiding the blind and visually impaired people","authors":"Ahmed Boussihmed, Khalid El Makkaoui, Ibrahim Ouahbi, Yassine Maleh, Abdelaziz Chetouani","doi":"10.1007/s11042-024-20070-9","DOIUrl":"https://doi.org/10.1007/s11042-024-20070-9","url":null,"abstract":"<p>This paper presents a pioneering study on the feasibility of implementing deep learning on resource-restricted IoT devices for real-world applications. We introduce a TinyML model configured for sidewalk obstacle detection tailored explicitly to assist those with visual impairments-a demographic often hindered by urban navigation challenges. Our investigation primarily focuses on adapting traditionally computationally intensive deep learning models to the stringent confines of IoT systems, where both memory and processing power are markedly limited. With a remarkably small footprint of just 1.93 MB and a robust mean average precision (mAP) of 50%, the proposed model achieves breakthrough outcomes, making it particularly well-suited for lightweight IoT devices. We demonstrate an exceptional inference speed of 96.2 milliseconds on a standard CPU, signifying a substantial step toward real-time processing in assistive technologies. The implications of this research are profound, emphasizing TinyML’s potential to bridge the gap between advanced machine learning capabilities and the accessibility demands of assistive devices for visually impaired individuals.</p>","PeriodicalId":18770,"journal":{"name":"Multimedia Tools and Applications","volume":"49 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision-based framework to facilitate EDGE computing in smart health care 基于决策的框架,促进 EDGE 计算在智能医疗保健中的应用
IF 3.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1007/s11042-024-20073-6
Simranjit Singh, Mohit Sajwan, Sonal Kukreja

In the past few years, with the increase in population and health concerns, there has been a need for efficient health monitoring solutions that can help patients monitor their health consistently to be aware of any health risks at the initial stage. The advancement in sensing and smart technologies helps monitor human behaviors to predict health risks. In this work, a dynamic decision-based activity prediction system is proposed using Random Forest, SVM, Decision Trees, Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU) on an edge device. We train the models using features from the MHealth dataset, such as acceleration, rate of turn, and magnetic field, to predict activities such as standing, climbing, running, and jogging, collected from various sensors. Our framework dynamically selects between machine learning (ML) and deep learning (DL) algorithms based on real-time data size and edge device capabilities, ensuring optimal performance and resource utilization. The results for the proposed models are compared and analyzed. The experimental results indicate that among all machine learning methods, Random Forest achieves the highest overall accuracy at 98%, while in deep learning algorithms, both LSTM and GRU reach a maximum accuracy of 98%.

在过去几年里,随着人口和健康问题的增加,人们需要高效的健康监测解决方案,帮助患者持续监测自己的健康状况,以便在最初阶段就意识到任何健康风险。传感和智能技术的进步有助于监测人类行为,从而预测健康风险。在这项工作中,我们在边缘设备上使用随机森林、SVM、决策树、长短期记忆(LSTM)和门控循环单元(GRU),提出了一种基于决策的动态活动预测系统。我们使用 MHealth 数据集的加速度、转弯率和磁场等特征来训练模型,以预测从各种传感器收集到的站立、攀爬、跑步和慢跑等活动。我们的框架根据实时数据大小和边缘设备能力,在机器学习(ML)和深度学习(DL)算法之间进行动态选择,以确保最佳性能和资源利用率。对所提模型的结果进行了比较和分析。实验结果表明,在所有机器学习方法中,随机森林的总体准确率最高,达到 98%;而在深度学习算法中,LSTM 和 GRU 的准确率最高,均达到 98%。
{"title":"Decision-based framework to facilitate EDGE computing in smart health care","authors":"Simranjit Singh, Mohit Sajwan, Sonal Kukreja","doi":"10.1007/s11042-024-20073-6","DOIUrl":"https://doi.org/10.1007/s11042-024-20073-6","url":null,"abstract":"<p>In the past few years, with the increase in population and health concerns, there has been a need for efficient health monitoring solutions that can help patients monitor their health consistently to be aware of any health risks at the initial stage. The advancement in sensing and smart technologies helps monitor human behaviors to predict health risks. In this work, a dynamic decision-based activity prediction system is proposed using Random Forest, SVM, Decision Trees, Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU) on an edge device. We train the models using features from the MHealth dataset, such as acceleration, rate of turn, and magnetic field, to predict activities such as standing, climbing, running, and jogging, collected from various sensors. Our framework dynamically selects between machine learning (ML) and deep learning (DL) algorithms based on real-time data size and edge device capabilities, ensuring optimal performance and resource utilization. The results for the proposed models are compared and analyzed. The experimental results indicate that among all machine learning methods, Random Forest achieves the highest overall accuracy at 98%, while in deep learning algorithms, both LSTM and GRU reach a maximum accuracy of 98%.</p>","PeriodicalId":18770,"journal":{"name":"Multimedia Tools and Applications","volume":"106 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient reversible data hiding in encrypted images using Block Complexity and most significant bit inversion strategy 利用块复杂性和最重要比特反转策略在加密图像中高效隐藏可逆数据
IF 3.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1007/s11042-024-20106-0
Cheng-Hsing Yang, Chi-Yao Weng, Chia-Ling Hung, Shiuh-Jeng WANG

Reversible data hiding in the encrypted images (RDHEI) has attracted more attention because RDHEI can be used for both information protection and image encryption. Many researches based on RDHEI have been proposed by using the Most Significant Bit (MSB) inversion to embed confidential information, but they might subject to errors when extracting the hidden information. This paper improves the approach based on MSB inversion and proposes a new RDHEI technique. Our approach hides the block’s position of the block in the image, which would cause misinterpretation in the original image, and then encrypts the image. The MSB inversion strategy is applied to embed the secret messages in the encrypted image. Since the location information of the error block is pre-hidden in the image, this information ensures that the secret message is correctly extracted and the image is fully recovered. We also created a multi-regular block complexity formula to determine the secret bits hidden in a block and recover the original block. In addition, we extended the design of four methods to cover various segmentation strategies and complexity calculation methods. According to the experimental results, our method can successfully extract the secret message and recover the original image intact after the encrypted image is embedded with the secret message. Generally, in using different image size, we averagely achieve the PSNR and embedding capacity of 39 experimental images at 40.633 dB and 46,298.46 bits, respectively.

加密图像中的可逆数据隐藏(RDHEI)引起了越来越多的关注,因为 RDHEI 可同时用于信息保护和图像加密。许多基于 RDHEI 的研究都提出了使用最重要位(MSB)反转来嵌入机密信息,但在提取隐藏信息时可能会出现错误。本文改进了基于 MSB 反转的方法,提出了一种新的 RDHEI 技术。我们的方法隐藏了块在图像中的位置,这将导致原始图像的误读,然后对图像进行加密。采用 MSB 反转策略在加密图像中嵌入秘密信息。由于错误块的位置信息预先隐藏在图像中,因此该信息可确保正确提取密文并完全恢复图像。我们还创建了一个多规则块复杂度公式,用于确定隐藏在块中的秘密比特并恢复原始块。此外,我们还扩展了四种方法的设计,以涵盖各种分割策略和复杂度计算方法。根据实验结果,我们的方法可以成功提取密文,并在加密图像嵌入密文后完整地恢复原始图像。一般来说,在使用不同大小的图像时,我们平均实现了 39 幅实验图像的 PSNR 和嵌入容量分别为 40.633 dB 和 46,298.46 bits。
{"title":"Efficient reversible data hiding in encrypted images using Block Complexity and most significant bit inversion strategy","authors":"Cheng-Hsing Yang, Chi-Yao Weng, Chia-Ling Hung, Shiuh-Jeng WANG","doi":"10.1007/s11042-024-20106-0","DOIUrl":"https://doi.org/10.1007/s11042-024-20106-0","url":null,"abstract":"<p>Reversible data hiding in the encrypted images (RDHEI) has attracted more attention because RDHEI can be used for both information protection and image encryption. Many researches based on RDHEI have been proposed by using the Most Significant Bit (MSB) inversion to embed confidential information, but they might subject to errors when extracting the hidden information. This paper improves the approach based on MSB inversion and proposes a new RDHEI technique. Our approach hides the block’s position of the block in the image, which would cause misinterpretation in the original image, and then encrypts the image. The MSB inversion strategy is applied to embed the secret messages in the encrypted image. Since the location information of the error block is pre-hidden in the image, this information ensures that the secret message is correctly extracted and the image is fully recovered. We also created a multi-regular block complexity formula to determine the secret bits hidden in a block and recover the original block. In addition, we extended the design of four methods to cover various segmentation strategies and complexity calculation methods. According to the experimental results, our method can successfully extract the secret message and recover the original image intact after the encrypted image is embedded with the secret message. Generally, in using different image size, we averagely achieve the PSNR and embedding capacity of 39 experimental images at 40.633 dB and 46,298.46 bits, respectively.</p>","PeriodicalId":18770,"journal":{"name":"Multimedia Tools and Applications","volume":"7 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noisy image segmentation utilizing entropy-adaptive fractional differential-driven active contours 利用熵自适应分数微分驱动主动轮廓进行噪声图像分割
IF 3.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1007/s11042-024-20058-5
Shang Zhuge, Zhiheng Zhou, Wenlue Zhou, Jiangfeng Wu, Ming Deng, Ming Dai

The central challenge in noisy image segmentation is how to effectively suppress or remove noise while preserving important features, thereby achieving accurate image segmentation. Active contour models are widely utilized in these tasks. Nevertheless, they are unable to remove high noise while segmenting images with weak edges. In order to mitigate the adverse effects of non-uniformity while preserving the details of the image on image segmentation, a novel approach is introduced: the adaptive fractional differential active contour image segmentation method. This method aims to address the aforementioned problem. Our methods adaptively define the fractional order using the proposed entropy, which enhances the edge extraction ability of image entropy in the presence of image intensity inhomogeneity and noise, different orders are applied to different pixels. The introduced entropy demonstrates resilience against significant noise, thereby enhancing the model’s capacity to accurately and seamlessly delineate boundaries. Empirical evaluations conducted on various test images substantiate the model’s efficacy in addressing intensity inhomogeneity and achieving exceptional segmentation accuracy.

噪声图像分割的核心挑战是如何在保留重要特征的同时有效抑制或去除噪声,从而实现准确的图像分割。主动轮廓模型在这些任务中得到了广泛应用。然而,在分割边缘较弱的图像时,它们无法去除高噪声。为了在保留图像细节的同时减轻非均匀性对图像分割的不利影响,我们引入了一种新方法:自适应分数微分主动轮廓图像分割方法。该方法旨在解决上述问题。我们的方法利用所提出的熵自适应地定义分数阶数,从而增强了图像熵在存在图像强度不均匀性和噪声时的边缘提取能力,不同的阶数适用于不同的像素。引入的熵能抵御明显的噪声,从而增强了模型准确、无缝地划分边界的能力。在各种测试图像上进行的实证评估证实了该模型在解决强度不均匀性和实现卓越的分割准确性方面的功效。
{"title":"Noisy image segmentation utilizing entropy-adaptive fractional differential-driven active contours","authors":"Shang Zhuge, Zhiheng Zhou, Wenlue Zhou, Jiangfeng Wu, Ming Deng, Ming Dai","doi":"10.1007/s11042-024-20058-5","DOIUrl":"https://doi.org/10.1007/s11042-024-20058-5","url":null,"abstract":"<p>The central challenge in noisy image segmentation is how to effectively suppress or remove noise while preserving important features, thereby achieving accurate image segmentation. Active contour models are widely utilized in these tasks. Nevertheless, they are unable to remove high noise while segmenting images with weak edges. In order to mitigate the adverse effects of non-uniformity while preserving the details of the image on image segmentation, a novel approach is introduced: the adaptive fractional differential active contour image segmentation method. This method aims to address the aforementioned problem. Our methods adaptively define the fractional order using the proposed entropy, which enhances the edge extraction ability of image entropy in the presence of image intensity inhomogeneity and noise, different orders are applied to different pixels. The introduced entropy demonstrates resilience against significant noise, thereby enhancing the model’s capacity to accurately and seamlessly delineate boundaries. Empirical evaluations conducted on various test images substantiate the model’s efficacy in addressing intensity inhomogeneity and achieving exceptional segmentation accuracy.</p>","PeriodicalId":18770,"journal":{"name":"Multimedia Tools and Applications","volume":"16 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An undecimated wavelet based adaptive fusion filtering for ultrasound despeckling 基于未估计小波的超声波去斑自适应融合滤波技术
IF 3.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1007/s11042-024-20065-6
Nirmaladevi P, Asokan Ramasamy

An efficient fusion based speckle denoising algorithm is proposed in this paper to improve the edge and detail preservation of US images. This is accomplished by integrating complementary information from two wavelet despeckled source images. The two source images are such that one denoise the coefficients greater than threshold for improving the noise removal performance and another denoise the coefficients below threshold to preserve the fine details. For fusion, a two stage fusion algorithm utilizing a novel fusion rule exploiting the inter and intra scale dependency of the wavelet coefficients is proposed. The first stage performs an interscale activity based fusion and the second stage accomplishes an intra scale dependency based fusion for fusing the detail subbands of the two images. The approximation coefficients are fused with a maximum rule. The resulting fused image give an outstanding performance compared with existing wavelet based approaches and other fusion techniques in terms of Peak-Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Structural Similarity Index Measure (SSSIM), Equivalent Number Of Looks (ENL) And Edge Preservation Index (EPI).

本文提出了一种高效的基于融合的斑点去噪算法,以改善 US 图像的边缘和细节保存。这是通过整合两幅小波去斑源图像的互补信息来实现的。两幅源图像中,一幅图像对高于阈值的系数进行去噪,以提高去噪性能,另一幅图像对低于阈值的系数进行去噪,以保留精细细节。在融合方面,提出了一种两阶段融合算法,利用小波系数的尺度间和尺度内依赖性的新颖融合规则。第一阶段执行基于尺度间活动的融合,第二阶段完成基于尺度内依赖性的融合,以融合两幅图像的细节子带。近似系数采用最大值规则进行融合。在峰值信噪比 (PSNR)、均方误差 (MSE)、结构相似性指数 (SSSIM)、等效外观数 (ENL) 和边缘保留指数 (EPI) 等方面,与现有的基于小波的方法和其他融合技术相比,融合后的图像具有出色的性能。
{"title":"An undecimated wavelet based adaptive fusion filtering for ultrasound despeckling","authors":"Nirmaladevi P, Asokan Ramasamy","doi":"10.1007/s11042-024-20065-6","DOIUrl":"https://doi.org/10.1007/s11042-024-20065-6","url":null,"abstract":"<p>An efficient fusion based speckle denoising algorithm is proposed in this paper to improve the edge and detail preservation of US images. This is accomplished by integrating complementary information from two wavelet despeckled source images. The two source images are such that one denoise the coefficients greater than threshold for improving the noise removal performance and another denoise the coefficients below threshold to preserve the fine details. For fusion, a two stage fusion algorithm utilizing a novel fusion rule exploiting the inter and intra scale dependency of the wavelet coefficients is proposed. The first stage performs an interscale activity based fusion and the second stage accomplishes an intra scale dependency based fusion for fusing the detail subbands of the two images. The approximation coefficients are fused with a maximum rule. The resulting fused image give an outstanding performance compared with existing wavelet based approaches and other fusion techniques in terms of Peak-Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Structural Similarity Index Measure (SSSIM), Equivalent Number Of Looks (ENL) And Edge Preservation Index (EPI).</p>","PeriodicalId":18770,"journal":{"name":"Multimedia Tools and Applications","volume":"13 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based color medical image cryptosystem for industrial Internet of Healthcare Things (IoHT) 基于区块链的工业医疗保健物联网(IoHT)彩色医疗图像加密系统
IF 3.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1007/s11042-023-16777-w
Fatma Khallaf, Walid El-Shafai, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie

In recent years, the proliferation of smart devices and associated technologies, such as the Internet of Things (IoT), Industrial Internet of Things (IIoT), and Internet of Medical Things (IoMT), has witnessed a substantial growth. However, the limited processing power and storage capacity of smart devices make them vulnerable to cyberattacks, rendering traditional security and cryptography techniques inadequate. To address these challenges, blockchain (BC) technology has emerged as a promising solution. This study introduces an efficient framework for the Internet of Healthcare Things (IoHT), presenting a novel cryptosystem for color medical images using BC technology in conjunction with the IoT, Secure Hash Algorithm 256-bit (SHA256), shuffling, and bitwise XOR operations. The encryption scheme is specifically designed for an IIoT grid network computing system, relying on diffusion and confusion principles. In this paper, the proposed cryptosystem strength is evaluated against differential attacks with several comprehensive metrics. Simulation results and theoretical analysis demonstrate the cryptosystem effectiveness, showcasing its ability to provide high levels of security and immunity to data leakage. The proposed cryptosystem offers a versatile range of technical solutions and strategies that are adaptable to various scenarios. The evaluation metrics, with approximate values of 99.61% for Number of Pixels Change Rate (NPCR), 33.46% for Unified Average Changed Intensity (UACI), and 8 for information entropy, closely align with the desired ideal outcomes. Consequently, this paper contributes to the advancement of secure and private systems for medical image encryption based on BC technology, potentially mitigating the risks associated with cyberattacks on smart medical devices.

近年来,智能设备和相关技术,如物联网 (IoT)、工业物联网 (IIoT) 和医疗物联网 (IoMT) 等,出现了大幅增长。然而,智能设备有限的处理能力和存储容量使其容易受到网络攻击,从而使传统的安全和加密技术变得不足。为应对这些挑战,区块链(BC)技术已成为一种前景广阔的解决方案。本研究为医疗保健物联网(IoHT)引入了一个高效的框架,利用区块链技术结合物联网、256 位安全散列算法(SHA256)、洗牌和比特 XOR 运算,为彩色医疗图像提供了一个新颖的加密系统。该加密方案是专为物联网网格网络计算系统设计的,依赖于扩散和混淆原理。本文通过多个综合指标评估了所提出的加密系统在应对差分攻击时的强度。仿真结果和理论分析证明了该密码系统的有效性,展示了其提供高水平安全性和抗数据泄漏能力的能力。所提出的密码系统提供了多种技术解决方案和策略,可适应各种情况。评估指标中,像素变化率(NPCR)的近似值为 99.61%,统一平均变化强度(UACI)的近似值为 33.46%,信息熵的近似值为 8,与预期的理想结果非常接近。因此,本文有助于推进基于 BC 技术的医疗图像加密安全保密系统,从而降低智能医疗设备受到网络攻击的潜在风险。
{"title":"Blockchain-based color medical image cryptosystem for industrial Internet of Healthcare Things (IoHT)","authors":"Fatma Khallaf, Walid El-Shafai, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie","doi":"10.1007/s11042-023-16777-w","DOIUrl":"https://doi.org/10.1007/s11042-023-16777-w","url":null,"abstract":"<p>In recent years, the proliferation of smart devices and associated technologies, such as the Internet of Things (IoT), Industrial Internet of Things (IIoT), and Internet of Medical Things (IoMT), has witnessed a substantial growth. However, the limited processing power and storage capacity of smart devices make them vulnerable to cyberattacks, rendering traditional security and cryptography techniques inadequate. To address these challenges, blockchain (BC) technology has emerged as a promising solution. This study introduces an efficient framework for the Internet of Healthcare Things (IoHT), presenting a novel cryptosystem for color medical images using BC technology in conjunction with the IoT, Secure Hash Algorithm 256-bit (SHA256), shuffling, and bitwise XOR operations. The encryption scheme is specifically designed for an IIoT grid network computing system, relying on diffusion and confusion principles. In this paper, the proposed cryptosystem strength is evaluated against differential attacks with several comprehensive metrics. Simulation results and theoretical analysis demonstrate the cryptosystem effectiveness, showcasing its ability to provide high levels of security and immunity to data leakage. The proposed cryptosystem offers a versatile range of technical solutions and strategies that are adaptable to various scenarios. The evaluation metrics, with approximate values of 99.61% for Number of Pixels Change Rate (NPCR), 33.46% for Unified Average Changed Intensity (UACI), and 8 for information entropy, closely align with the desired ideal outcomes. Consequently, this paper contributes to the advancement of secure and private systems for medical image encryption based on BC technology, potentially mitigating the risks associated with cyberattacks on smart medical devices.</p>","PeriodicalId":18770,"journal":{"name":"Multimedia Tools and Applications","volume":"47 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based privacy preservation framework for preventing cyberattacks in smart healthcare big data management systems 基于区块链的隐私保护框架,用于防止智能医疗大数据管理系统中的网络攻击
IF 3.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1007/s11042-024-20109-x
Shankar M. Patil, Bhawana S. Dakhare, Shilpa M. Satre, Shivaji D. Pawar

Blockchain, a distributed ledger technology utilizing cryptographic methods, offers promising solutions for enhancing security and privacy in smart healthcare big data (HBD) management systems. However, scalability remains a significant challenge, as the decentralized nature of blockchain networks often leads to performance bottlenecks and increased transaction costs, especially when managing large volumes of healthcare data. This framework presents a Blockchain-Based Privacy Preservation Framework (PPF) designed to mitigate cyber threats in smart HBD management systems. The framework integrates blockchain technology with privacy-preserving mechanisms, including singular public key cryptography for off-chain data encryption and a private data storage system built on linked ring signatures based on elliptic curve cryptography without certificates. To protect the ecosystem from cyber-attacks targeting data storage facilities and service providers, secure multiparty computation is employed. The proposed solution is evaluated using Python for analysis. Results show an average delay of 27 s for a 2ms block time and 53 s for a 250ms block time. For a file size of 45 MB, the response time is notably low at 9.5 s. The findings demonstrate the framework’s viability, employing Hyper ledger smart contracts to achieve the required level of security while improving system efficiency compared to existing solutions.

区块链是一种利用加密方法的分布式账本技术,它为提高智能医疗保健大数据(HBD)管理系统的安全性和隐私性提供了前景广阔的解决方案。然而,可扩展性仍然是一个重大挑战,因为区块链网络的去中心化特性往往会导致性能瓶颈和交易成本的增加,尤其是在管理大量医疗保健数据时。本框架提出了一个基于区块链的隐私保护框架(PPF),旨在减轻智能 HBD 管理系统中的网络威胁。该框架将区块链技术与隐私保护机制整合在一起,包括用于链外数据加密的奇异公钥加密技术,以及基于无证书椭圆曲线加密技术的链接环签名构建的私有数据存储系统。为保护生态系统免受针对数据存储设施和服务提供商的网络攻击,采用了安全的多方计算。我们使用 Python 对提出的解决方案进行了分析评估。结果显示,2 毫秒分块时间的平均延迟为 27 秒,250 毫秒分块时间的平均延迟为 53 秒。这些结果证明了该框架的可行性,它采用超级账本智能合约实现了所需的安全级别,同时与现有解决方案相比提高了系统效率。
{"title":"Blockchain-based privacy preservation framework for preventing cyberattacks in smart healthcare big data management systems","authors":"Shankar M. Patil, Bhawana S. Dakhare, Shilpa M. Satre, Shivaji D. Pawar","doi":"10.1007/s11042-024-20109-x","DOIUrl":"https://doi.org/10.1007/s11042-024-20109-x","url":null,"abstract":"<p>Blockchain, a distributed ledger technology utilizing cryptographic methods, offers promising solutions for enhancing security and privacy in smart healthcare big data (HBD) management systems. However, scalability remains a significant challenge, as the decentralized nature of blockchain networks often leads to performance bottlenecks and increased transaction costs, especially when managing large volumes of healthcare data. This framework presents a Blockchain-Based Privacy Preservation Framework (PPF) designed to mitigate cyber threats in smart HBD management systems. The framework integrates blockchain technology with privacy-preserving mechanisms, including singular public key cryptography for off-chain data encryption and a private data storage system built on linked ring signatures based on elliptic curve cryptography without certificates. To protect the ecosystem from cyber-attacks targeting data storage facilities and service providers, secure multiparty computation is employed. The proposed solution is evaluated using Python for analysis. Results show an average delay of 27 s for a 2ms block time and 53 s for a 250ms block time. For a file size of 45 MB, the response time is notably low at 9.5 s. The findings demonstrate the framework’s viability, employing Hyper ledger smart contracts to achieve the required level of security while improving system efficiency compared to existing solutions.</p>","PeriodicalId":18770,"journal":{"name":"Multimedia Tools and Applications","volume":"4 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Melanoma skin cancer detection based on deep learning methods and binary Harris Hawk optimization 基于深度学习方法和二元哈里斯-霍克优化的黑色素瘤皮肤癌检测
IF 3.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1007/s11042-024-19864-8
Noorah Jaber Faisal Jaber, Ayhan Akbas

The issue of skin cancer has garnered significant attention from the scientific community worldwide, with melanoma being the most lethal and uncommon form of the disease. Melanoma occurs due to the uncontrolled growth of melanocyte cells, which are responsible for imparting color to the skin. If left untreated, melanoma can spread throughout the body and cause death. Early detection of melanoma can lower its mortality rate. In this study, we propose a robust Convolutional Neural Network (CNN)-based method for classifying melanoma images as healthy or non-healthy. To train and test the model, we utilized public datasets from International Skin Imaging Collaboration (ISIC). Additionally, we compared our method with other classification techniques, including Support Vector Machine (SVM), Decision Tree, and K-Nearest Neighbors (K-NN), using the Harris Hawks Optimization algorithm. The results of our method showed superior performance compared to the other approaches.

皮肤癌问题已引起全世界科学界的高度关注,其中黑色素瘤是最致命和最不常见的一种疾病。黑色素瘤是由于黑色素细胞不受控制地生长而引起的,黑色素细胞负责赋予皮肤颜色。如果不及时治疗,黑色素瘤会扩散到全身并导致死亡。及早发现黑色素瘤可以降低死亡率。在本研究中,我们提出了一种基于卷积神经网络(CNN)的鲁棒性方法,用于将黑色素瘤图像分类为健康或非健康图像。为了训练和测试该模型,我们使用了国际皮肤成像协作组织(ISIC)的公共数据集。此外,我们还利用哈里斯鹰优化算法将我们的方法与其他分类技术进行了比较,包括支持向量机(SVM)、决策树和 K-近邻(K-NN)。结果表明,与其他方法相比,我们的方法性能更优。
{"title":"Melanoma skin cancer detection based on deep learning methods and binary Harris Hawk optimization","authors":"Noorah Jaber Faisal Jaber, Ayhan Akbas","doi":"10.1007/s11042-024-19864-8","DOIUrl":"https://doi.org/10.1007/s11042-024-19864-8","url":null,"abstract":"<p>The issue of skin cancer has garnered significant attention from the scientific community worldwide, with melanoma being the most lethal and uncommon form of the disease. Melanoma occurs due to the uncontrolled growth of melanocyte cells, which are responsible for imparting color to the skin. If left untreated, melanoma can spread throughout the body and cause death. Early detection of melanoma can lower its mortality rate. In this study, we propose a robust Convolutional Neural Network (CNN)-based method for classifying melanoma images as healthy or non-healthy. To train and test the model, we utilized public datasets from International Skin Imaging Collaboration (ISIC). Additionally, we compared our method with other classification techniques, including Support Vector Machine (SVM), Decision Tree, and K-Nearest Neighbors (K-NN), using the Harris Hawks Optimization algorithm. The results of our method showed superior performance compared to the other approaches.</p>","PeriodicalId":18770,"journal":{"name":"Multimedia Tools and Applications","volume":"93 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Multimedia Tools and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1