Filters








38 Hits in 11.9 sec

Color Zero-Watermarking Algorithm for Medical Images Based on BEMD-Schur Decomposition and Color Visual Cryptography

Deyang Wu, Miaomiao Wang, Jing Zhao, Jiayan Wang, Meiyu Zhong, Haichun Zheng, Sen Hu, Yong Tang, Changbo Qu, Jinwei Wang
2021 Security and Communication Networks  
In order to effectively solve the poor robustness problem of traditional zero-watermarking under large-scale attacks, a color zero-watermarking algorithm for medical images based on bidimensional empirical  ...  Compared with similar zero-watermarking algorithms, the robust performance is improved by about 10%, and it can adapt to more complex network environments.  ...  [14] proposed a medical image zero-watermarking algorithm based on logistic chaotic mapping and quaternion polar coordinate transformation.  ... 
doi:10.1155/2021/7081194 fatcat:urjyfa2hmzdhnijsknyndaypsq

New Color Image Zero-Watermarking Using Orthogonal Multi-Channel Fractional-Order Legendre-Fourier Moments

Khalid M. Hosny, Mohamed M. Darwish, Mostafa M. Fouda
2021 IEEE Access  
Then, based on the selected accurate MFrLFMs moments, a zero-watermark is constructed.  ...  Due to their accuracy, geometric invariances, and numerical stability, the proposed MFrLFMs-based zero-watermarking method shows excellent resistance against various attacks.  ...  Later, researchers exploited polar complex exponential transforms (PCETs) and logistic maps to present an algorithm for zero-watermarking [23] .  ... 
doi:10.1109/access.2021.3091614 fatcat:hoxhbcoivfdndaegyg35whckte

Hybrid watermarking algorithm using Clifford Algebra with Arnold Scrambling and Chaotic Encryption

Uzair Aslam Bhatti, Linwang Yuan, Zhaoyuan Yu, JingBing Li, Saqib Ali Nawaz, Anum Mehmood, Kun Zhang
2020 IEEE Access  
To improve the security of watermark information and embedding positions and improve the algorithm's robustness against various attacks, a Quaternion Fourier transform (QFT) based algorithm, based on Arnold  ...  The robustness and quality of the proposed watermarking algorithm is tested with different with many statistical measures.  ...  In another work, they [45] presented medical image watermarking scheme based on Polar Complex Exponential Transform (PCET) and quaternion PCET (QPCET) for both gray-level and color medical images, respectively  ... 
doi:10.1109/access.2020.2988298 fatcat:dio7wd2dlza4haypwdewyulnrq

A novel zero-watermarking scheme based on variable parameter chaotic mapping in NSPD-DCT domain

Rui Wang, Shaocheng Han, Peng Zhang, Meng Yue, Zheng Cheng, Yujin Zhang
2020 IEEE Access  
In this paper, a novel image zero-watermarking scheme against rotation attacks is proposed based on nonsubsampled pyramid decomposition (NSPD) and discrete cosine transform (DCT).  ...  INDEX TERMS Discrete cosine transform, nonsubsampled pyramid decomposition, rotation attacks, variable parameter chaotic mapping, zero-watermarking.  ...  [47] introduced a zero-watermarking algorithm against geometric attacks based on polar complex exponential transform (PCET) and logistic mapping (LM).  ... 
doi:10.1109/access.2020.3004841 fatcat:6xpyrs6fdfcwlfosar6qzcrzca

The use of polar harmonic transformations in the development of methods for robust image watermarking
ИСПОЛЬЗОВАНИЕ ПОЛЯРНЫХ ГАРМОНИЧЕСКИХ ПРЕОБРАЗОВАНИЙ ПРИ РАЗРАБОТКЕ МЕТОДОВ МАРКИРОВАНИЯ ИЗОБРАЖЕНИЙ РОБАСТНЫМ ЦИФРОВЫМ ВОДЯНЫМ ЗНАКОМ

Alexey N. Shniperov, Valeriy A. Melnikov
2021 Bezopasnostʹ Informacionnyh Tehnologij  
Zhang Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping. Multimedia Tools and Applications 76(24). 2017.  ...  Zhang Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping. Multimedia Tools and Applications 76(24). 2017.  ... 
doi:10.26583/bit.2021.4.07 fatcat:gkrbuq7ewrgmrj4guhvfymht3a

Digital Image Watermarking Techniques: A Review

Mahbuba Begum, Mohammad Shorif Uddin
2020 Information  
Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern.  ...  However, it is tough to achieve a watermarking system that is simultaneously robust and secure.  ...  Hence, to resist geometric attacks, a multi-watermarking algorithm has been proposed for medical images, based on dual-tree complex wavelet transform (DTCWT), DCT and a Henon Map [113] .  ... 
doi:10.3390/info11020110 fatcat:nzo5ex2a3ves3hfjycmlgesf3q

A hash-based image encryption algorithm

Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt
2010 Optics Communications  
One of the merits of such an algorithm is to force a continuous tone payload, a steganographic term, to map onto a balanced bits distribution sequence.  ...  This bit balance is needed in certain applications, such as steganography and watermarking, since it is likely to have a balanced perceptibility effect on the cover image when embedding.  ...  Note that nested transforms are not scant in the literature, for example O'Ruanaidh and Pun [38] used FFT followed by log-polar mapping and FFT to embed a watermark.  ... 
doi:10.1016/j.optcom.2009.10.106 fatcat:snhermocozgtdka54tzbhon62q

Computational Intelligence in Multimedia Processing: Foundation and Trends [chapter]

Aboul-Ella Hassanien, Ajith Abraham, Janusz Kacprzyk, James F. Peters
2008 Studies in Computational Intelligence  
A review of the current literature on CI based approaches to various problems in multimedia computing such as speech, audio and image processing, video watermarking, content-based multimedia indexing and  ...  This chapter presents a broad overview of Computational Intelligence (CI) techniques including Neural Network (NN), Particle Swarm Optimization (PSO), Evolutionary Algorithm (GA), Fuzzy Set (FS), and Rough  ...  Lingras [70] described modifications of clustering based on Genetic Algorithms, K-means algorithm, and Kohonen Self-Organizing Maps (SOM).  ... 
doi:10.1007/978-3-540-76827-2_1 fatcat:7jl4ir66vvcl7g436ektwkqwpy

Association of Moving Objects Across Visual Sensor Networks

Muhammad J. Mirza, Nadeem Anjum
2012 Journal of Multimedia  
According to one dimension Logistic map , it can define two dimension Logistic map: are two dimension Logistic map which have first-order coupling item [6] , the mapping type is: (2) Controls parameter  ...  The usual chaos dynamic systems have Logistic map, Lonenr, Rossler, Chen's System etc [6] , and Logistic map system is a scattered chaos system, which is simple and practical, its one-dimensional form  ...  Abstract-This paper proposes an OWL-S framework for distributed CAD system based on the combination of semantic web service and CAD technology.  ... 
doi:10.4304/jmm.7.1.2-8 fatcat:4cc7sala7ffixohi3ccvothajm

[Front matter]

2021 2021 IEEE International Conference on Recent Advances in Systems Science and Engineering (RASSE)  
Ladies and gentlemen. 各位贵宾,你们好! Welcome to the IEEE International Conference on Recent Advances in Systems Science and Engineering (RASSE) 2021.  ...  , to discuss industrial practice, and to define the future research topics in all aspects of systems science and engineering.  ...  Based on the dot product attention, we remove the weight matrices to reduce the memory cost and improve the robustness of the model.  ... 
doi:10.1109/rasse53195.2021.9686921 fatcat:n2xwqdbi35a3ngqc5nh7mx4ttu

Biometric Cryptosystem to Secure Smart Object Communications in the Internet of Things

Abdallah Meraoumia, Mohammed Amroune, LAboratory of Mathematics, Informatics and Systems (LAMIS) University of Larbi Tebessi, Tebessa, ALGERIA, Lakhdar Laimech, Hakim Bendjenna, LAboratory of Mathematics, Informatics and Systems (LAMIS) University of Larbi Tebessi, Tebessa, ALGERIA, LAboratory of Mathematics, Informatics and Systems (LAMIS) University of Larbi Tebessi, Tebessa, ALGERIA
2021 Maǧallaẗ Al-Kuwayt li-l-ʿulūm  
As a result, in this paper, we proposed a secure IoT framework based on cloud computing.  ...  The user message is then encrypted using the AES algorithm, while the user template is encrypted by a proposed algorithm.  ...  Digital image security: Fusion of encryption, steganography and watermarking, In: International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, no. 5.  ... 
doi:10.48129/kjs.11169 fatcat:p36kh6bbtba2paux4sphhkhp3u

Contents

2011 Procedia Engineering  
, Rui Zhao and Meijian Li . . 2444 Adaptive Targets-Detecting Algorithm based on LBP and Background Modeling under Complex ScenesYingying Yue, Zhenzhou An and Hong Wu . . 2484 Multiuser Detection  ...  . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2113 Research on Power Information Encryption Algorithm based on Composite Chaotic System in Wavelet Transform Domain Li Xiaoming and Yun Zhao.  ...  Monte Carlo Simulation of Energy Distribution of Radiation Field Liu Yi, Chen Xiao-Bai and Wang Chun- Yan . . 3330 An Improved Association Rules Algorithm based on Frequent Item Sets Yaqiong Jiang  ... 
doi:10.1016/s1877-7058(11)04811-9 fatcat:adrkzzediretxma23pbeqmltvu

Sliding bifurcations in resonant inverters

Enrique Ponce, Luis Benadero, Abdelali El Aroudi, Luis Martinez-Salamero
2017 2017 14th International Multi-Conference on Systems, Signals & Devices (SSD)  
Finally, we apply a state feedback control, which guarantees a quasi-exponential stabilization to all the system states, which in turn converge exponentially to zero.  ...  In this paper, we held a fair comparative study between the LMMN and a number of the LMS-based algorithms, such as the LMS algorithm, the zero-attracting (ZA-LMS) algorithm, and the normalized (NLMS) algorithm  ... 
doi:10.1109/ssd.2017.8167001 dblp:conf/IEEEssd/PonceBAM17 fatcat:6lbol63imjffhezjv6yc6cnheu

Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases [chapter]

Rajesh Singh, Anita Gehlot, Dharam Buddhi
2022 Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases  
Chronic Diseases are the most dangerous diseases for humans and have significant effects on human life. Chronic Diseases like heart disease & Diabetes are the main causes of death.  ...  Precise diagnosis of these diseases on time is very significant for maintaining a healthy life.  ...  The region-based segmentation will segment the data dependent on the taken-out features using GLCM algorithm.  ... 
doi:10.13052/rp-9788770227667 fatcat:da47mjbbyzfwnbpde7rgbrlppe

A Chaos-Based Video Watermarking Algorithm $

Somayyeh Mohammadi, Ahmad Hakimi
2012 unpublished
Embedding locations are selected based on certain principles.  ...  Experimental results demonstrate that our proposed watermarking method is highly superior to other techniques reported in literature and readily achieves the desired robustness and security level.  ...  In this method, watermark is hidden in a chaotic structure and the watermarking method is performed based on the bit-zero watermarking algorithm [26] .  ... 
fatcat:kbnpcxdeu5edplimo2shjabmly
« Previous Showing results 1 — 15 out of 38 results