![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Reversible Data Hiding Based on Bidirectional Generalized Integer Transform
This paper proposes a high capacity reversible data hiding (RDH) scheme by extending the unidirectional generalized integer transform (UGIT) to bidirectional GIT (BGIT). For non-embeddable blocks in UGIT based...
-
Chapter and Conference Paper
A New Study of Integration Between Social Robotic Systems and the Metaverse for Dealing with Healthcare in the Post-COVID-19 Situations
With the popularity of the metaverse, researchers are turning to augmented reality and virtual reality to innovate their recent pain points, particularly healthcare issues during COVID-19. At the same time, so...
-
Chapter and Conference Paper
Deep Neural Network Watermarking Based on Texture Analysis
In recent years, deep neural network is active in the field of computer image vision. The existing digital watermarking technology based on deep neural network can resist image attacks, but image quality is no...
-
Chapter and Conference Paper
A Survey of Data Hiding Based on Vector Quantization
With the development of computers and networks, digital data can be transmitted quickly to anywhere in the world. Information security has become the focus of research for several researchers as it is essentia...
-
Chapter and Conference Paper
An Efficient Algorithm of Facial Expression Recognition by TSG-RNN Network
Facial expression recognition remains a challenging problem and the small datasets further exacerbate the task. Most previous works realize facial expression by fine-tuning the network pre-trained on a related...
-
Chapter and Conference Paper
Aesthetic QR Code Authentication Based on Directed Periodic Texture Pattern
More and more people use mobile phones to buy goods through scanning the printed aesthetic QR code. QR code has become an important payment tool in today’s business. However, there is an inevitable risk in pa...
-
Chapter and Conference Paper
A Novel Framework of Robust Video Watermarking Based on Statistical Model
This paper is to investigate a novel framework of robust video watermarking based on the statistical model with robustness against multiple attacks. The main contribution is threefold. First, the Laplacian dis...
-
Chapter and Conference Paper
A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM
Many aesthetic QR code algorithms have been proposed. In this paper, a new aesthetic QR code algorithm, based on salient region detection and Selectable Positive Basis Vector Matrix (SPBVM), is proposed. First...
-
Chapter and Conference Paper
Face Detection in a Complex Background Using Cascaded Conventional Networks
Although significant achievements have been achieved in the field of face detection recently, face detection under complex background is still a challenge issue. Especially, face detection has wide applicatio...
-
Chapter and Conference Paper
Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual Cryptography
With the growing application of quick response (QR) code on bike-share service, there is the possibility of tampering and replacing the QR code. Thus the security of the personal information and the property a...
-
Chapter and Conference Paper
VQ Compression Enhancer with Huffman Coding
Vector quantization (VQ) is an effective and important compression technique with high compression efficiency and widely used in many multimedia applications. VQ compression is a fixed-length algorithm for ima...
-
Chapter and Conference Paper
Parameter Selection for Denoising Algorithms Using NR-IQA with CNN
In order to yield satisfied image after denosing processing, the process of error tracing is nearly necessary for parameter selection. In practice, usually the choice of such parameters is time consuming and e...
-
Chapter and Conference Paper
A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors
Reference-matrix-based data hiding is a way to embed secret data within cover images according to a secret reference matrix. Existing schemes such as exploiting-modification-direction-based method, Sudoku-base...
-
Chapter and Conference Paper
A New Card Authentication Scheme Based on Image Watermarking and Encryption
With smart card’s vast use, the security is becoming more and more important. Traditional password authentication can’t meet user requirements. Many user’s authentication schemes have been proposed, especially...
-
Chapter and Conference Paper
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information
Steganography is a widely used approach to embed tremendous amount of secret message while maintaining satisfactory visual quality. Least-significant-bit (LSB) substitution is one of the famous techniques appl...
-
Chapter and Conference Paper
The Reduction of VQ Index Table Size by Matching Side Pixels
The vector quantization (VQ) technology is applied to compress an image based on a local optimal codebook, and as a result an index table will be generated. In this paper, we propose a novel matching side pixe...
-
Chapter and Conference Paper
Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography
To enhance bike-share service authentication, we propose two novel schemes based on aesthetic QR code combining XOR-based visual cryptography scheme (XVCS). In Scheme I, aesthetic QR code based on error correc...
-
Chapter and Conference Paper
A Secure Authentication Scheme for Telecare Medical Information Systems
In 2012, Chen et al. proposed an ID based authentication scheme for Telecare Medical Information Systems. However it has some security weaknesses. Later **e et al. have proposed a new scheme to improve the sec...
-
Chapter and Conference Paper
A Reversible Data Hiding Scheme Using Ordered Cluster-Based VQ Index Tables for Complex Images
In the digital multimedia era, data hiding in the compression domain becomes increasingly popular in the need for speeding up the transmission process and reducing bandwidth. Recently, VQ-based watermarking te...
-
Chapter and Conference Paper
Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack
Traditional digital image watermarking schemes have the inherent conflicts between imperceptibility and robustness because the insertion of watermarks into the host image inevitably introduces some perceptible...