[HTML][HTML] A review of image watermarking for identity protection and verification

S Sharma, JJ Zou, G Fang, P Shukla, W Cai - Multimedia Tools and …, 2024 - Springer
Identity protection is an indispensable feature of any information security system. An identity
can exist in the form of digitally written signatures, biometric information, logos, etc. It serves …

Multi-objective whale optimization algorithm for content-based image retrieval

MAE Aziz, AA Ewees, AE Hassanien - Multimedia tools and applications, 2018 - Springer
In the recent years, there are massive digital images collections in many fields of our life,
which led the technology to find methods to search and retrieve these images efficiently. The …

Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization

L Zhang, D Wei - Multimedia Tools and Applications, 2019 - Springer
Robust invisible watermarking plays an important role in copyright protection. Such
watermarking has high requirements for robustness and security, and transparency and …

Discrete fractional wavelet transform and its application to multiple encryption

G Bhatnagar, QMJ Wu, B Raman - Information Sciences, 2013 - Elsevier
The fractional wavelet transform is a useful mathematical transformation that generalizes the
most prominent tool in signal and image processing namely wavelet transform by rotation of …

X-ray image analysis for automated knee osteoarthritis detection

M Saleem, MS Farid, S Saleem, MH Khan - Signal, Image and Video …, 2020 - Springer
Knee issues are very frequent among people of all ages, and osteoarthritis is one of the
most common reasons behind them. The primary feature in observing extremity and …

Classifying discriminative features for blur detection

Y Pang, H Zhu, X Li, X Li - IEEE Transactions on Cybernetics, 2015 - ieeexplore.ieee.org
Blur detection in a single image is challenging especially when the blur is spatially-varying.
Developing discriminative blur features is an open problem. In this paper, we propose a new …

[HTML][HTML] AED-Net: An abnormal event detection network

T Wang, Z Miao, Y Chen, Y Zhou, G Shan, H Snoussi - Engineering, 2019 - Elsevier
It has long been a challenging task to detect an anomaly in a crowded scene. In this paper, a
self-supervised framework called the abnormal event detection network (AED-Net), which is …

[HTML][HTML] A new look at image fusion methods from a Bayesian perspective

HK Zhang, B Huang - Remote sensing, 2015 - mdpi.com
Component substitution (CS) and multi-resolution analysis (MRA) are the two basic
categories in the extended general image fusion (EGIF) framework for fusing panchromatic …

Abnormal event detection via covariance matrix for optical flow based feature

T Wang, M Qiao, A Zhu, Y Niu, C Li… - Multimedia Tools and …, 2018 - Springer
Abnormal event detection is one of the most important objectives in security surveillance for
public scenes. In this paper, a new high-performance algorithm based on spatio-temporal …

One-class collaborative filtering based on rating prediction and ranking prediction

G Li, Z Zhang, L Wang, Q Chen, J Pan - Knowledge-Based Systems, 2017 - Elsevier
Abstract One-Class Collaborative Filtering (OCCF) has recently received much attention in
recommendation communities due to their close relationship with real industry problem …