A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Color Zero-Watermarking Algorithm for Medical Images Based on BEMD-Schur Decomposition and Color Visual Cryptography
2021
Security and Communication Networks
In order to effectively solve the poor robustness problem of traditional zero-watermarking under large-scale attacks, a color zero-watermarking algorithm for medical images based on bidimensional empirical ...
Compared with similar zero-watermarking algorithms, the robust performance is improved by about 10%, and it can adapt to more complex network environments. ...
[14] proposed a medical image zero-watermarking algorithm based on logistic chaotic mapping and quaternion polar coordinate transformation. ...
doi:10.1155/2021/7081194
fatcat:urjyfa2hmzdhnijsknyndaypsq
New Color Image Zero-Watermarking Using Orthogonal Multi-Channel Fractional-Order Legendre-Fourier Moments
2021
IEEE Access
Then, based on the selected accurate MFrLFMs moments, a zero-watermark is constructed. ...
Due to their accuracy, geometric invariances, and numerical stability, the proposed MFrLFMs-based zero-watermarking method shows excellent resistance against various attacks. ...
Later, researchers exploited polar complex exponential transforms (PCETs) and logistic maps to present an algorithm for zero-watermarking [23] . ...
doi:10.1109/access.2021.3091614
fatcat:hoxhbcoivfdndaegyg35whckte
Hybrid watermarking algorithm using Clifford Algebra with Arnold Scrambling and Chaotic Encryption
2020
IEEE Access
To improve the security of watermark information and embedding positions and improve the algorithm's robustness against various attacks, a Quaternion Fourier transform (QFT) based algorithm, based on Arnold ...
The robustness and quality of the proposed watermarking algorithm is tested with different with many statistical measures. ...
In another work, they [45] presented medical image watermarking scheme based on Polar Complex Exponential Transform (PCET) and quaternion PCET (QPCET) for both gray-level and color medical images, respectively ...
doi:10.1109/access.2020.2988298
fatcat:dio7wd2dlza4haypwdewyulnrq
A novel zero-watermarking scheme based on variable parameter chaotic mapping in NSPD-DCT domain
2020
IEEE Access
In this paper, a novel image zero-watermarking scheme against rotation attacks is proposed based on nonsubsampled pyramid decomposition (NSPD) and discrete cosine transform (DCT). ...
INDEX TERMS Discrete cosine transform, nonsubsampled pyramid decomposition, rotation attacks, variable parameter chaotic mapping, zero-watermarking. ...
[47] introduced a zero-watermarking algorithm against geometric attacks based on polar complex exponential transform (PCET) and logistic mapping (LM). ...
doi:10.1109/access.2020.3004841
fatcat:6xpyrs6fdfcwlfosar6qzcrzca
The use of polar harmonic transformations in the development of methods for robust image watermarking
ИСПОЛЬЗОВАНИЕ ПОЛЯРНЫХ ГАРМОНИЧЕСКИХ ПРЕОБРАЗОВАНИЙ ПРИ РАЗРАБОТКЕ МЕТОДОВ МАРКИРОВАНИЯ ИЗОБРАЖЕНИЙ РОБАСТНЫМ ЦИФРОВЫМ ВОДЯНЫМ ЗНАКОМ
2021
Bezopasnostʹ Informacionnyh Tehnologij
ИСПОЛЬЗОВАНИЕ ПОЛЯРНЫХ ГАРМОНИЧЕСКИХ ПРЕОБРАЗОВАНИЙ ПРИ РАЗРАБОТКЕ МЕТОДОВ МАРКИРОВАНИЯ ИЗОБРАЖЕНИЙ РОБАСТНЫМ ЦИФРОВЫМ ВОДЯНЫМ ЗНАКОМ
Zhang Robust zero-watermarking algorithm based on polar complex
exponential transform and logistic mapping. Multimedia Tools and Applications 76(24). 2017. ...
Zhang Robust zero-watermarking algorithm based on polar complex
exponential transform and logistic mapping. Multimedia Tools and Applications 76(24). 2017. ...
doi:10.26583/bit.2021.4.07
fatcat:gkrbuq7ewrgmrj4guhvfymht3a
Digital Image Watermarking Techniques: A Review
2020
Information
Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern. ...
However, it is tough to achieve a watermarking system that is simultaneously robust and secure. ...
Hence, to resist geometric attacks, a multi-watermarking algorithm has been proposed for medical images, based on dual-tree complex wavelet transform (DTCWT), DCT and a Henon Map [113] . ...
doi:10.3390/info11020110
fatcat:nzo5ex2a3ves3hfjycmlgesf3q
A hash-based image encryption algorithm
2010
Optics Communications
One of the merits of such an algorithm is to force a continuous tone payload, a steganographic term, to map onto a balanced bits distribution sequence. ...
This bit balance is needed in certain applications, such as steganography and watermarking, since it is likely to have a balanced perceptibility effect on the cover image when embedding. ...
Note that nested transforms are not scant in the literature, for example O'Ruanaidh and Pun [38] used FFT followed by log-polar mapping and FFT to embed a watermark. ...
doi:10.1016/j.optcom.2009.10.106
fatcat:snhermocozgtdka54tzbhon62q
Computational Intelligence in Multimedia Processing: Foundation and Trends
[chapter]
2008
Studies in Computational Intelligence
A review of the current literature on CI based approaches to various problems in multimedia computing such as speech, audio and image processing, video watermarking, content-based multimedia indexing and ...
This chapter presents a broad overview of Computational Intelligence (CI) techniques including Neural Network (NN), Particle Swarm Optimization (PSO), Evolutionary Algorithm (GA), Fuzzy Set (FS), and Rough ...
Lingras [70] described modifications of clustering based on Genetic Algorithms, K-means algorithm, and Kohonen Self-Organizing Maps (SOM). ...
doi:10.1007/978-3-540-76827-2_1
fatcat:7jl4ir66vvcl7g436ektwkqwpy
Association of Moving Objects Across Visual Sensor Networks
2012
Journal of Multimedia
According to one dimension Logistic map , it can define two dimension Logistic map: are two dimension Logistic map which have first-order coupling item [6] , the mapping type is: (2) Controls parameter ...
The usual chaos dynamic systems have Logistic map, Lonenr, Rossler, Chen's System etc [6] , and Logistic map system is a scattered chaos system, which is simple and practical, its one-dimensional form ...
Abstract-This paper proposes an OWL-S framework for distributed CAD system based on the combination of semantic web service and CAD technology. ...
doi:10.4304/jmm.7.1.2-8
fatcat:4cc7sala7ffixohi3ccvothajm
[Front matter]
2021
2021 IEEE International Conference on Recent Advances in Systems Science and Engineering (RASSE)
Ladies and gentlemen. 各位贵宾,你们好! Welcome to the IEEE International Conference on Recent Advances in Systems Science and Engineering (RASSE) 2021. ...
, to discuss industrial practice, and to define the future research topics in all aspects of systems science and engineering. ...
Based on the dot product attention, we remove the weight matrices to reduce the memory cost and improve the robustness of the model. ...
doi:10.1109/rasse53195.2021.9686921
fatcat:n2xwqdbi35a3ngqc5nh7mx4ttu
Biometric Cryptosystem to Secure Smart Object Communications in the Internet of Things
2021
Maǧallaẗ Al-Kuwayt li-l-ʿulūm
As a result, in this paper, we proposed a secure IoT framework based on cloud computing. ...
The user message is then encrypted using the AES algorithm, while the user template is encrypted by a proposed algorithm. ...
Digital image security: Fusion of encryption, steganography and watermarking, In: International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, no. 5. ...
doi:10.48129/kjs.11169
fatcat:p36kh6bbtba2paux4sphhkhp3u
Contents
2011
Procedia Engineering
, Rui Zhao and Meijian Li . .
2444
Adaptive Targets-Detecting Algorithm based on LBP and Background Modeling under Complex ScenesYingying Yue, Zhenzhou An and Hong Wu . .
2484
Multiuser Detection ...
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2113 Research on Power Information Encryption Algorithm based on Composite Chaotic System in Wavelet Transform Domain Li Xiaoming and Yun Zhao. ...
Monte Carlo Simulation of Energy Distribution of Radiation Field Liu Yi, Chen Xiao-Bai and Wang Chun- Yan . . 3330 An Improved Association Rules Algorithm based on Frequent Item Sets Yaqiong Jiang ...
doi:10.1016/s1877-7058(11)04811-9
fatcat:adrkzzediretxma23pbeqmltvu
Sliding bifurcations in resonant inverters
2017
2017 14th International Multi-Conference on Systems, Signals & Devices (SSD)
Finally, we apply a state feedback control, which guarantees a quasi-exponential stabilization to all the system states, which in turn converge exponentially to zero. ...
In this paper, we held a fair comparative study between the LMMN and a number of the LMS-based algorithms, such as the LMS algorithm, the zero-attracting (ZA-LMS) algorithm, and the normalized (NLMS) algorithm ...
doi:10.1109/ssd.2017.8167001
dblp:conf/IEEEssd/PonceBAM17
fatcat:6lbol63imjffhezjv6yc6cnheu
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
[chapter]
2022
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
Chronic Diseases are the most dangerous diseases for humans and have significant effects on human life. Chronic Diseases like heart disease & Diabetes are the main causes of death. ...
Precise diagnosis of these diseases on time is very significant for maintaining a healthy life. ...
The region-based segmentation will segment the data dependent on the taken-out features using GLCM algorithm. ...
doi:10.13052/rp-9788770227667
fatcat:da47mjbbyzfwnbpde7rgbrlppe
A Chaos-Based Video Watermarking Algorithm $
2012
unpublished
Embedding locations are selected based on certain principles. ...
Experimental results demonstrate that our proposed watermarking method is highly superior to other techniques reported in literature and readily achieves the desired robustness and security level. ...
In this method, watermark is hidden in a chaotic structure and the watermarking method is performed based on the bit-zero watermarking algorithm [26] . ...
fatcat:kbnpcxdeu5edplimo2shjabmly
« Previous
Showing results 1 — 15 out of 38 results