{"title":"TJCMNet: An Efficient Vision-Text Joint Identity Clues Mining Network for Visible-Infrared Person Re-Identification","authors":"ZhuXuan Cheng;ZhiJia Zhang;Huijie Fan;XingQi Na","doi":"10.1109/LSP.2025.3556784","DOIUrl":"https://doi.org/10.1109/LSP.2025.3556784","url":null,"abstract":"Retrieving images for Visible-Infrared Person Re-identification task is challenging, because of the huge modality discrepancy caused by the different imaging principle of RGB and infrared cameras. Existing approaches rely on seeking distinctive information within unified visual feature space, ignoring the stable identity information brought by textual description. To overcome these problems, this letter propose a novel Text-vision Joint Clue Mining (TJCM) network to aggregate vision and text features, then distill the joint knowledge for enhancing the modality-shared branch. Specifically, we first extract modality-shared and textual features using a parameter-shared vision encoder and a text encoder. Then, a text-vision co-refinement module is proposed to refine the implicit information within vision feature and text feature, then aggregate them into joint feature. Finally, introduce the heterogeneous distillation alignment loss provides enhancement for modality-shared feature through joint knowledge distillation at feature-level and logit-level. Our TJCMNet achieves significant improvements over the state-of-the-art methods on three mainstream datasets.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1615-1619"},"PeriodicalIF":3.2,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143871028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature Bank-Guided Reconstruction for Anomaly Detection","authors":"Sihan He;Tao Zhang;Wei Song;Hongbin Yu","doi":"10.1109/LSP.2025.3555544","DOIUrl":"https://doi.org/10.1109/LSP.2025.3555544","url":null,"abstract":"Visual surface anomaly detection targets the location of anomalies, with numerous methods available to address the challenge. Reconstruction-based methods are popular for their adaptability and interpretability. However, reconstruction-based methods currently struggle with the challenge of achieving low image fidelity and a tendency to reconstruct anomalies. To overcome these challenges, we introduces the Feature Bank-guided Reconstruction method (FBR), incorporating three innovative modules: anomaly simulation, feature bank module, and a cross-fused Discrete Cosine Transform channel attention module. Guided by these modules, our method is capable of reconstructing images with enhanced robustness. The experimental results validate the effectiveness of the proposed approach, which not only achieves outstanding performance on the BeanTech AD dataset with an 96.4% image-AUROC and a 97.3% pixel-AUROC, but also demonstrates competitive performance on the MVTec AD dataset with a 99.5% image-AUROC and a 98.3% pixel-AUROC.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1480-1484"},"PeriodicalIF":3.2,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143809016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Wireless Communications via Frequency Diverse Arrays","authors":"Zhenqiao Cheng;Chongjun Ouyang;Xingqi Zhang","doi":"10.1109/LSP.2025.3575330","DOIUrl":"https://doi.org/10.1109/LSP.2025.3575330","url":null,"abstract":"A novel frequency diverse array (FDA)-assisted secure transmission framework is proposed, which leverages additional frequency offsets to enhance physical layer security. Specifically, an FDA-assisted wiretap channel is considered, where the transmit beamforming and frequency offsets at each antenna are jointly optimized. A novel alternating optimization-based method is introduced to address the non-convex problem of secure transmission, focusing on minimizing transmit power and maximizing the secrecy rate. Numerical results are provided to demonstrate the superiority of the FDA-based framework compared to systems employing traditional phased array antennas in secure transmission.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"2319-2323"},"PeriodicalIF":3.2,"publicationDate":"2025-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianhong Chu;Zhi Zhang;Chengjin Kang;Min Liang;Zhe Fu
{"title":"Reducing Mutual Coupling in Circular Motion-Based DOA Estimation: An Iterative Array Configuration Method","authors":"Jianhong Chu;Zhi Zhang;Chengjin Kang;Min Liang;Zhe Fu","doi":"10.1109/LSP.2025.3575018","DOIUrl":"https://doi.org/10.1109/LSP.2025.3575018","url":null,"abstract":"Mutual coupling (MC) has a severe effect on the direction-of-arrival (DOA) estimation and even leads to estimation failures. The emerging array motion techniques, which construct flexible virtual arrays with larger apertures by moving an initial array and combining phase-corrected signals sampled at designed time delays, have shown potential in mitigating the effect of MC by constructing virtual sensors. However, the virtual array remains susceptible to MC. To handle this problem, in this letter, a general synthetic signal model with MC is derived and an iterative method on the array configuration is proposed to form a virtual array with less MC for the circular motion-based DOA estimation. Specifically, a virtual uniform concentric circular array (VUCCA) is constructed by synthesizing all the observations at different time delays with uniform spacing, and the equation between MC matrix of the VUCCA and the initial array is derived, proving that the MC of VUCCA is solely related to the configuration of initial array. Thus, an iterative method is proposed to yield an optimal configuration with less MC by minimizing the norm close with MC. A higher degree-of-freedom and better estimation accuracy are achieved effectively.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"2314-2318"},"PeriodicalIF":3.2,"publicationDate":"2025-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Motion Intent Analysis-Based Full-Frame Video Stabilization","authors":"Yu Zhang;Pengcheng Guo;Moran Ju;Qing Hu","doi":"10.1109/LSP.2025.3555492","DOIUrl":"https://doi.org/10.1109/LSP.2025.3555492","url":null,"abstract":"Video stabilization aims to eliminate random jitter in video sequences, but most methods result in stabilized video with degraded resolution and content loss. In this letter, we propose a full-frame video stabilization algorithm based on motion intent analysis. The algorithm consists of three main steps: motion estimation, motion smoothing, and video completion. First, robust keypoints are extracted using the improved SuperPoint network and refined with the suppression via square covering (SSC) algorithm to obtain stable and reliable keypoints. Then, the Lucas-Kanade algorithm is applied for motion estimation of inter-frame matched feature points. Second, motion smoothing is achieved using the Kalman filtering algorithm to remove the high-frequency jitter component from the trajectory, and motion compensation is applied to the original video sequence to generate a stable image sequence. Finally, to preserve the original video resolution, we propose a video completion method based on motion intent analysis. Experimental results demonstrate that our method achieves higher stability while maintaining the original video resolution compared to the current state-of-the-art video stabilization algorithms.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1685-1689"},"PeriodicalIF":3.2,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143913472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transient Segment Detection Based on Energy Spectrum Coefficient Entropy Posterior Probability Density","authors":"Jingbo Zhang;Rongwen Lin;Qingshuo Liu","doi":"10.1109/LSP.2025.3555421","DOIUrl":"https://doi.org/10.1109/LSP.2025.3555421","url":null,"abstract":"In wireless communication devices, the power envelope during the transient segment of energy-limited pulse signals effectively captures the physical characteristics of the radio frequency circuit. This unique signature can serve as a radio frequency fingerprinting, enhancing the security of the wireless communication system. A key issue in this context is accurately detecting transient signals. The existing detection algorithms can only detect the start time of transient segments, making them unable to characterize the complete transient segments. This study proposes a transient segment detection algorithm based on energy spectral coefficient entropy posterior probability density (ESCE-PPD), which can simultaneously estimate the start and end time of transient segments without relying on prior information. The effectiveness of the proposed algorithm is verified using an open source Bluetooth dataset, and its performance is compared with existing algorithms. The results demonstrate that the ESCE-PPD algorithm adds the capability to detect the end time of transient segments without increasing computational complexity and reducing anti-noise performance.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1505-1509"},"PeriodicalIF":3.2,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143830478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Alternating Offer-Based Payment Allocation for Privacy Non-Disclosure in Federated Learning","authors":"Suyeon Jin;Chaeyeon Cha;Hyunggon Park","doi":"10.1109/LSP.2025.3555386","DOIUrl":"https://doi.org/10.1109/LSP.2025.3555386","url":null,"abstract":"In federated learning (FL), it is essential to implement a payment allocation mechanism that compensates clients for the costs incurred from participating in FL tasks. In this letter, we formulate the payment allocation as a bargaining game between a global server and clients and adopt the Nash bargaining solution (NBS) to achieve optimal and fair payment assignments among clients. Unlike existing payment allocation mechanisms that require the disclosure of private information from the clients, the proposed approach ensures privacy non-disclosure for bargaining. The key idea is to decompose the one-to-many bargaining game into independent one-to-one bargaining games and use alternating-offers, which do not require the disclosure of private information from clients. We design an alternating-offers strategy and acceptance criteria to ensure fair agreements without the private information of clients. Simulation results show that the proposed payment allocation strategy can fairly allocate payments to clients while maintaining the accuracy of the global server in FL tasks.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1500-1504"},"PeriodicalIF":3.2,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143830477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geometry-Aware RWKV for Heterogeneous Light Field Spatial Super-Resolution","authors":"Zean Chen;Yeyao Chen;Linwei Zhu;Haiyong Xu;Gangyi Jiang","doi":"10.1109/LSP.2025.3555445","DOIUrl":"https://doi.org/10.1109/LSP.2025.3555445","url":null,"abstract":"Heterogeneous Light Field (LF) spatial Super-Resolution (SR) aims to significantly enhance the spatial resolution of LF imaging by integrating an extra 2D digital camera. Inspired by the Receptance Weighted Key Value (RWKV), a simple yet effective heterogeneous LF spatial SR method is proposed. Specifically, a texture transfer module with channel correlation is designed, which leverages a feature distillation strategy to transfer texture information from the high-resolution 2D image to the low-resolution LF image. Meanwhile, a spatial-angular rectification module is constructed to restore the spatial-angular coherence damaged in texture transfer. It employs geometry-aware RWKV to capture the intrinsic geometric structure of LFs. Experimental results show that the proposed method outperforms the state-of-the-art methods in both quantitative and qualitative comparisons, while achieving higher efficiency in terms of inference time and memory usage.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1795-1799"},"PeriodicalIF":3.2,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143925253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Watermark Removal Attack Against Text-to-Image Generative Model Watermarking","authors":"Zihan Yuan;Li Li;Zichi Wang;Jingyuan Jiang;Xinpeng Zhang","doi":"10.1109/LSP.2025.3554514","DOIUrl":"https://doi.org/10.1109/LSP.2025.3554514","url":null,"abstract":"The artist's style can be quickly imitated by fine-tuning a text-to-image model using artist's artworks, which raises serious copyright concerns. Scholars have proposed many watermarking methods to protect the artists' copyright. To evaluate the security and enhance the performance of existing watermarking, this paper proposes a watermark removal attack for text-to-image generative model watermarking for the first time. This attack aims to invalidate watermarking designed to detect art theft mimicry in text-to-image models. In this method, a watermark recognition network and a watermark removal network are designed. The watermark recognition network identifies whether an artwork contains watermark, and the watermark removal network is used to remove it. Consequently, text-to-image models fine-tuned with watermark-removed artworks can reproduce an artist's style while evading watermark detection. This makes the copyright authentication of artworks ineffective. Experiments show that the proposed attack can effectively remove watermarks, with watermark extraction accuracy dropping below 48.64%. Additionally, the images after watermark removal retain high similarity to the original images, with PSNR exceeding 27.96 and SSIM exceeding 0.92.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1470-1474"},"PeriodicalIF":3.2,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143809027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Multi-Class Token Vision Transformer Convolutional Network for DOA Estimation","authors":"Yuxuan Xie;Aifei Liu;Xinyu Lu;Dufei Chong","doi":"10.1109/LSP.2025.3573949","DOIUrl":"https://doi.org/10.1109/LSP.2025.3573949","url":null,"abstract":"In this letter, we propose an efficient hybrid model, named HMC-ViT, that combines a convolutional neural network (CNN) with a multi-class token vision transformer (ViT) to address the problem of direction of arrival (DOA) estimation. HMC-ViT integrates the local feature extraction capability of CNN with the global feature extraction capability of ViT to enhance DOA estimation performance and improve the computational efficiency of ViT. Additionally, the ViT component employs multiple class tokens in parallel to generate spatial spectra for sub-regions, further enhancing the model's performance. Simulation results demonstrate that the proposed method outperforms existing approaches under low signal-to-noise ratio (SNR) scenarios.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"2279-2283"},"PeriodicalIF":3.2,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144243814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}