121 research outputs found

    DragonDiffusion: Enabling Drag-style Manipulation on Diffusion Models

    Full text link
    Despite the ability of existing large-scale text-to-image (T2I) models to generate high-quality images from detailed textual descriptions, they often lack the ability to precisely edit the generated or real images. In this paper, we propose a novel image editing method, DragonDiffusion, enabling Drag-style manipulation on Diffusion models. Specifically, we construct classifier guidance based on the strong correspondence of intermediate features in the diffusion model. It can transform the editing signals into gradients via feature correspondence loss to modify the intermediate representation of the diffusion model. Based on this guidance strategy, we also build a multi-scale guidance to consider both semantic and geometric alignment. Moreover, a cross-branch self-attention is added to maintain the consistency between the original image and the editing result. Our method, through an efficient design, achieves various editing modes for the generated or real images, such as object moving, object resizing, object appearance replacement, and content dragging. It is worth noting that all editing and content preservation signals come from the image itself, and the model does not require fine-tuning or additional modules. Our source code will be available at https://github.com/MC-E/DragonDiffusion

    DiffEditor: Boosting Accuracy and Flexibility on Diffusion-based Image Editing

    Full text link
    Large-scale Text-to-Image (T2I) diffusion models have revolutionized image generation over the last few years. Although owning diverse and high-quality generation capabilities, translating these abilities to fine-grained image editing remains challenging. In this paper, we propose DiffEditor to rectify two weaknesses in existing diffusion-based image editing: (1) in complex scenarios, editing results often lack editing accuracy and exhibit unexpected artifacts; (2) lack of flexibility to harmonize editing operations, e.g., imagine new content. In our solution, we introduce image prompts in fine-grained image editing, cooperating with the text prompt to better describe the editing content. To increase the flexibility while maintaining content consistency, we locally combine stochastic differential equation (SDE) into the ordinary differential equation (ODE) sampling. In addition, we incorporate regional score-based gradient guidance and a time travel strategy into the diffusion sampling, further improving the editing quality. Extensive experiments demonstrate that our method can efficiently achieve state-of-the-art performance on various fine-grained image editing tasks, including editing within a single image (e.g., object moving, resizing, and content dragging) and across images (e.g., appearance replacing and object pasting). Our source code is released at https://github.com/MC-E/DragonDiffusion

    Large-capacity and Flexible Video Steganography via Invertible Neural Network

    Full text link
    Video steganography is the art of unobtrusively concealing secret data in a cover video and then recovering the secret data through a decoding protocol at the receiver end. Although several attempts have been made, most of them are limited to low-capacity and fixed steganography. To rectify these weaknesses, we propose a Large-capacity and Flexible Video Steganography Network (LF-VSN) in this paper. For large-capacity, we present a reversible pipeline to perform multiple videos hiding and recovering through a single invertible neural network (INN). Our method can hide/recover 7 secret videos in/from 1 cover video with promising performance. For flexibility, we propose a key-controllable scheme, enabling different receivers to recover particular secret videos from the same cover video through specific keys. Moreover, we further improve the flexibility by proposing a scalable strategy in multiple videos hiding, which can hide variable numbers of secret videos in a cover video with a single model and a single training session. Extensive experiments demonstrate that with the significant improvement of the video steganography performance, our proposed LF-VSN has high security, large hiding capacity, and flexibility. The source code is available at https://github.com/MC-E/LF-VSN.Comment: Accepted by CVPR 202

    Neural Video Fields Editing

    Full text link
    Diffusion models have revolutionized text-driven video editing. However, applying these methods to real-world editing encounters two significant challenges: (1) the rapid increase in GPU memory demand as the number of frames grows, and (2) the inter-frame inconsistency in edited videos. To this end, we propose NVEdit, a novel text-driven video editing framework designed to mitigate memory overhead and improve consistent editing for real-world long videos. Specifically, we construct a neural video field, powered by tri-plane and sparse grid, to enable encoding long videos with hundreds of frames in a memory-efficient manner. Next, we update the video field through off-the-shelf Text-to-Image (T2I) models to impart text-driven editing effects. A progressive optimization strategy is developed to preserve original temporal priors. Importantly, both the neural video field and T2I model are adaptable and replaceable, thus inspiring future research. Experiments demonstrate the ability of our approach to edit hundreds of frames with impressive inter-frame consistency. Our project is available at: https://nvedit.github.io/

    T2I-Adapter: Learning Adapters to Dig out More Controllable Ability for Text-to-Image Diffusion Models

    Full text link
    The incredible generative ability of large-scale text-to-image (T2I) models has demonstrated strong power of learning complex structures and meaningful semantics. However, relying solely on text prompts cannot fully take advantage of the knowledge learned by the model, especially when flexible and accurate structure control is needed. In this paper, we aim to ``dig out" the capabilities that T2I models have implicitly learned, and then explicitly use them to control the generation more granularly. Specifically, we propose to learn simple and small T2I-Adapters to align internal knowledge in T2I models with external control signals, while freezing the original large T2I models. In this way, we can train various adapters according to different conditions, and achieve rich control and editing effects. Further, the proposed T2I-Adapters have attractive properties of practical value, such as composability and generalization ability. Extensive experiments demonstrate that our T2I-Adapter has promising generation quality and a wide range of applications.Comment: Tech Report. GitHub: https://github.com/TencentARC/T2I-Adapte

    Impact of ovarian preservation in women with endometrial cancer

    Get PDF
    AbstractBackgroundBilateral salpingo-oophorectomy (BSO) is standardly performed in the treatment of endometrial cancer. The purpose of this study was to evaluate the impact of ovarian preservation on the outcome of patients with endometrial cancer.MethodsA retrospective cohort study was performed using the 2000–2010 database of endometrial cancer patients who were treated at Taipei Veterans General Hospital. Information regarding patient age, pathologic reports, and follow-up results was abstracted from medical records.ResultsFive hundred and twenty-nine patients were reviewed in this study. Mean age and follow-up duration were 55.7 ± 11.4 years and 37.5 ± 30.1 months, respectively. The median disease-free survival was 31.2 months (range 0.2–126.9 months). There were no significant differences in disease-free survival between stage I patients with ovarian preservation versus those with oophorectomy (p = 0.473). In a multivariate Cox model, ovarian preservation had no effect on disease-free survival [hazard ratio (HR) = 2.72; 95% confidence interval (CI), 0.48–15.59]; however, it was not significantly related to stage and para-aortic lymph node involvement.ConclusionOvarian preservation may be considered in premenopausal women with early-stage low-risk endometrial cancer

    The Effect of the Irreversible Inequality on Pro-social Behaviors of People With Disabilities

    Get PDF
    Inequalities have always been central to psychology, sociology and related fields such as social policy, gender studies, critical race studies, and human geography. Although inequality affects pro-social behaviors, there are still some controversies over this issue among people with disabilities. The current study aimed to investigate pro-social behaviors of people with disabilities and the effect of the irreversible inequality on pro-social behaviors. A dictator game was used to explore the difference of pro-social behaviors between people with disabilities and people without disabilities, when facing intra- or inter-group members. The results showed that compared to people with disabilities, people without disabilities were likely to show more pro-social behaviors. People with disabilities preferred intra-group cooperation, while people without disabilities preferred inter-group cooperation. Indeed, the intra-group cooperation was significantly greater than the expected cooperation of the intra-group members for people with disabilities. When facing the inter-group members, people without disabilities showed more than expected, that others would cooperate with them. These findings indicated that social avoidance was a common phenomenon for people with disabilities in China, but the situation would be different when they faced different groups. In addition, irreversible inequality could influence individuals’ cooperative strategies when facing individuals in a different status

    Regulatory T Cells: Potential Target in Anticancer Immunotherapy

    Get PDF
    SummaryThe concept of regulatory T cells was first described in the early 1970s, and regulatory T cells were called suppressive T cells at that time. Studies that followed have demonstrated that these suppressive T cells negatively regulated tumor immunity and contributed to tumor growth in mice. Despite the importance of these studies, there was extensive skepticism about the existence of these cells, and the concept of suppressive T cells left the center stage of immunologic research for decades. Interleukin-2 receptor α-chain, CD25, was first demonstrated in 1995 to serve as a phenotypic marker for CD4+ regulatory cells. Henceforth, research of regulatory T cells boomed. Regulatory T cells are involved in the pathogenesis of cancer, autoimmune disease, transplantation immunology, and immune tolerance in pregnancy. Recent evidence has demonstrated that regulatory T cellmediated immunosuppression is one of the crucial tumor immune evasion mechanisms and the main obstacle of successful cancer immunotherapy. The mechanism and the potential clinical application of regulatory T cells in cancer immunotherapy are discussed
    • …
    corecore