Skip to main content

Showing 1–5 of 5 results for author: Haghighi, B B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2205.04234  [pdf, other

    cs.CV cs.LG

    An Effective Scheme for Maize Disease Recognition based on Deep Networks

    Authors: Saeedeh Osouli, Behrouz Bolourian Haghighi, Ehsan Sadrossadat

    Abstract: In the last decades, the area under cultivation of maize products has increased because of its essential role in the food cycle for humans, livestock, and poultry. Moreover, the diseases of plants impact food safety and can significantly reduce both the quality and quantity of agricultural products. There are many challenges to accurate and timely diagnosis of the disease. This research presents a… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

  2. arXiv:2203.14007  [pdf, other

    cs.CV cs.AI cs.LG

    EYNet: Extended YOLO for Airport Detection in Remote Sensing Images

    Authors: Hengameh Mirhajianmoghadam, Behrouz Bolourian Haghighi

    Abstract: Nowadays, airport detection in remote sensing images has attracted considerable attention due to its strategic role in civilian and military scopes. In particular, uncrewed and operated aerial vehicles must immediately detect safe areas to land in emergencies. The previous schemes suffered from various aspects, including complicated backgrounds, scales, and shapes of the airport. Meanwhile, the ra… ▽ More

    Submitted 26 March, 2022; originally announced March 2022.

  3. arXiv:2005.03382  [pdf, other

    cs.CR cs.CV cs.NE

    WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II

    Authors: Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Ahad Harati, Modjtaba Rouhani

    Abstract: Digital watermarking is a remarkable issue in the field of information security to avoid the misuse of images in multimedia networks. Although access to unauthorized persons can be prevented through cryptography, it cannot be simultaneously used for copyright protection or content authentication with the preservation of image integrity. Hence, this paper presents an optimized multipurpose blind wa… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

  4. arXiv:1803.02623  [pdf, other

    cs.CR cs.CV cs.MM

    TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with quality optimized using LWT and GA

    Authors: Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh

    Abstract: In this paper, an efficient fragile blind quad watermarking scheme for image tamper detection and recovery based on lifting wavelet transform and genetic algorithm is proposed. TRLG generates four compact digests with super quality based on lifting wavelet transform and halftoning technique by distinguishing the types of image blocks. In other words, for each 2*2 non-overlap blocks, four chances f… ▽ More

    Submitted 7 March, 2018; originally announced March 2018.

  5. arXiv:1802.07119  [pdf, other

    cs.CR cs.MM

    TRLF: An Effective Semi-fragile Watermarking Method for Tamper Detection and Recovery based on LWT and FNN

    Authors: Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Reza Monsefi

    Abstract: This paper proposes a novel method for tamper detection and recovery using semi-fragile data hiding, based on Lifting Wavelet Transform (LWT) and Feed-Forward Neural Network (FNN). In TRLF, first, the host image is decomposed up to one level using LWT, and the Discrete Cosine Transform (DCT) is applied to each 2*2 blocks of diagonal details. Next, a random binary sequence is embedded in each block… ▽ More

    Submitted 18 February, 2018; originally announced February 2018.