Skip to main content

Energy Compaction-Based Image Compression Using Convolutional AutoEncoder

Image compression has been an important research topic for many decades. Recently, deep learning has achieved great success in many computer vision tasks, and its use in image compression has gradually been increasing. In this paper, we present an energy compaction-based image compression architecture using a convolutional autoencoder (CAE) to achieve high coding efficiency. 

Content-Based Light Field Image Compression Method With Gaussian Process Regression

Light field (LF) imaging enables new possibilities for digital imaging, such as digital refocusing, changing of focus plane, changing of viewpoint, scene-depth estimation, and 3D scene reconstruction, by capturing both spatial and angular information of light rays. However, one main problem in dealing with LF data is its sheer volume.

Fast Depth and Inter Mode Prediction for Quality Scalable High Efficiency Video Coding

The scalable high efficiency video coding (SHVC) is an extension of high efficiency video coding (HEVC). It introduces multiple layers and inter-layer prediction, thus significantly increases the coding complexity on top of the already complicated HEVC encoder. In inter prediction for quality SHVC, in order to determine the best possible mode at each depth level, a coding tree unit can be recursively split into four depth levels.

Geometry Coding for Dynamic Voxelized Point Clouds Using Octrees and Multiple Contexts

We present a method to compress geometry information of point clouds that explores redundancies across consecutive frames of a sequence. It uses octrees and works by progressively increasing the resolution of the octree. At each branch of the tree, we generate an approximation of the child nodes by a number of methods which are used as contexts to drive an arithmetic coder.

Weaklier Supervised Semantic Segmentation With Only One Image Level Annotation per Category

Image semantic segmentation tasks and methods based on weakly supervised conditions have been proposed and achieve better and better performance in recent years. However, the purpose of these tasks is mainly to simplify the labeling work. In this paper, we establish a new and more challenging task condition.

Jointly Using Low-Rank and Sparsity Priors for Sparse Inverse Synthetic Aperture Radar Imaging

The inverse synthetic aperture radar (ISAR) imaging technique of a moving target with sparse sampling data has attracted wide attention due to its ability to reduce the data collection burden. However, traditional low-rank or 2D compressive sensing (CS)-based ISAR imaging methods can handle the random sampling or the separable sampling data only. 

Beamforming for Cooperative Secure Transmission in Cognitive Two-Way Relay Networks

In this paper, we investigate beamforming design for cooperative secure transmission in cognitive two-way relay networks, where the cognitive transmitter (CT) with multiple antennas helps to forward the signals of two primary transmitters (PTs) and tries to protect the PTs from wiretapping by a single-antenna eavesdropper. 

Decentralized Detection With Robust Information Privacy Protection

We consider a decentralized detection network whose aim is to infer a public hypothesis of interest. However, the raw sensor observations also allow the fusion center to infer private hypotheses that we wish to protect. We consider the case where there are an uncountable number of private hypotheses belonging to an uncertainty set, and develop local privacy mappings at every sensor so that the sanitized sensor information minimizes the Bayes error of detecting the public hypothesis at the fusion center while achieving information privacy for all private hypotheses. 

Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel

In this paper, an agile smart attacker model in spectrum sensing of cognitive radio network (CRN) is introduced. This smart attacker does not make the channel busy all the time, instead it senses spectrum and when a primary user leaves, it occupies the spectrum by mimicking the signal characteristics of the primary users.