Loading [MathJax]/extensions/MathMenu.js
Young Kyun Jang - IEEE Xplore Author Profile

Showing 1-10 of 10 results

Results

Deep hashing aims to produce discriminative binary hash codes for fast image retrieval through a deep baseline network and additional trainable hash function. In a supervised deep hashing network, the baseline network is generally initialized with classification-based pretrained models, and the overall hashing network is trained in a supervised fashion. However, since classification and retrieval ...Show More
Recent learning-based lossless image compression methods encode an image in the unit of subimages and achieve comparable performances to conventional non-learning algorithms. However, these methods do not consider the performance drop in the high-frequency region, giving equal consideration to the low and high-frequency areas. In this paper, we propose a new lossless image compression method that ...Show More
Multi-exposure high dynamic range (HDR) imaging aims to generate an HDR image from multiple differently exposed low dynamic range (LDR) images. It is a challenging task due to two major problems: (1) there are usually misalignments among the input LDR images, and (2) LDR images often have incomplete information due to under-/over-exposure. In this paper, we propose a disentangled feature-guided HD...Show More
Supervised deep learning-based hash and vector quantization are enabling fast and large-scale image retrieval systems. By fully exploiting label annotations, they are achieving outstanding retrieval performances compared to the conventional methods. However, it is painstaking to assign labels precisely for a vast amount of training data, and also, the annotation process is error-prone. To tackle t...Show More
This paper presents a lossless image compression method based on the image decomposition and progressive prediction of decomposed images and their coding contexts using convolutional neural networks (CNNs). We first decompose a given input into sub-images by sub-sampling into horizontal and vertical directions. The first sub-image is encoded by an existing non-learning lossless compressor, and the...Show More
This paper presents a new lossless image compression method based on the learning of pixel values and contexts through multilayer perceptrons (MLPs). The prediction errors and contexts obtained by MLPs are forwarded to adaptive arithmetic encoders, like the conventional lossless compression schemes. The MLP-based prediction has long been attempted for lossless compression, and recently convolution...Show More
This paper presents a channel-wise progressive coding system for lossless compression of color images. We follow the classical lossless compression scheme of LOCO-I and CALIC, where pixel values and coding contexts are predicted and forwarded to the entropy coder for compression. The contribution is that we jointly estimate the pixel values and coding contexts from neighboring pixels by training a...Show More
Image retrieval methods that employ hashing or vector quantization have achieved great success by taking advantage of deep learning. However, these approaches do not meet expectations unless expensive label information is sufficient. To resolve this issue, we propose the first quantization-based semi-supervised image retrieval scheme: Generalized Product Quantization (GPQ) network. We design a nov...Show More
This letter presents a convolutional neural network (CNN) for image denoising, especially for the reduction of real noises. As a network topology, we adopt the dual path network (DPN) that combines the advantages of residual and densely connected networks. Using the DPN as a basic building block, we design a network that connects the DPN in dual path again with an attention mechanism. For efficien...Show More
This paper presents a cancelable biometric system for face authentication by exploiting the convolutional neural network (CNN)-based face image retrieval system. For the cancelable biometrics we must build a template that achieves good performance while maintaining some essential conditions. First the same template should not be used in different applications. Second if the compromise event occurs...Show More