{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T08:02:53Z","timestamp":1742803373687,"version":"3.37.3"},"reference-count":17,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,7,17]],"date-time":"2018-07-17T00:00:00Z","timestamp":1531785600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018,7,17]]},"abstract":"<jats:p>With the rapid development of Internet technology, images on the Internet are used in various aspects of people\u2019s lives. The security and authorization of images are strongly dependent on image quality. Some potential problems have also emerged, among which the quality assessment and denoising of images are particularly evident. This paper proposes a novel NR-IQA method based on the dual convolutional neural network structure, which combines saliency detection with the human visual system (HSV), used as a weighting function to reflect the important distortion caused by the local area. The model is trained using gray and color features in the HSV space. It is applied to the parameter selection of an image denoising algorithm. The experiment proves that our proposed method can accurately evaluate image quality in the process of denoising. It provides great help in parameter optimization iteration and improves the performance of the algorithm. Through experiments, we obtain both improved image quality and a reasonable result of subject assessment when the cascaded algorithm is applied in image security and authorization.<\/jats:p>","DOI":"10.1155\/2018\/8176984","type":"journal-article","created":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T13:46:52Z","timestamp":1531921612000},"page":"1-13","source":"Crossref","is-referenced-by-count":6,"title":["A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization"],"prefix":"10.1155","volume":"2018","author":[{"given":"Jianjun","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Hangzhou Dianzi University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8108-4829","authenticated-orcid":true,"given":"Jie","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Hangzhou Dianzi University, China"}]},{"given":"Lanlan","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Hangzhou Dianzi University, China"}]},{"given":"Xinying","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Hangzhou Dianzi University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":true,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taiwan"}]},{"given":"Xiaoyang","family":"Mao","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Media Engineering, University of Yamanashi, Kofu, Japan"}]},{"given":"Junfeng","family":"Hu","sequence":"additional","affiliation":[{"name":"Key Lab of Data Link, China Electronics Technology Group Corporation, Xi\u2019an, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.031"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.015"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2749977"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1037\/h0070288"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2601783"},{"issue":"2","key":"10","first-page":"91","volume":"18","year":"2017","journal-title":"Journal of Internet Technology"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2052820"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73603-7_31"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2214050"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1088\/0954-898X\/5\/4\/006"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1137\/040616024"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.901238"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(92)90242-F"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1137\/080725891"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1117\/1.3267105"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.854492"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2012.2191563"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/8176984.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/8176984.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/8176984.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T13:46:54Z","timestamp":1531921614000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/8176984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,17]]},"references-count":17,"alternative-id":["8176984","8176984"],"URL":"https:\/\/doi.org\/10.1155\/2018\/8176984","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2018,7,17]]}}}