1 code implementation • 10 Oct 2023 • Cong Yang, Bipin Indurkhya, John See, Bo Gao, Yan Ke, Zeyd Boukhers, Zhenyu Yang, Marcin Grzegorzek
However, most existing shape and image datasets suffer from the lack of skeleton GT and inconsistency of GT standards.
1 code implementation • ECCV 2020 • Zhiming Chen, Kean Chen, Weiyao Lin, John See, Hui Yu, Yan Ke, Cong Yang
The experimental results show that PIoU loss can dramatically improve the performance of OBB detectors, particularly on objects with high aspect ratios and complex backgrounds.
no code implementations • 26 Apr 2018 • Jia Liu, Yu Lei, Yan Ke, Jun Li, Min-qing Zhang, Xiaoyuan Yan
In this paper, a new data-driven information hiding scheme called generative steganography by sampling (GSS) is proposed.
no code implementations • 18 Dec 2017 • Ming-ming Liu, Min-qing Zhang, Jia Liu, Ying-nan Zhang, Yan Ke
The main idea of the method is that the class label of generative adversarial networks is replaced with the secret information as a driver to generate hidden image directly, and then extract the secret information from the hidden image through the discriminator.
Cryptography and Security Multimedia
no code implementations • 14 Nov 2017 • Yan Ke, Min-qing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang
The secret messages can be outputted by the generator if and only if the extraction key and the cover image are both inputted.
Multimedia