scholarly journals SPAN: Spatial Pyramid Attention Network for Image Manipulation Localization

Author(s):  
Xuefeng Hu ◽  
Zhihan Zhang ◽  
Zhenye Jiang ◽  
Syomantak Chaudhuri ◽  
Zhenheng Yang ◽  
...  
2021 ◽  
Vol 13 (7) ◽  
pp. 1312
Author(s):  
Wei Cui ◽  
Xin He ◽  
Meng Yao ◽  
Ziwei Wang ◽  
Yuanjie Hao ◽  
...  

The pixel-based semantic segmentation methods take pixels as recognitions units, and are restricted by the limited range of receptive fields, so they cannot carry richer and higher-level semantics. These reduce the accuracy of remote sensing (RS) semantic segmentation to a certain extent. Comparing with the pixel-based methods, the graph neural networks (GNNs) usually use objects as input nodes, so they not only have relatively small computational complexity, but also can carry richer semantic information. However, the traditional GNNs are more rely on the context information of the individual samples and lack geographic prior knowledge that reflects the overall situation of the research area. Therefore, these methods may be disturbed by the confusion of “different objects with the same spectrum” or “violating the first law of geography” in some areas. To address the above problems, we propose a remote sensing semantic segmentation model called knowledge and spatial pyramid distance-based gated graph attention network (KSPGAT), which is based on prior knowledge, spatial pyramid distance and a graph attention network (GAT) with gating mechanism. The model first uses superpixels (geographical objects) to form the nodes of a graph neural network and then uses a novel spatial pyramid distance recognition algorithm to recognize the spatial relationships. Finally, based on the integration of feature similarity and the spatial relationships of geographic objects, a multi-source attention mechanism and gating mechanism are designed to control the process of node aggregation, as a result, the high-level semantics, spatial relationships and prior knowledge can be introduced into a remote sensing semantic segmentation network. The experimental results show that our model improves the overall accuracy by 4.43% compared with the U-Net Network, and 3.80% compared with the baseline GAT network.


Author(s):  
Jingda Guo ◽  
Xu Ma ◽  
Andrew Sansom ◽  
Mara McGuire ◽  
Andrew Kalaani ◽  
...  

Author(s):  
Holger Gevensleben ◽  
Gunther H. Moll ◽  
Hartmut Heinrich

Im Rahmen einer multizentrischen, randomisierten, kontrollierten Studie evaluierten wir die klinische Wirksamkeit eines Neurofeedback-Trainings (NF) bei Kindern mit einer Aufmerksamkeitsdefizit-/Hyperaktivitätsstörung (ADHS) und untersuchten die einem erfolgreichen Training zugrunde liegenden neurophysiologischen Wirkmechanismen. Als Vergleichstraining diente ein computergestütztes Aufmerksamkeitstraining, das dem Setting des Neurofeedback-Trainings in den wesentlichen Anforderungen und Rahmenbedingungen angeglichen war. Auf Verhaltensebene (Eltern- und Lehrerbeurteilung) zeigte sich das NF-Training nach Trainingsende dem Kontrolltraining sowohl hinsichtlich der ADHS-Kernsymptomatik als auch in assoziierten Bereichen überlegen. Für das Hauptzielkriterium (Verbesserung im FBB-HKS Gesamtwert) ergab sich eine mittlere Effektstärke (von 0.6). Sechs Monate nach Trainingsende (follow-up) konnte das gleiche Ergebnismuster gefunden werden. Die Ergebnisse legen somit den Schluss nahe, dass NF einen klinisch wirksamen Therapiebaustein zur Behandlung von Kindern mit ADHS darstellt. Auf neurophysiologischer Ebene (EEG; ereignisbezogene Potentiale, EPs) konnten für die beiden Neurofeedback-Protokolle Theta/Beta-Training und Training langsamer kortikaler Potentiale spezifische Effekte aufgezeigt werden. So war für das Theta/Beta-Training beispielsweise die Abnahme der Theta-Aktivität mit einer Reduzierung der ADHS-Symptomatik assoziiert. Für das SCP-Training wurde u. a. im Attention Network Test eine Erhöhung der kontingenten negativen Variation beobachtet, die die mobilisierten Ressourcen bei Vorbereitungsprozessen widerspiegelt. EEG- und EP-basierte Prädiktorvariablen konnten ermittelt werden. Der vorliegende Artikel bietet einen Gesamtüberblick über die in verschiedenen Publikationen unserer Arbeitsgruppe beschriebenen Ergebnisse der Studie und zeigt zukünftige Fragestellungen auf.


2009 ◽  
Author(s):  
F. Jacob Seagull ◽  
Peter Miller ◽  
Ivan George ◽  
Paul Mlyniec ◽  
Adrian Park
Keyword(s):  
3D Image ◽  

2018 ◽  
Vol 32 (5) ◽  
pp. 541-553 ◽  
Author(s):  
Nadine M. Richard ◽  
Charlene O'Connor ◽  
Ayan Dey ◽  
Ian H. Robertson ◽  
Brian Levine

2019 ◽  
Vol 69 (10) ◽  
pp. 423
Author(s):  
Manuel Vázquez Marrufo ◽  
Macarena García-Valdecasas Colell ◽  
Alejandro Galvao Carmona ◽  
Esteban Sarrias Arrabal ◽  
Javier Tirapu Ustárroz

2017 ◽  
Vol 2017 (7) ◽  
pp. 113-120 ◽  
Author(s):  
Sujoy Chakraborty ◽  
Matthias Kirchner

Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Author(s):  
Chengzhu Yu ◽  
Heng Lu ◽  
Na Hu ◽  
Meng Yu ◽  
Chao Weng ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document