Article
Computer Science, Information Systems
Deyang Wu, Li Li, Jiayan Wang, Penghui Ma, Zichi Wang, Hanzhou Wu
Summary: This article proposes a robust zero-watermarking scheme using DT CWT and improved differential entropy to protect the copyright and security of medical images. Experimental results show that the proposed scheme provides a high level of robustness.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2023)
Article
Computer Science, Information Systems
Xiaoping Liang, Zhenjun Tang, Jingli Wu, Zhixin Li, Xinpeng Zhang
Summary: This paper proposes a robust image hashing algorithm based on Isometric Mapping and saliency map for copy detection, which outperforms state-of-the-art algorithms in classification and copy detection performance.
IEEE TRANSACTIONS ON MULTIMEDIA
(2023)
Article
Computer Science, Artificial Intelligence
Moumita Roy, Dalton Meitei Thounaojam, Shyamosree Pal
Summary: With the rise of multimedia content, the transmission and communication of data have become more accessible. However, this also leads to the concern of data integrity and authentication. This work proposes a new technique using perceptual image hashing and digital watermarking for image authentication.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Xiaoping Liang, Zhenjun Tang, Ziqing Huang, Xianquan Zhang, Shichao Zhang
Summary: This paper proposes an efficient hashing method for image copy detection using 2D-2D PCA. By combining PCT and 2D-2D PCA, rotation-invariant low-dimensional features are extracted, and vector distances are used for robust and compact hash construction. Experimental results demonstrate that the proposed method outperforms representative hashing methods in classification and copy detection performance.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
(2023)
Article
Computer Science, Artificial Intelligence
Jiaqi Yang, Xuequan Lu, Wenzhi Chen
Summary: This paper focuses on the fundamental problem of judging whether a point cloud is plagiarized or copied, and proposes a novel method to address this issue. Three different measures are designed to compute the similarity, and two strategies are introduced to speed up the method. Comprehensive experiments demonstrate the effectiveness and robustness of the proposed method in estimating the similarity of given 3D point clouds.
Article
Computer Science, Artificial Intelligence
Wenbo Wan, Jun Wang, Yunming Zhang, Jing Li, Hui Yu, Jiande Sun
Summary: With the rapid development and popularity of the Internet, multimedia security has become a general essential concern. Digital watermarking has made significant contributions to image content security and has attracted increasing attention. This paper provides a comprehensive review on digital image watermarking methods and introduces conventional schemes and emerging approaches in different domains.
Article
Computer Science, Artificial Intelligence
Jiayan Wang, Deyang Wu, Li Li, Jing Zhao, Hanzhou Wu, Yong Tang
Summary: This paper proposes a robust periodic blind watermarking scheme based on sub-block mapping and block encryption to enhance robustness under combined attacks. The scheme encodes a watermark using a periodic encoding method to improve the fault tolerance rate. It also employs block encryption to encrypt periodic sub-blocks and ensure the security of copyright information. Experimental results show that the proposed watermarking scheme has good visual quality and is robust to image processing attacks, outperforming other watermarking schemes.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Aditi Zear, Pradeep Kumar Singh
Summary: The paper introduces a digital image watermarking approach using Lifting wavelet transform, Discrete Cosine Transform, and Singular Value Decomposition to enhance security and robustness. The method improves the imperceptibility and durability of watermarked images.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Medicine, Legal
Narima Zermi, Amine Khaldi, Redouane Kafi, Fares Kahlessenane, Salah Euschi
Summary: In this work, a blind watermarking approach for medical image protection is proposed, using Electronic Patient Record and image acquisition data to construct the watermark. The integration process is based on a DWT-SVD combination, and experimental results demonstrate high quality watermarked images with strong robustness against attacks.
FORENSIC SCIENCE INTERNATIONAL
(2021)
Article
Computer Science, Information Systems
Xiaohan Sun, Jiting Zhou
Summary: This paper introduces a novel Convolutional Neural Network (CNN)-based perceptual image hashing scheme for image copyright protection. The scheme achieves a balance between perceived robustness and discrimination capacity through automatic feature extraction learning process. The scheme demonstrates superiority in large-scale tests compared to state-of-the-art schemes.
Article
Computer Science, Information Systems
Moumita Roy, Dalton Meitei Thounaojam, Shyamosree Pal
Summary: This article introduces a system that uses perceptual image hashing for copyright protection. By modifying the spiking cortical model to generate stable feature vectors and hashes, it achieves better performance in copy detection.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Zhao Yan, Bai Jie
Summary: A hashing algorithm based on quaternion polar complex exponential transform and image energy is proposed to improve the performance of image hashing. The algorithm extracts global features of the image using mixed low-order moment coefficients obtained through fast quaternion generic polar complex exponential transform. Energy change features on the edges and energy point features in the center of the image are extracted as energy features, and combined with the mixed low-order moment features to form the final hash sequence. Experimental results demonstrate the algorithm's balanced robustness and differentiation, as well as better check-all and check-accuracy rates in copy detection experiments.
JOURNAL OF ELECTRONIC IMAGING
(2023)
Article
Chemistry, Analytical
Hao-Lai Li, Xu-Qing Zhang, Zong-Hui Wang, Zhe-Ming Lu, Jia-Lin Cui
Summary: In this paper, a watermarking scheme is proposed to embed the watermark in the DWT-DCT composite transform coefficients, which is robust against normal image processing operations and geometric attacks. The scheme is resilient to scaling and cutting operations and demonstrates excellent performance in terms of imperceptibility and robustness.
Article
Engineering, Electrical & Electronic
Ying Huang, Hu Guan, Jie Liu, Shuwu Zhang, Baoning Niu, Guixuan Zhang
Summary: This research proposes a texture-aware local adaptive watermarking algorithm that enhances the visual quality of images by embedding watermarks into textured regions and utilizes texture value to identify these regions. Simulation experiments demonstrate that this algorithm outperforms others in terms of imperceptibility, robustness, and adaptability.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
(2023)
Article
Computer Science, Information Systems
Gul Tahaoglu, Guzin Ulutas, Beste Ustubioglu, Mustafa Ulutas, Vasif V. Nabiyev
Summary: There is an increasing demand for digital image authentication in various fields, particularly in important areas where real-time systems are used. This study proposes a robust digital image copy move forgery detection method that can be implemented in real time. The method is resilient to geometric distortion attacks and image degradation attacks, and performs exceptionally well against geometric distortion attacks such as rotation and scaling.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Engineering, Electrical & Electronic
Alam Abbas Syed, Hassan Foroosh
Summary: This paper presents effective methods using spherical polar Fourier transform data for two different applications: 3D volumetric registration and machine learning classification network. The proposed method for registration offers unique and effective techniques, handling arbitrary large rotation angles and showing robustness. The modified classification network achieves robust classification results in processing spherical data.
Article
Engineering, Electrical & Electronic
Ruibo Fan, Mingli Jing, Jingang Shi, Lan Li, Zizhao Wang
Summary: In this study, a new low-rank sparse decomposition algorithm named TVRPCA+ is proposed for foreground-background separation. The algorithm combines spectral norm, structured sparse norm, and total variation regularization to suppress noise and obtain cleaner foregrounds. Experimental results demonstrate that TVRPCA+ achieves high performance in complex backgrounds and noise scenarios.
Article
Engineering, Electrical & Electronic
Omair Aldimashki, Ahmet Serbes
Summary: This paper proposes a coarse-to-fine FrFT-based algorithm for chirp-rate estimation of multi-component LFM signals, which achieves improved performance and a reduced signal-to-noise breakdown threshold by utilizing mathematical models for coarse estimation and a refined estimate-and-subtract strategy. Extensive simulation results demonstrate that the proposed algorithm performs very close to the Cramer-Rao lower bound, with the advantages of eliminating leakage effect, avoiding error propagation, and maintaining acceptable computational cost compared to other state-of-the-art methods.
Article
Engineering, Electrical & Electronic
Xinlei Shi, Xiaofei Zhang, Yuxin Sun, Yang Qian, Jinke Cao
Summary: In this paper, a low-complexity localization approach for multiple sources using two-dimensional discrete Fourier transform (2D-DFT) is proposed. The method computes the cross-covariance and utilizes phase offset method and total least square solution to obtain accurate position estimates.
Article
Engineering, Electrical & Electronic
Prabhanjan Mannari, Ratnasingham Tharmarasa, Thiagalingam Kirubarajan
Summary: This paper discusses the problem of extended target tracking for a single 2D extended target with a known convex polytope shape and dynamics. It proposes a framework based on the existing point multitarget tracking framework to address the challenges of uncertainty in shape and kinematics, as well as self-occlusion. The algorithm developed using this framework is capable of dynamically changing the number of parameters used to describe the shape and estimating the whole target shape even when different parts of the target are visible at different frames.
Article
Engineering, Electrical & Electronic
Yongsong Li, Zhengzhou Li, Jie Li, Junchao Yang, Abubakar Siddique
Summary: This paper proposes a weighted adaptive ring top-hat transformation (WARTH) for extracting infrared small targets in complex backgrounds. The WARTH method effectively measures local and global feature information using an adaptive ring-shaped structural element and a target awareness indicator, resulting in accurate detection of small targets with minimized false alarms.
Article
Engineering, Electrical & Electronic
Yu Wang, Zhen Qin, Jun Tao, Yili Xia
Summary: In this paper, an enhanced sparsity-aware recursive least squares (RLS) algorithm is proposed, which combines the proportionate updating (PU) and zero-attracting (ZA) mechanisms, and introduces a general convex regularization (CR) function and variable step-size (VSS) technique to improve performance.
Article
Engineering, Electrical & Electronic
Neil J. Bershad, Jose C. M. Bermudez
Summary: This paper analyzes the impact of processing delay on the Least Mean Squares (LMS) algorithm in system identification, highlighting bias issues in the resulting weight vector.
Article
Engineering, Electrical & Electronic
Kanghui Jiang, Defu Jiang, Mingxing Fu, Yan Han, Song Wang, Chao Zhang, Jingyu Shi
Summary: In this paper, a novel method for velocity estimation using multicarrier signals in a single dwell is proposed, which effectively addresses the issue of Doppler ambiguity in pulse Doppler radars.
Article
Engineering, Electrical & Electronic
Xiao-Jun Zhang, Peng-Lang Shui, Yu-Fan Xue
Summary: This paper proposes a method for low-velocity small target detection in maritime surveillance radars. It models sea clutter sequences using the spherical invariant random vector (SIRV) model with block tridiagonal speckle covariance matrix and inverse Gamma distributed texture. The proposed detector, which is a long-time adaptive generalized likelihood ratio test with linear threshold detector (GLRT-LTD), shows competitive detection performance in experiments.
Article
Engineering, Electrical & Electronic
Aiyi Zhang, Fulai Liu, Ruiyan Du
Summary: This paper proposes an adaptive weighted robust data recovery method with total variation regularization for hyperspectral image. The method models the HSI recovery problem as a tensor robust principal component analysis optimization problem, decomposing the data into low-rank HSI data, outliers, and noise component. An adaptive weighted strategy is then defined to impose on the tensor nuclear norm and outliers, using the priori information of singular values and strengthening the sparsity of outliers.
Article
Engineering, Electrical & Electronic
Hamid Asadi, Babak Seyfe
Summary: This paper presents a novel approach for estimating the model order in the presence of observation errors. The proposed method is based on correntropy estimation of eigenvalues in the observation space, which is further enhanced by resampling the observations using the bootstrap method. The algorithm partitions the observation space into signal and noise subspaces using the covariance matrix of mixtures, and determines the model order based on a correntropy estimator with kernel functions. Theoretical analysis and comparative evaluations demonstrate the superiority of this information-theoretic approach.
Article
Engineering, Electrical & Electronic
Buket colak Guvenc, Engin Cemal Menguc
Summary: In this paper, a novel family of online censoring based complex-valued least mean kurtosis (CLMK) algorithms is proposed. The algorithms censor less informative complex-valued data streams and reduce the costs of data processing without affecting accuracy. Robust algorithms are also developed to handle outliers. The simulation results confirm the attractive features of the proposed algorithms in large-scale system identification and regression scenarios.
Article
Engineering, Electrical & Electronic
Yun Su, Weixian Tan, Yifan Dong, Wei Xu, Pingping Huang, Jianxin Zhang, Diankun Zhang
Summary: In this study, a novel method for detecting low-resolution and small targets in millimeter wave radar images is proposed. The Wavelet-Conv structure and Wavelet-Attention mechanism are introduced to overcome the limitations of existing detectors. Experimental results demonstrate that the proposed method improves recall and mean average precision while maintaining competitive inference speed.
Article
Engineering, Electrical & Electronic
Xin Wang, Xingxing Jiang, Qiuyu Song, Jie Liu, Jianfeng Guo, Zhongkui Zhu
Summary: This study proposes a variational mode extraction (VME) method for extracting specific modes from complicated signals. By exploring the convergence property of VME, strategies for identifying ICF and determining the balance parameter are designed, and a bandwidth estimation strategy is constructed. The effectiveness of the proposed method for bearings fault diagnosis is verified and compared with other methods.