JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (1): 19-29.doi: 10.6040/j.issn.1671-9352.2.2017.077
Previous Articles Next Articles
KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao
CLC Number:
[1] HAYS J, EFROS A A. IM2GPS: estimating geographic information from a single image[C] // IEEE Conference on Computer Vision and Pattern Recognition. Anchorage: IEEE, 2008: 1-8. [2] SUNKAVALLI K, ROMEIRO F, MATUSIK W, et al. What do color changes reveal about an outdoor scene?[C] // IEEE Conference on Computer Vision and Pattern Recognition. Anchorage: IEEE, 2008: 9-16. [3] 田建东, 王占鹏, 唐延东. 静态阴影检测的研究进展[J]. 信息与控制, 2015, 44(2):215-222. TIAN Jiandong, WANG Zhanpeng, TANG Yandong. Static shadow detection: a survey[J]. Information and Control, 2015, 44(2):215-222. [4] GUO Ruiqi, DAI Qieyun, HOIEM D. Single-image shadow detection and removal using paired regions[C] // IEEE Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2011: 2033-2040. [5] CUCCHIARA R, GRANA C, PICCARDI M, et al. Detecting moving objects, ghosts, and shadows in video streams[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(10):1337-1342. [6] 王珦磊, 唐加山. 一种基于YUV颜色空间自适应阴影消除算法[J]. 微型机与应用, 2016, 35(7):44-47. WANG Xianglei, TANG Jiashan. An adaptive shadow elimination algorithm based on YUV color space[J]. Microcomputer & Its Applications, 2016, 35(7):44-47. [7] 金勇, 吴庆标, 刘利刚. 基于自适应网格变形的图像编辑算法[J]. 软件学报, 2012, 34(5):1325-1334. JIN Yong, WU Qingbiao, LIU Ligang. Image editing algorithms based on adaptive mesh deformation[J]. Journal of Software, 2012, 23(5):1325-1334. [8] 武琳. 基于太阳阴影轨迹的经纬度估计技术研究[D]. 天津: 天津大学, 2010. WU Lin. Geo-location estimation from two shadow trajectories[D]. Tianjin: TianjinUniversity, 2010. [9] SHEN Yuping, CAO Xiaochun, LU Fei, et al. Camera Calibration from Two Shadow Trajectories.[C] // International Conference on Pattern Recognition. Hong Kong: IEEE, 2006, 2: 1-4. [10] 2015高教社杯全国大学生数学建模竞赛A题[EB/OL]. http://www.mcm.edu.cn/html_cn/node/ac8b96613522ef62c019d1cd45a125e3.html [11] 黄飞. 基于局部不变特征的图像分类研究[D]. 北京: 北京邮电大学, 2013. HUANG Fei. Research on local invariant feature based image classification[D]. Beijing: Beijing University of Posts and Telecommunications, 2013. [12] 唐志敏. 图像分类中的局部不变特征研究[D]. 长沙: 湖南大学, 2015. TANG Zhimin. Study on local invariant features in image classification[D]. Chang Sha: Hunan University, 2015. |
[1] | BI Xiao-di, LIANG Ying, SHI Hong-zhou, TIAN Hui. Aparameterized location privacy protection method based on two-level Anonymity [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 75-84. |
[2] | . A system of monitoring and protecting Android privacy leakage [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 59-67. |
[3] | LI Yu-xi, WANG Kai-xuan, LIN Mu-qing, ZHOU Fu-cai. A P2P network privacy protection system based on anonymous broadcast encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 84-91. |
[4] | CAI Hong-yun, MA Xiao-xue. Access control based on relationship strength for online social network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 90-97. |
[5] | CAI Hong-yun, TIAN Jun-feng. Research of data privacy protection for cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 83-89. |
[6] | ZHAO Ze-mao1, LI Lin1, ZHANG Fan1,2, ZHANG Pin1, ZHOU Jian-qin1, WANG Jia-bo1. The location privacy protection method with dispersed sub cloaking region [J]. J4, 2013, 48(7): 56-61. |
[7] | . Scheme of hierarchical content extraction signature based on non-credible PKG identity-based signature [J]. J4, 2012, 47(9): 7-14. |
[8] | GAO Feng1, HE Jing-sha2. A privacy protection method based on a trust and information flow model [J]. J4, 2011, 46(5): 39-43. |
[9] | QIU Tao-rong, WANG Lu, XIONG Shu-jie, BAI Xiao-ming. A granular computing approach for knowledge hiding [J]. J4, 2010, 45(7): 60-64. |
|