Document shadow is a common issue that arise when capturing documents us...
Shadows often occur when we capture the documents with casual equipment,...
Vignetting commonly occurs as a degradation in images resulting from fac...
Emotion recognition in conversation (ERC) has received increasing attent...
The presence of shadows significantly impacts the visual quality of scan...
Reversible adversarial examples (RAE) combine adversarial attacks and
re...
Foreground segmentation is a fundamental problem in computer vision, whi...
Effective connectivity can describe the causal patterns among brain regi...
Few-shot segmentation (FSS) aims to segment unseen classes given only a ...
Hashing is very popular for remote sensing image search. This article
pr...
We consider the generic problem of detecting low-level structures in ima...
Image inpainting aims to fill the missing hole of the input. It is hard ...
Brain network analysis is essential for diagnosing and intervention for
...
A new local watermarking method based on histogram shifting has been pro...
Film, a classic image style, is culturally significant to the whole
phot...
Image enhancement is a technique that frequently utilized in digital ima...
Shadow removal improves the visual quality and legibility of digital cop...
Cross-modal hashing is a successful method to solve large-scale multimed...
Arbitrary style transfer generates an artistic image which combines the
...
Image harmonization task aims at harmonizing different composite foregro...
Color constancy aims to restore the constant colors of a scene under
dif...
Reversible data hiding in encrypted image (RDHEI) becomes a hot topic, a...
Image harmonization aims to modify the color of the composited region wi...
Kinship verification from facial images has been recognized as an emergi...
Kinship verification is a long-standing research challenge in computer
v...
To date, the privacy-protection intended pixelation tasks are still
labo...
A larger portion of fake news quotes untampered images from other source...
With the prevailing of live video streaming, establishing an online
pixe...
Digital watermark is a commonly used technique to protect the copyright ...
Recently, many detection methods based on convolutional neural networks
...
Defocus Blur Detection(DBD) aims to separate in-focus and out-of-focus
r...
We focus our attention on the problem of generating adversarial perturba...
This paper introduces an algorithm to protect the privacy of individuals...
Face pixelation in TV shows or videos is manually realized and not well
...
Deep Neural Networks have achieved remarkable success in computer vision...
Deep Neural Networks have achieved remarkable success in computer vision...
Deep Neural Models are vulnerable to adversarial perturbations in
classi...
Researches in novel viewpoint synthesis majorly focus on interpolation f...