A novel blind color image watermarking using upper Hessenberg matrix

Q Su, B Chen - AEU-International Journal of Electronics and …, 2017 - Elsevier
It is a challenging work to design a blind color image watermarking scheme for protecting
copyright, which is different from the existing schemes used binary image or grayscale …

Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram

C Yu, J Li, X Li, X Ren, BB Gupta - Multimedia Tools and Applications, 2018 - Springer
A novel four-image encryption scheme based on the quaternion Fresnel transforms (QFST),
computer generated hologram and the two-dimensional (2D) Logistic-adjusted-Sine map …

[PDF][PDF] A Fusion Steganographic Algorithm Based on Faster R-CNN.

R Meng, SG Rice, J Wang, X Sun - Computers, Materials & …, 2018 - cdn.techscience.cn
The aim of information hiding is to embed the secret message in a normal cover media such
as image, video, voice or text, and then the secret message is transmitted through the …

Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy

C Qin, P Ji, X Zhang, J Dong, J Wang - Signal processing, 2017 - Elsevier
In this paper, we propose a new fragile watermarking scheme with high-quality recovery
capability based on overlapping embedding strategy. The block-wise mechanism for …

Coverless image steganography using partial-duplicate image retrieval

Z Zhou, Y Mu, QMJ Wu - Soft Computing, 2019 - Springer
Most of the existing image steganographic approaches embed the secret information
imperceptibly into a cover image by slightly modifying its content. However, the modification …

[HTML][HTML] Three-way decisions approach to multiple attribute group decision making with linguistic information-based decision-theoretic rough fuzzy set

B Sun, W Ma, B Li, X Li - International Journal of Approximate Reasoning, 2018 - Elsevier
This paper investigates the decision-theoretic rough sets involved multiple decision-makers
with linguistic evaluation information for the uncertainty and risk under the framework of …

[PDF][PDF] Coverless information hiding based on the molecular structure images of material.

Y Cao, Z Zhou, X Sun, C Gao - Computers, Materials & Continua, 2018 - cdn.techscience.cn
The traditional information hiding methods embed the secret information by modifying the
carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard …

Few-shot learning for short text classification

L Yan, Y Zheng, J Cao - Multimedia Tools and Applications, 2018 - Springer
Due to the limited length and freely constructed sentence structures, it is a difficult
classification task for short text classification. In this paper, a short text classification …

A copy-move forgery detection method based on CMFD-SIFT

B Yang, X Sun, H Guo, Z Xia, X Chen - Multimedia Tools and Applications, 2018 - Springer
A very common way of image tampering is the copy-move attack. When creating a copy-
move forgery, it is often necessary to add or remove important objects from an image. To …

An efficient image matching algorithm based on adaptive threshold and RANSAC

H Li, J Qin, X Xiang, L Pan, W Ma, NN Xiong - Ieee Access, 2018 - ieeexplore.ieee.org
The education plays a more and more important role in disseminating knowledge because
of the explosive growth of knowledge. As one kind of carrier delivering knowledge, image …