2013
DOI: 10.3788/ope.20132102.0531
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive segmentation for visual salient object

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…In the watermarking extraction step, the inverse transformation of DCT-SVD is used to extract the watermarking from the pending detection image, which is the saliency map of the original image. After that the local energy model [16] is also applied to get the saliency map of the watermarked image. Then the two saliency maps are substracted to get the offset image.…”
Section: Motivations and Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the watermarking extraction step, the inverse transformation of DCT-SVD is used to extract the watermarking from the pending detection image, which is the saliency map of the original image. After that the local energy model [16] is also applied to get the saliency map of the watermarked image. Then the two saliency maps are substracted to get the offset image.…”
Section: Motivations and Contributionsmentioning
confidence: 99%
“…Entropy 2015, 17,[1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19] 3 are necessary in this study: pixel value and pixel location distributions. Therefore, the image tampering detection algorithm is divided into two workflows: pixel value and pixel location.…”
Section: Motivations and Contributionsmentioning
confidence: 99%
“…In this paper, the maximum entropy algorithm [16] is adopted to extract the saliency region from the image. Unlike the original Itti model, the currently proposed model adds local energy features.…”
Section: Introductionmentioning
confidence: 99%
“…12a (with optical filter installed). After implementing the algorithms, such as the graying algorithm and expansion corrosion algorithm [31,32], the processed image as shown in Fig. 12b.…”
Section: Image Recognition Of the Water Jetmentioning
confidence: 99%