Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (19)

Search Parameters:
Keywords = meaningful shadow images

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 12461 KB  
Article
HCSS-GB and IBESS: Secret Image Sharing Schemes with Enhanced Shadow Management and Visual-Gradient Access Control
by Huanrong Pan, Wei Yan, Rui Wang and Yongqiang Yu
Entropy 2025, 27(9), 893; https://doi.org/10.3390/e27090893 - 23 Aug 2025
Viewed by 826
Abstract
Image protection in privacy-sensitive domains, such as healthcare and military, exposes critical limitations in existing secret image sharing (SIS) schemes, including cumbersome shadow management, coarse-grained access control, and an inefficient storage-speed trade-off, which limits SIS in practical scenarios. Thus, this paper proposes two [...] Read more.
Image protection in privacy-sensitive domains, such as healthcare and military, exposes critical limitations in existing secret image sharing (SIS) schemes, including cumbersome shadow management, coarse-grained access control, and an inefficient storage-speed trade-off, which limits SIS in practical scenarios. Thus, this paper proposes two SIS schemes to address the above issues: the hierarchical control sharing scheme with Gaussian blur (HCSS-GB) and the image bit expansion-based sharing scheme (IBESS). For scenarios with limited storage space, HCSS-GB employs Gaussian blur to generate gradient-blurred cover images and integrates a controllable sharing model to produce meaningful shadow images without pixel expansion based on Shamir’s secret sharing. Furthermore, to accommodate real-time application scenarios, IBESS employs bit expansion to combine the high bits of generated shadow images with those of blurred carrier images, enhancing operational efficiency at the cost of increased storage overhead. Experimental results demonstrate that both schemes achieve lossless recovery (with PSNR of , MSE of 0, and SSIM of 1), validating their reliability. Specifically, HCSS-GB maintains a 1:1 storage ratio with the original image, making it highly suitable for storage-constrained environments; IBESS exhibits exceptional efficiency, with sharing time as low as 2.1 s under the (7,8) threshold, ideal for real-time tasks. Comparative analyses further show that using carrier images with high standard deviation contrast (Cσ) and Laplacian-based sharpness (SL) significantly enhances shadow distinguishability, strengthening the effectiveness of hierarchical access control. Both schemes provide valuable solutions for secure image sharing and efficient shadow management, with their validity and practicality confirmed by experimental data. Full article
(This article belongs to the Special Issue Information-Theoretic Security and Privacy)
Show Figures

Figure 1

23 pages, 35780 KB  
Article
SatGS: Remote Sensing Novel View Synthesis Using Multi- Temporal Satellite Images with Appearance-Adaptive 3DGS
by Nan Bai, Anran Yang, Hao Chen and Chun Du
Remote Sens. 2025, 17(9), 1609; https://doi.org/10.3390/rs17091609 - 1 May 2025
Cited by 1 | Viewed by 2347
Abstract
Novel view synthesis of remote sensing scenes from satellite images is a meaningful but challenging task. Due to the wide temporal span of image acquisition, satellite image collections often exhibit significant appearance variations, such as seasonal changes and shadow movements, as well as [...] Read more.
Novel view synthesis of remote sensing scenes from satellite images is a meaningful but challenging task. Due to the wide temporal span of image acquisition, satellite image collections often exhibit significant appearance variations, such as seasonal changes and shadow movements, as well as transient objects, making it difficult to reconstruct the original scene accurately. Previous work has noted that a large amount of image variation in satellite images is caused by changing light conditions. To address this, researchers have proposed incorporating the direction of solar rays into neural radiance fields (NeRF) to model the amount of sunlight reaching each point in the scene. However, this approach fails to effectively account for seasonal variations and suffers from a long training time and slow rendering speeds due to the need to evaluate numerous samples from the radiance field for each pixel. To achieve fast, efficient, and high-quality novel view synthesis for multi-temporal satellite scenes, we propose SatGS, a novel method that leverages 3D Gaussian points for scene reconstruction with an appearance-adaptive adjustment strategy. This strategy enables our model to adaptively adjust the seasonal appearance features and shadow regions of the rendered images based on the appearance characteristics of the training images and solar angles. Additionally, the impact of transient objects is mitigated through the use of visibility maps and uncertainty optimization. Experiments conducted on WorldView-3 images demonstrate that SatGS not only renders superior image quality compared to existing State-of-the-Art methods but also surpasses them in rendering speed, showcasing its potential for practical applications in remote sensing. Full article
Show Figures

Figure 1

25 pages, 6944 KB  
Article
Representation Learning of Multi-Spectral Earth Observation Time Series and Evaluation for Crop Type Classification
by Andrea González-Ramírez, Clement Atzberger, Deni Torres-Roman and Josué López
Remote Sens. 2025, 17(3), 378; https://doi.org/10.3390/rs17030378 - 23 Jan 2025
Cited by 3 | Viewed by 2062
Abstract
Remote sensing (RS) spectral time series provide a substantial source of information for the regular and cost-efficient monitoring of the Earth’s surface. Important monitoring tasks include land use and land cover classification, change detection, forest monitoring and crop type identification, among others. To [...] Read more.
Remote sensing (RS) spectral time series provide a substantial source of information for the regular and cost-efficient monitoring of the Earth’s surface. Important monitoring tasks include land use and land cover classification, change detection, forest monitoring and crop type identification, among others. To develop accurate solutions for RS-based applications, often supervised shallow/deep learning algorithms are used. However, such approaches usually require fixed-length inputs and large labeled datasets. Unfortunately, RS images acquired by optical sensors are frequently degraded by aerosol contamination, clouds and cloud shadows, resulting in missing observations and irregular observation patterns. To address these issues, efforts have been made to implement frameworks that generate meaningful representations from the irregularly sampled data streams and alleviate the deficiencies of the data sources and supervised algorithms. Here, we propose a conceptually and computationally simple representation learning (RL) approach based on autoencoders (AEs) to generate discriminative features for crop type classification. The proposed methodology includes a set of single-layer AEs with a very limited number of neurons, each one trained with the mono-temporal spectral features of a small set of samples belonging to a class, resulting in a model capable of processing very large areas in a short computational time. Importantly, the developed approach remains flexible with respect to the availability of clear temporal observations. The signal derived from the ensemble of AEs is the reconstruction difference vector between input samples and their corresponding estimations, which are averaged over all cloud-/shadow-free temporal observations of a pixel location. This averaged reconstruction difference vector is the base for the representations and the subsequent classification. Experimental results show that the proposed extremely light-weight architecture indeed generates separable features for competitive performances in crop type classification, as distance metrics scores achieved with the derived representations significantly outperform those obtained with the initial data. Conventional classification models were trained and tested with representations generated from a widely used Sentinel-2 multi-spectral multi-temporal dataset, BreizhCrops. Our method achieved 77.06% overall accuracy, which is 6% higher than that achieved using original Sentinel-2 data within conventional classifiers and even 4% better than complex deep models such as OmnisCNN. Compared to extremely complex and time-consuming models such as Transformer and long short-term memory (LSTM), only a 3% reduction in overall accuracy was noted. Our method uses only 6.8k parameters, i.e., 400x fewer than OmnicsCNN and 27x fewer than Transformer. The results prove that our method is competitive in terms of classification performance compared with state-of-the-art methods while substantially reducing the computational load. Full article
(This article belongs to the Collection Sentinel-2: Science and Applications)
Show Figures

Figure 1

18 pages, 2724 KB  
Article
MRA-VSS: A Matrix-Based Reversible and Authenticable Visual Secret-Sharing Scheme Using Dual Meaningful Images
by Chia-Chen Lin, En-Ting Chu, Ya-Fen Chang and Ersin Elbasi
Mathematics 2024, 12(22), 3532; https://doi.org/10.3390/math12223532 - 12 Nov 2024
Viewed by 995
Abstract
Reversible data hiding (RDH) is an approach that emphasizes the imperceptibility of hidden confidential data and the restoration of the original cover image. To achieve these objectives at the same time, in this paper, we design a matrix-based crossover data hiding strategy and [...] Read more.
Reversible data hiding (RDH) is an approach that emphasizes the imperceptibility of hidden confidential data and the restoration of the original cover image. To achieve these objectives at the same time, in this paper, we design a matrix-based crossover data hiding strategy and then propose a novel matrix-based RDH scheme with dual meaningful image shadows, called MRA-VSS (matrix-based reversible and authenticable visual secret-sharing). Each pixel in a secret image is divided into two parts, and each part is embedded into a cover pixel pair by referring to the intersection point of four overlapping frames. During the share construction phase, not only partial information of the pixel in a secret image but also authentication codes are embedded into the corresponding cover pixel pair. Finally, two meaningful image shadows are derived. The experimental results confirm that our designed MRA-VSS successfully embeds pixels’ partial information and authentication code into cover pixel pairs at the cost of slight distortion during data hiding. Nevertheless, the robustness of our scheme under the steganalysis attack and the authentication capability of our scheme are also proven. Full article
(This article belongs to the Section E2: Control Theory and Mechanics)
Show Figures

Figure 1

13 pages, 980 KB  
Article
Survey on Findings and Utilization of Preoperative Chest Radiography in Ophthalmic Surgery
by Yohei Kuroki, Ayako Takamori, Koichiro Takahashi, Soichiro Yamamoto, Noriko Yoshida and Hiroshi Enaida
J. Clin. Med. 2024, 13(13), 3909; https://doi.org/10.3390/jcm13133909 - 3 Jul 2024
Viewed by 2228
Abstract
Objective: The objective of this paper is to reconsider the significance of preoperative chest radiography (CXR) before ophthalmic surgery through investigation of imaging findings and usage status. Methods: This retrospective observational clinical study involved 1616 patients who underwent ophthalmic surgery at [...] Read more.
Objective: The objective of this paper is to reconsider the significance of preoperative chest radiography (CXR) before ophthalmic surgery through investigation of imaging findings and usage status. Methods: This retrospective observational clinical study involved 1616 patients who underwent ophthalmic surgery at Saga University Hospital from 1 January 2019 to 31 December 2020. The patients’ radiology reports were obtained from the electronic medical records, and their CXR findings, therapeutic interventions, and progress were investigated. Results: Among all patients, 539 (33.4%) had abnormal preoperative CXR findings. Of these patients, 74 (4.6%) had newly identified abnormal findings. In both patient groups, approximately 70% of patients with abnormal findings were aged ≥70 years, and interstitial shadows were the most common finding. Among all patients with abnormal findings, three (0.19%) received preoperative therapeutic interventions, and all surgeries were performed safely. Forty-three patients with abnormal findings were referred to our hospital or other hospitals for further investigation and treatment postoperatively. Among those patients, eight (0.5%) had primary lung cancer, seven underwent surgery, and one received chemoradiation. The other patients were also followed up and received appropriate therapeutic interventions. Conclusions: Before ophthalmic surgery, few patients required actual therapeutic interventions based on their CXR results. However, many abnormal findings were revealed in elderly patients, including some serious diseases. Furthermore, research has suggested that appropriate therapeutic intervention after ophthalmologic surgery may reduce the risk of a poor life prognosis. This study clearly shows that preoperative CXR is not only useful for perioperative systemic management but also ultimately benefits patients. It is also considered particularly meaningful for patients aged ≥70 years. Full article
Show Figures

Figure 1

20 pages, 1312 KB  
Article
Shadow Enhancement Using 2D Dynamic Stochastic Resonance for Hyperspectral Image Classification
by Qiuyue Liu, Min Fu and Xuefeng Liu
Remote Sens. 2023, 15(7), 1820; https://doi.org/10.3390/rs15071820 - 29 Mar 2023
Cited by 6 | Viewed by 2383
Abstract
With the development of remote sensing technology, classification has become a meaningful way to explore the rich information in hyperspectral images (HSIs). However, various environmental factors may cause noise and shadow areas in HSIs, resulting in weak signals and difficulties in fully utilizing [...] Read more.
With the development of remote sensing technology, classification has become a meaningful way to explore the rich information in hyperspectral images (HSIs). However, various environmental factors may cause noise and shadow areas in HSIs, resulting in weak signals and difficulties in fully utilizing information. In addition, classification methods based on deep learning have made considerable progress, but features extracted from most networks have much redundancy. Therefore, a method based on two-dimensional dynamic stochastic resonance (2D DSR) shadow enhancement and convolutional neural network (CNN) classification combined with an attention mechanism (AM) for HSIs is proposed in this paper. Firstly, to protect the spatial correlation of HSIs, an iterative equation of 2D DSR based on the pixel neighborhood relationship was derived, which made it possible to perform matrix SR in the spatial dimension of the image, instead of one-dimensional vector resonance. Secondly, by using the noise in the shadow area to generate resonance, 2D DSR can help increase the signals in the shadow regions by preserving the spatial characteristics, and enhanced HSIs can be obtained. Then, a 3DCNN embedded with two efficient channel attention (ECA) modules and one convolutional block attention module (CBAM) was designed to make the most of critical features that significantly affect the classification accuracy by giving different weights. Finally, the performance of the proposed method was evaluated on a real-world HSI, and comparative studies were carried out. The experimental results showed that the proposed approach has promising prospects in HSIs’ shadow enhancement and information mining. Full article
Show Figures

Graphical abstract

17 pages, 6089 KB  
Article
HA-Unet: A Modified Unet Based on Hybrid Attention for Urban Water Extraction in SAR Images
by Huina Song, Han Wu, Jianhua Huang, Hua Zhong, Meilin He, Mingkun Su, Gaohang Yu, Mengyuan Wang and Jianwu Zhang
Electronics 2022, 11(22), 3787; https://doi.org/10.3390/electronics11223787 - 17 Nov 2022
Cited by 13 | Viewed by 2718
Abstract
Urban water plays a significant role in the urban ecosystem, but urban water extraction is still a challenging task in automatic interpretation of synthetic aperture radar (SAR) images. The influence of radar shadows and strong scatters in urban areas may lead to misclassification [...] Read more.
Urban water plays a significant role in the urban ecosystem, but urban water extraction is still a challenging task in automatic interpretation of synthetic aperture radar (SAR) images. The influence of radar shadows and strong scatters in urban areas may lead to misclassification in urban water extraction. Nevertheless, the local features captured by convolutional layers in Convolutional Neural Networks (CNNs) are generally redundant and cannot make effective use of global information to guide the prediction of water pixels. To effectively emphasize the identifiable water characteristics and fully exploit the global information of SAR images, a modified Unet based on hybrid attention mechanism is proposed to improve the performance of urban water extraction in this paper. Considering the feature extraction ability and the global modeling capability in SAR image segmentation, the Channel and Spatial Attention Module (CSAM) and the Multi-head Self-Attention Block (MSAB) are both introduced into the proposed Hybrid Attention Unet (HA-Unet). In this work, Resnet50 is adopted as the backbone of HA-Unet to extract multi-level features of SAR images. During the feature extraction process, CSAM based on local attention is adopted to enhance the meaningful water features and ignore unnecessary features adaptively in feature maps of two shallow layers. In the last two layers of the backbone, MSAB is introduced to capture the global information of SAR images to generate global attention. In addition, two global attention maps generated by MSAB are aggregated together to reconstruct the spatial feature relationship of SAR images from high-resolution feature maps. The experimental results on Sentinel-1A SAR images show that the proposed urban water extraction method has a strong ability to extract water bodies in the complex urban areas. The ablation experiment and visualization results vividly indicate that both CSAM and MSAB contribute significantly to extracting urban water accurately and effectively. Full article
(This article belongs to the Special Issue Advancements in Radar Signal Processing)
Show Figures

Figure 1

14 pages, 3317 KB  
Article
Meaningful Secret Image Sharing with Uniform Image Quality
by Jingwen Cheng, Lintao Liu, Feng Chen and Yue Jiang
Mathematics 2022, 10(18), 3241; https://doi.org/10.3390/math10183241 - 6 Sep 2022
Cited by 4 | Viewed by 1855
Abstract
In meaningful secret image sharing (MSIS), a secret image is divided into n shadows. Each shadow is meaningful and similar to the corresponding cover image. Meaningful shadows can reduce the suspicion of attackers in transmission and facilitate shadow management. Previous MSIS schemes always [...] Read more.
In meaningful secret image sharing (MSIS), a secret image is divided into n shadows. Each shadow is meaningful and similar to the corresponding cover image. Meaningful shadows can reduce the suspicion of attackers in transmission and facilitate shadow management. Previous MSIS schemes always include pixel expansion, and cross-interference from different shadows may exist when cover images are extremely unnatural images with large black and white blocks. In this article, we propose an MSIS with uniform image quality. A threshold t is set to determine the absolute salient regions. More identical bits are allocated according to saliency values in the absolute saliency region, which can improve image quality. In addition, the new identical bits allocation strategy also adjusts the randomness of the shadow images, generating shadows with uniform image quality and avoiding the cross-interference between different shadows. Experimental results show the effectiveness of our proposed scheme. Full article
Show Figures

Figure 1

16 pages, 5866 KB  
Article
Thumbnail Secret Image Sharing in Cloud Storage
by Yongqiang Yu, Xuehu Yan, Shudong Wang, Xianhui Wang and Huan Lu
Mathematics 2022, 10(17), 3076; https://doi.org/10.3390/math10173076 - 26 Aug 2022
Cited by 2 | Viewed by 2290
Abstract
In recent years, the amount of data has increased explosively, which has spawned the large-scale development of cloud storage. Increasingly, individuals and enterprises store images in cloud space. The storage security of the cloud is generally guaranteed by encryption, but this can no [...] Read more.
In recent years, the amount of data has increased explosively, which has spawned the large-scale development of cloud storage. Increasingly, individuals and enterprises store images in cloud space. The storage security of the cloud is generally guaranteed by encryption, but this can no longer meet the needs of image management and protection. In order to realize the management and loss tolerance of images, this paper proposes a thumbnail secret image sharing method. The proposed scheme combines the advantages of thumbnail-preserving encryption (TPE) and secret image sharing (SIS) with different meaningful shadows. Thumbnails can realize the visual management of stored images, and secret image sharing can realize the perfect security of stored images. The proposed scheme realizes the confidentiality, integrity, and availability of images, which are three elements of information security. Compared with TPE, our scheme not only realizes the visual management of images but also achieves loss tolerance and perfect security. Compared with SIS with different meaningful shadows, our scheme will greatly improve the sharing efficiency and reduce the consumption of computing resources. In this paper, the theoretical analysis and security proof of the proposed scheme are presented. In addition, we also conduct sufficient experiments and comparative explanations. Full article
Show Figures

Figure 1

12 pages, 11856 KB  
Article
Meaningful Secret Image Sharing with Saliency Detection
by Jingwen Cheng, Xuehu Yan, Lintao Liu, Yue Jiang and Xuan Wang
Entropy 2022, 24(3), 340; https://doi.org/10.3390/e24030340 - 26 Feb 2022
Cited by 15 | Viewed by 3347
Abstract
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage. In traditional secret image sharing schemes, noise-like shadows introduce difficulties into [...] Read more.
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage. In traditional secret image sharing schemes, noise-like shadows introduce difficulties into shadow management and increase the risk of attacks. Meaningful secret image sharing is thus proposed to solve these problems. Previous meaningful SIS schemes have employed steganography to hide shares into cover images, and their covers are always binary images. These schemes usually include pixel expansion and low visual quality shadows. To improve the shadow quality, we design a meaningful secret image sharing scheme with saliency detection. Saliency detection is used to determine the salient regions of cover images. In our proposed scheme, we improve the quality of salient regions that are sensitive to the human vision system. In this way, we obtain meaningful shadows with better visual quality. Experiment results and comparisons demonstrate the effectiveness of our proposed scheme. Full article
Show Figures

Figure 1

19 pages, 2449 KB  
Article
A k,n-Threshold Secret Image Sharing Scheme Based on a Non-Full Rank Linear Model
by Ji-Hwei Horng, Si-Sheng Chen and Chin-Chen Chang
Mathematics 2022, 10(3), 524; https://doi.org/10.3390/math10030524 - 7 Feb 2022
Cited by 3 | Viewed by 2525
Abstract
Secret image sharing is a hot issue in the research field of data hiding schemes for digital images. This paper proposes a general k,n threshold secret image sharing scheme, which distributes secret data into n meaningful image shadows based on a [...] Read more.
Secret image sharing is a hot issue in the research field of data hiding schemes for digital images. This paper proposes a general k,n threshold secret image sharing scheme, which distributes secret data into n meaningful image shadows based on a non-full rank linear model. The image shadows are indistinguishable from their corresponding distinct cover images. Any k combination of the n shares can perfectly restore the secret data. In the proposed scheme, the integer parameters k,n, with kn, can be set arbitrarily to meet the application requirement. The experimental results demonstrate the applicability of the proposed general scheme. The embedding capacity, the visual quality of image shadows, and the security level are satisfactory. Full article
Show Figures

Figure 1

17 pages, 855 KB  
Article
Meaningful Secret Image Sharing Scheme with High Visual Quality Based on Natural Steganography
by Yuyuan Sun, Yuliang Lu, Jinrui Chen, Weiming Zhang and Xuehu Yan
Mathematics 2020, 8(9), 1452; https://doi.org/10.3390/math8091452 - 30 Aug 2020
Cited by 9 | Viewed by 2760
Abstract
The (k,n)-threshold Secret Image Sharing scheme (SISS) is a solution to image protection. However, the shadow images generated by traditional SISS are noise-like, easily arousing deep suspicions, so that it is significant to generate meaningful shadow images. One [...] Read more.
The (k,n)-threshold Secret Image Sharing scheme (SISS) is a solution to image protection. However, the shadow images generated by traditional SISS are noise-like, easily arousing deep suspicions, so that it is significant to generate meaningful shadow images. One solution is to embed the shadow images into meaningful natural images and visual quality should be considered first. Limited by embedding rate, the existing schemes have made concessions in size and visual quality of shadow images, and few of them take the ability of anti-steganalysis into consideration. In this paper, a meaningful SISS that is based on Natural Steganography (MSISS-NS) is proposed. The secret image is firstly divided into n small-sized shadow images with Chinese Reminder Theorem, which are then embedded into RAW images to simulate the images with higher ISO parameters with NS. In MSISS-NS, the visual quality of shadow images is improved significantly. Additionally, as the payload of cover images with NS is larger than the size of small-sized shadow images, the scheme performs well not only in visual camouflage, but also in other aspects, like lossless recovery, no pixel expansion, and resisting steganalysis. Full article
(This article belongs to the Special Issue Computing Methods in Steganography and Multimedia Security)
Show Figures

Figure 1

17 pages, 4222 KB  
Article
Characterizing Land Surface Phenology and Exotic Annual Grasses in Dryland Ecosystems Using Landsat and Sentinel-2 Data in Harmony
by Neal J. Pastick, Devendra Dahal, Bruce K. Wylie, Sujan Parajuli, Stephen P. Boyte and Zhouting Wu
Remote Sens. 2020, 12(4), 725; https://doi.org/10.3390/rs12040725 - 22 Feb 2020
Cited by 48 | Viewed by 8198
Abstract
Invasive annual grasses, such as cheatgrass (Bromus tectorum L.), have proliferated in dryland ecosystems of the western United States, promoting increased fire activity and reduced biodiversity that can be detrimental to socio-environmental systems. Monitoring exotic annual grass cover and dynamics over large areas [...] Read more.
Invasive annual grasses, such as cheatgrass (Bromus tectorum L.), have proliferated in dryland ecosystems of the western United States, promoting increased fire activity and reduced biodiversity that can be detrimental to socio-environmental systems. Monitoring exotic annual grass cover and dynamics over large areas requires the use of remote sensing that can support early detection and rapid response initiatives. However, few studies have leveraged remote sensing technologies and computing frameworks capable of providing rangeland managers with maps of exotic annual grass cover at relatively high spatiotemporal resolutions and near real-time latencies. Here, we developed a system for automated mapping of invasive annual grass (%) cover using in situ observations, harmonized Landsat and Sentinel-2 (HLS) data, maps of biophysical variables, and machine learning techniques. A robust and automated cloud, cloud shadow, water, and snow/ice masking procedure (mean overall accuracy >81%) was implemented using time-series outlier detection and data mining techniques prior to spatiotemporal interpolation of HLS data via regression tree models (r = 0.94; mean absolute error (MAE) = 0.02). Weekly, cloud-free normalized difference vegetation index (NDVI) image composites (2016–2018) were used to construct a suite of spectral and phenological metrics (e.g., start and end of season dates), consistent with information derived from Moderate Resolution Image Spectroradiometer (MODIS) data. These metrics were incorporated into a data mining framework that accurately (r = 0.83; MAE = 11) modeled and mapped exotic annual grass (%) cover throughout dryland ecosystems in the western United States at a native, 30-m spatial resolution. Our results show that inclusion of weekly HLS time-series data and derived indicators improves our ability to map exotic annual grass cover, as compared to distribution models that use MODIS products or monthly, seasonal, or annual HLS composites as primary inputs. This research fills a critical gap in our ability to effectively assess, manage, and monitor drylands by providing a framework that allows for an accurate and timely depiction of land surface phenology and exotic annual grass cover at spatial and temporal resolutions that are meaningful to local resource managers. Full article
(This article belongs to the Special Issue Remote Sensing of Dryland Environment)
Show Figures

Graphical abstract

22 pages, 3791 KB  
Article
A n-out-of-n Sharing Digital Image Scheme by Using Color Palette
by Ching-Nung Yang, Qin-Dong Sun, Yan-Xiao Liu and Ci-Ming Wu
Electronics 2019, 8(7), 802; https://doi.org/10.3390/electronics8070802 - 17 Jul 2019
Viewed by 3520
Abstract
A secret image sharing (SIS) scheme inserts a secret message into shadow images in a way that if shadow images are combined in a specific way, the secret image can be recovered. A 2-out-of-2 sharing digital image scheme (SDIS) adopts a color palette [...] Read more.
A secret image sharing (SIS) scheme inserts a secret message into shadow images in a way that if shadow images are combined in a specific way, the secret image can be recovered. A 2-out-of-2 sharing digital image scheme (SDIS) adopts a color palette to share a digital color secret image into two shadow images, and the secret image can be recovered from two shadow images, while any one shadow image has no information about the secret image. This 2-out-of-2 SDIS may keep the shadow size small because by using a color palette, and thus has advantage of reducing storage. However, the previous works on SDIS are just 2-out-of-2 scheme and have limited functions. In this paper, we take the lead to study a general n-out-of-n SDIS which can be applied on more than two shadow. The proposed SDIS is implemented on the basis of 2-out-of-2 SDIS. Our main contribution has the higher contrast of binary meaningful shadow and the larger region in color shadows revealing cover image when compared with previous 2-out-of-2 SDISs. Meanwhile, our SDIS is resistant to colluder attack. Full article
(This article belongs to the Special Issue Signal Processing and Analysis of Electrical Circuit)
Show Figures

Figure 1

21 pages, 6303 KB  
Article
Using Two Meaningful Shadows to Share Secret Messages with Reversibility
by Lin Li, Chia-Chen Lin and Chin-Chen Chang
Symmetry 2019, 11(1), 79; https://doi.org/10.3390/sym11010079 - 11 Jan 2019
Cited by 1 | Viewed by 4826
Abstract
A subtopic of visual secret sharing (VSS) is information hiding-based VSS (IH-VSS), which embeds secret messages into images using an information hiding technique. In the IH-VSS scheme, stego-images are divided into shadows under the guidance and constraint of some predetermined approaches. In order [...] Read more.
A subtopic of visual secret sharing (VSS) is information hiding-based VSS (IH-VSS), which embeds secret messages into images using an information hiding technique. In the IH-VSS scheme, stego-images are divided into shadows under the guidance and constraint of some predetermined approaches. In order to achieve the purpose of security and reliability, the hidden information cannot be recovered unless a certain amount or all of the credible shadows work together. In this paper, we propose a (2, 2) IH-VSS scheme with reversibility and friendliness. In the shadow generation phase, two meaningful shadow images are produced and then distributed. In the extraction and restoration phase, the hidden secret information and cover image, respectively, can be reconstructed credibly and correctly. No complex computation of shadow generation is involved, but high security is achieved. Moreover, a satisfying peak-signal-to-noise ratio (PSNR) is obtained with the high embedding capacity of 1.59 bpp in a very simple and effective way. Full article
(This article belongs to the Special Issue Emerging Data Hiding Systems in Image Communications)
Show Figures

Figure 1

Back to TopTop