On the processing architecture in wireless video sensor networks: node and network level performance evaluation Mehdi Hadadian Nejad YousefiYousef S. KavianAlimorad Mahmoudi OriginalPaper 11 May 2019 Pages: 24789 - 24807
A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2 Amnah FirdousAqeel ur RehmanMalik M. Saad Missen OriginalPaper 11 May 2019 Pages: 24809 - 24835
Lossless progressive secret sharing for grayscale and color images Heri PrasetyoChih-Hsien Hsia OriginalPaper 11 May 2019 Pages: 24837 - 24862
An efficient preprocessing method for supervised sentiment analysis by converting sentences to numerical vectors: a twitter case study Mohammad Karim SohrabiFatemeh Hemmatian OriginalPaper 11 May 2019 Pages: 24863 - 24882
Weighted fusion joint bayesian metric with patch-based facial region-specific features for face identification Jae Young Choi OriginalPaper 14 May 2019 Pages: 24883 - 24902
A robust reversible data hiding scheme for color image using reed-solomon code Ananya BanerjeeBiswapati Jana OriginalPaper 15 May 2019 Pages: 24903 - 24922
Human action recognition using bag of global and local Zernike moment features Saleh AlyAsmaa Sayed OriginalPaper 15 May 2019 Pages: 24923 - 24953
Rich-information reversible watermarking scheme of vector maps Yinguo QiuHongtao DuanHehe Gu OriginalPaper 16 May 2019 Pages: 24955 - 24977
An image cryptosystem based on pseudorandomly enhanced chaotic DNA and random permutation Joshua C. DagaduJian-Ping LiPrince C. Addo OriginalPaper 16 May 2019 Pages: 24979 - 25000
An efficient image-based verification scheme by fusion of double random phase encoding and dynamic chaotic map Samaneh GholamiKeyvan JaferzadehInkyu Moon OriginalPaper 17 May 2019 Pages: 25001 - 25018
DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data Prabir Kumar NaskarSoumya PaulAtal Chaudhuri OriginalPaper 17 May 2019 Pages: 25019 - 25042
Recognition of Tamil handwritten character using modified neural network with aid of elephant herding optimization S. KowsalyaP. S. Periasamy OriginalPaper 19 May 2019 Pages: 25043 - 25061
Action recognition using weighted fusion of depth images and skeleton’s key frames Yan XuZhenjie HouYi Song OriginalPaper 20 May 2019 Pages: 25063 - 25078
Secure binary image steganography based on LTP distortion minimization Yuileong YeungWei LuRuipeng Li OriginalPaper 20 May 2019 Pages: 25079 - 25100
A multi-level residual reconstruction based image compressed sensing recovery scheme Shuai ZhengJian ChenYonghong Kuo OriginalPaper 21 May 2019 Pages: 25101 - 25119
Application of the center–surround mechanism to contour detection Yi-Jun CaoChuan LinHao-Jun Zhao OriginalPaper 21 May 2019 Pages: 25121 - 25141
Cascaded asymmetric local pattern: a novel descriptor for unconstrained facial image recognition and retrieval Soumendu ChakrabortySatish Kumar SinghPavan Chakraborty OriginalPaper 21 May 2019 Pages: 25143 - 25162
Age-invariant face recognition using gender specific 3D aging modeling Sidra RiazZahid AliPrem Natarajan OriginalPaper 21 May 2019 Pages: 25163 - 25183
Video superpixels generation through integration of curvelet transform and simple linear iterative clustering Reddy Mounika BommisettyOm PrakashAshish Khare OriginalPaper 21 May 2019 Pages: 25185 - 25219