For covert communication in lossy channels, it is necessary to consider that the carrier of the hidden watermark will undergo multiple image-processing attacks. In order to ensure that secret information can be extracted without distortion from the watermarked images that have undergone attacks, in this paper, we design a novel fragmented secure communication system. The sender will fragment the secret data to be transmitted and redundantly hide it in a large number of multimodal carriers of messenger accounts on multiple social platforms.
View Article and Find Full Text PDFIEEE Trans Image Process
January 2024
Single image dehazing is a challenging ill-posed problem which estimates latent haze-free images from observed hazy images. Some existing deep learning based methods are devoted to improving the model performance via increasing the depth or width of convolution. The learning ability of Convolutional Neural Network (CNN) structure is still under-explored.
View Article and Find Full Text PDFPortable document format (PDF) files are widely used in file transmission, exchange, and circulation because of their platform independence, small size, good browsing quality, and the ability to place hyperlinks. However, their security issues are also more thorny. It is common to distribute printed PDF files to different groups and individuals after printing.
View Article and Find Full Text PDFIn order to more effectively monitor and interfere with enemy signals, it is particularly important to accurately and efficiently identify the intercepted signals and estimate their parameters in the increasingly complex electromagnetic environment. Therefore, in non-cooperative situations, it is of great practical significance to study how to accurately detect direct sequence spread spectrum (DSSS) signals in real time and estimate their parameters. The traditional time-delay correlation algorithm encounters the challenges such as peak energy leakage and false peak interference.
View Article and Find Full Text PDFWith the wide application of direct sequence spread spectrum (DSSS) signals, the comprehensive performance of DSSS communication systems has been continuously improved, making the electronic reconnaissance link in communication countermeasures more difficult. Electronic reconnaissance technology, as the fundamental means of modern electronic warfare, mainly includes signal detection, recognition, and parameter estimation. At present, research on DSSS detection algorithms is mostly based on the correlation characteristics of DSSS signals, and autocorrelation algorithm is the most mature and widely used method in practical engineering.
View Article and Find Full Text PDFThe purpose of image dehazing is to remove the interference from weather factors in degraded images and enhance the clarity and color saturation of images to maximize the restoration of useful features. Single image dehazing is one of the most important tasks in the field of image restoration. In recent years, due to the progress of deep learning, single image dehazing has made great progress.
View Article and Find Full Text PDFAt many construction sites, whether to wear a helmet is directly related to the safety of the workers. Therefore, the detection of helmet use has become a crucial monitoring tool for construction safety. However, most of the current helmet wearing detection algorithms are only dedicated to distinguishing pedestrians who wear helmets from those who do not.
View Article and Find Full Text PDFSensors (Basel)
September 2022
Inventory is the basis of business activities; inventory management helps industries keep their inventories stocked with reasonable quantities, which ensures consumers demand while minimizing storage costs. The traditional manual inventory management has low efficiency and a high labor cost. In this paper, we used improved YOLOv3 to detect the cups stored on the warehouse shelves and counted their numbers to realize automated inventory management.
View Article and Find Full Text PDFEsophageal cancer is an exceedingly aggressive and malignant cancer that imposes a substantial burden on patients and their families. It is usually treated with surgery, chemotherapy, radiotherapy, and molecular-targeted therapy. Immunotherapy is a novel treatment modality for esophageal cancer wherein genetically engineered adoptive cell therapy is utilized, which modifies immune cells to attack cancer cells.
View Article and Find Full Text PDFChimeric antigen receptor T (CAR-T) cell therapy has exhibited a substantial clinical response in hematological malignancies, including B-cell leukemia, lymphoma, and multiple myeloma. Therefore, the feasibility of using CAR-T cells to treat solid tumors is actively evaluated. Currently, multiple basic research projects and clinical trials are being conducted to treat lung cancer with CAR-T cell therapy.
View Article and Find Full Text PDFThis paper develops a drone control prototype based on web technology with the aid of hand gesture. The uplink control command and downlink data (e.g.
View Article and Find Full Text PDFControllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison.
View Article and Find Full Text PDFAim: p16 Methylation frequently occurs in carcinogenesis. While it has been hypothesized that the p16 methylation states are dynamically maintained in cancer cells, direct evidence supporting this hypothesis has not been available until now.
Methods: A fusion cell model was established which reprogrammed the native DNA methylation pattern of the cells.
IEEE Trans Image Process
December 2013
Video shot boundary detection (SBD) is the first and essential step for content-based video management and structural analysis. Great efforts have been paid to develop SBD algorithms for years. However, the high computational cost in the SBD becomes a block for further applications such as video indexing, browsing, retrieval, and representation.
View Article and Find Full Text PDFBackground: The exact relationship between nucleosome positioning and methylation of CpG islands in human pathogenesis is unknown.
Methodology/principal Findings: In the present study, we characterized the nucleosome position within the p16 CpG island and established a seeding methylation-specific PCR (sMSP) assay based on bisulfite modification to enrich the p16 alleles containing methylated-CpG at the methylation "seeding" sites within its intron-1 in gastric carcinogenesis. The sMSP-positive rate in primary gastric carcinoma (GC) samples (36/40) was significantly higher than that observed in gastritis (19/45) or normal samples (7/13) (P<0.
World J Gastroenterol
March 2010
Aim: To understand the implication of GATA-4 and GATA-5 methylation in gastric carcinogenesis.
Methods: Methylation status of GATA-4 and GATA-5 CpG islands in human gastric mucosa samples, including normal gastric biopsies from 45 outpatients, gastric dysplasia [low-grade gastric intraepithelial neoplasia (GIN), n = 30; indefinite, n = 77], and 80 paired sporadic gastric carcinomas (SGC) as well as the adjacent non-neoplastic gastric tissues was analyzed by methylation specific polymerase chain reaction (MSP) and confirmed by denatured high performance liquid chromatography (DHPLC). Immunohistochemical staining was used to detect protein expression.
IEEE Trans Image Process
December 2009
In this paper, a new and fast encoding algorithm for vector quantization is presented. This algorithm makes full use of two characteristics of a vector: the sum and the variance. A vector is separated into two subvectors: one is composed of the first half of vector components and the other consists of the remaining vector components.
View Article and Find Full Text PDFIEEE Trans Image Process
June 2005
The rapid growth of digital multimedia and Internet technologies has made copyright protection, copy protection, and integrity verification three important issues in the digital world. To solve these problems, the digital watermarking technique has been presented and widely researched. Traditional watermarking algorithms are mostly based on discrete transform domains, such as the discrete cosine transform, discrete Fourier transform (DFT), and discrete wavelet transform (DWT).
View Article and Find Full Text PDFBeijing Da Xue Xue Bao Yi Xue Ban
August 2004
Objective: To investigate the association between the single nucleotide polymorphisms (SNPs) of interferon regulatory factor 3 (IRF-3) gene and the susceptibility of esophageal cancer in Anyang area, Henan Province.
Methods: The genomic DNAs of 152 esophageal cancer patients and 191 health controls were extracted from the peripheral blood leukocytes. Three fragments covering codons 96, 194, 377, and 427 of the IRF-3 gene were amplified by polymerase chain reaction (PCR).
Zhonghua Yi Xue Za Zhi
November 2003
Objective: To investigate the relationship between human papillomavirus (HPV) infection and the development of upper digestive tract carcinomas.
Methods: In situ hybridization (ISH) technique was used to detect the expression of HPV16 E6 mRNA in 40 specimens of esophageal squamous cell carcinoma, 74 specimens of gastric cardiac adenocarcinoma, 40 specimens of adenocarcinoma of gastric corpus, 62 specimens of adenocarcinoma of gastric antrum, all resected during operation, and 58 specimens of normal tissues of gastric mucosa, obtained by endoscopy.
Results: The positive rate of HPV16 E6 mRNA was 70% (28/40) in esophageal squamous cell carcinomas, 67.
Aim: To investigate the putative role of human papillomavirus (HPV) infection in the carcinogenesis of esophageal squamous cell carcinoma in China.
Methods: Twenty-three esophageal squamous cell carcinoma samples and the distal normal epithelium from Shanxi Province, and 25 more esophageal squamous cell carcinoma samples from Anyang city, two areas with a high incidence of esophageal cancer in China, were detected for the existence of HPV-16 DNA by PCR, mRNA in situ hybridization (ISH) and immunohistochemistry (IHC) targeting HPV-16 E6 gene.
Results: There were approximately 64 % (31/48) patients having HPV-16 DNA in tumor samples, among them nearly two-thirds (19/31) samples were detected with mRNA expression of HPV-16 E6.
Background: Human papillomavirus (HPV) plays an important role in the development of carcinomas at various body sites. It was found previously that the p53 codon 72 polymorphism (C/G) is a high-risk factor for the development HPV-associated cervical carcinoma. However, it still was considered controversial in several studies of cervical and esophageal carcinoma.
View Article and Find Full Text PDF