• ### Low Dose CT Image Denoising Using a Generative Adversarial Network with Wasserstein Distance and Perceptual Loss(1708.00961)

April 24, 2018 cs.CV
In this paper, we introduce a new CT image denoising method based on the generative adversarial network (GAN) with Wasserstein distance and perceptual similarity. The Wasserstein distance is a key concept of the optimal transform theory, and promises to improve the performance of the GAN. The perceptual loss compares the perceptual features of a denoised output against those of the ground truth in an established feature space, while the GAN helps migrate the data noise distribution from strong to weak. Therefore, our proposed method transfers our knowledge of visual perception to the image denoising task, is capable of not only reducing the image noise level but also keeping the critical information at the same time. Promising results have been obtained in our experiments with clinical CT images.
• ### Optimization of the Block-level Bit Allocation in Perceptual Video Coding based on MINMAX(1511.04691)

Nov. 15, 2015 cs.MM
In video coding, it is expected that the encoder could adaptively select the encoding parameters (e.g., quantization parameter) to optimize the bit allocation to different sources under the given constraint. However, in hybrid video coding, the dependency between sources brings high complexity for the bit allocation optimization, especially in the block-level, and existing optimization methods mostly focus on frame-level bit allocation. In this paper, we propose a macroblock (MB) level bit allocation method based on the minimum maximum (MINMAX) criterion, which has acceptable encoding complexity for offline applications. An iterative-based algorithm, namely maximum distortion descend (MDD), is developed to reduce quality fluctuation among MBs within a frame, where the Structure SIMilarity (SSIM) index is used to measure the perceptual distortion of MBs. Our extensive experimental results on benchmark video sequences show that the proposed method can greatly enhance the encoding performance in terms of both bits saving and perceptual quality improvement.
• ### Learn to Evaluate Image Perceptual Quality Blindly from Statistics of Self-similarity(1510.02884)

Oct. 10, 2015 cs.CV
Among the various image quality assessment (IQA) tasks, blind IQA (BIQA) is particularly challenging due to the absence of knowledge about the reference image and distortion type. Features based on natural scene statistics (NSS) have been successfully used in BIQA, while the quality relevance of the feature plays an essential role to the quality prediction performance. Motivated by the fact that the early processing stage in human visual system aims to remove the signal redundancies for efficient visual coding, we propose a simple but very effective BIQA method by computing the statistics of self-similarity (SOS) in an image. Specifically, we calculate the inter-scale similarity and intra-scale similarity of the distorted image, extract the SOS features from these similarities, and learn a regression model to map the SOS features to the subjective quality score. Extensive experiments demonstrate very competitive quality prediction performance and generalization ability of the proposed SOS based BIQA method.
• ### Improved Scatter Correction in X-Ray Cone Beam CT with Moving Beam Stop Array Using Johns' Equation(1410.8411)

Oct. 30, 2014 physics.med-ph
In this paper, an improved scatter correction with moving beam stop array (BSA) for x-ray cone beam (CB) CT is proposed. Firstly, correlation between neighboring CB views is deduced based on John's Equation. Then, correlation-based algorithm is presented to complement the incomplete views by using the redundancy (over-determined information) in CB projections. Finally, combining the algorithm with scatter correction method using moving BSA, where part of primary radiation is blocked and incomplete projections are acquired, an improved correction method is proposed. Effectiveness and robustness is validated by Monte Carlo (MC) simulation with EGSnrc on humanoid phantom.
• ### Single-scan scatter correction in CBCT by using projection correlation based view interpolation (PC-VI) and a stationary ring-shaped beam stop array (BSA)(1410.8571)

Oct. 30, 2014 physics.med-ph
In the scatter correction for x-ray Cone Beam (CB) CT, the single-scan scheme with moving Beam Stop Array (BSA) offers reliable scatter measurement with low dose, and by using Projection Correlation based View Interpolation (PC-VI), the primary fluence shaded by the moving BSA (during scatter measurement) could be recovered with high accuracy. However, the moving BSA may increase the mechanical burden in real applications. For better practicability, in this paper we proposed a PC-VI based single-scan scheme with a ring-shaped stationary BSA, which serves as a virtual moving BSA during CB scan, so the shaded primary fluence by this stationary BSA can be also well recovered by PC-VI. The principle in designing the whole system is deduced and evaluated. The proposed scheme greatly enhances the practicability of the single-scan scatter correction scheme.
• ### Gradient Magnitude Similarity Deviation: A Highly Efficient Perceptual Image Quality Index(1308.3052)

Nov. 26, 2013 cs.CV
It is an important task to faithfully evaluate the perceptual quality of output images in many applications such as image compression, image restoration and multimedia streaming. A good image quality assessment (IQA) model should not only deliver high quality prediction accuracy but also be computationally efficient. The efficiency of IQA metrics is becoming particularly important due to the increasing proliferation of high-volume visual data in high-speed networks. We present a new effective and efficient IQA model, called gradient magnitude similarity deviation (GMSD). The image gradients are sensitive to image distortions, while different local structures in a distorted image suffer different degrees of degradations. This motivates us to explore the use of global variation of gradient based local quality map for overall image quality prediction. We find that the pixel-wise gradient magnitude similarity (GMS) between the reference and distorted images combined with a novel pooling strategy the standard deviation of the GMS map can predict accurately perceptual image quality. The resulting GMSD algorithm is much faster than most state-of-the-art IQA methods, and delivers highly competitive prediction accuracy.
• ### Extracting respiratory signals from thoracic cone beam CT projections(1210.7735)

Dec. 7, 2012 physics.med-ph
Patient respiratory signal associated with the cone beam CT (CBCT) projections is important for lung cancer radiotherapy. In contrast to monitoring an external surrogate of respiration, such signal can be extracted directly from the CBCT projections. In this paper, we propose a novel local principle component analysis (LPCA) method to extract the respiratory signal by distinguishing the respiration motion-induced content change from the gantry rotation-induced content change in the CBCT projections. The LPCA method is evaluated by comparing with three state-of-the-art projection-based methods, namely, the Amsterdam Shroud (AS) method, the intensity analysis (IA) method, and the Fourier-transform based phase analysis (FT-p) method. The clinical CBCT projection data of eight patients, acquired under various clinical scenarios, were used to investigate the performance of each method. We found that the proposed LPCA method has demonstrated the best overall performance for cases tested and thus is a promising technique for extracting respiratory signal. We also identified the applicability of each existing method.
• ### Breaking a chaos-noise-based secure communication scheme(nlin/0407052)

Sept. 13, 2005 nlin.CD, cs.CR
This paper studies the security of a secure communication scheme based on two discrete-time intermittently-chaotic systems synchronized via a common random driving signal. Some security defects of the scheme are revealed: 1) the key space can be remarkably reduced; 2) the decryption is insensitive to the mismatch of the secret key; 3) the key-generation process is insecure against known/chosen-plaintext attacks. The first two defects mean that the scheme is not secure enough against brute-force attacks, and the third one means that an attacker can easily break the cryptosystem by approximately estimating the secret key once he has a chance to access a fragment of the generated keystream. Yet it remains to be clarified if intermittent chaos could be used for designing secure chaotic cryptosystems.
• ### On the Security of the Yi-Tan-Siew Chaos-Based Cipher(cs/0402054)

Dec. 1, 2004 nlin.CD, cs.CR, cs.PF
This paper presents a comprehensive analysis on the security of the Yi-Tan-Siew chaotic cipher proposed in [IEEE TCAS-I 49(12):1826-1829 (2002)]. A differential chosen-plaintext attack and a differential chosen-ciphertext attack are suggested to break the sub-key K, under the assumption that the time stamp can be altered by the attacker, which is reasonable in such attacks. Also, some security Problems about the sub-keys $\alpha$ and $\beta$ are clarified, from both theoretical and experimental points of view. Further analysis shows that the security of this cipher is independent of the use of the chaotic tent map, once the sub-key $K$ is removed via the proposed suggested differential chosen-plaintext attack.
• ### Baptista-type chaotic cryptosystems: Problems and countermeasures(cs/0402004)

Nov. 3, 2004 nlin.CD, cs.CR
In 1998, M. S. Baptista proposed a chaotic cryptosystem, which has attracted much attention from the chaotic cryptography community: some of its modifications and also attacks have been reported in recent years. In [Phys. Lett. A 307 (2003) 22], we suggested a method to enhance the security of Baptista-type cryptosystem, which can successfully resist all proposed attacks. However, the enhanced Baptista-type cryptosystem has a nontrivial defect, which produces errors in the decrypted data with a generally small but nonzero probability, and the consequent error propagation exists. In this Letter, we analyze this defect and discuss how to rectify it. In addition, we point out some newly-found problems existing in all Baptista-type cryptosystems and consequently propose corresponding countermeasures.