Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Mechanism of germanium enrichment in the world-class Huize MVT Pb–Zn deposit, southwestern China

    The world-class Huize deposit hosts significant germanium (Ge) resources in the Sichuan–Yunan–Guizhou (SYG) Mississippi Valley-type (MVT) Pb–Zn province of China. The distribution and enrichment mechanism of G...

    Pan-Pan Niu, Manuel Muñoz, Olivier Mathon, Suo-Fei **ong in Mineralium Deposita (2024)

  2. No Access

    Article

    Accurate and robust image copy-move forgery detection using adaptive keypoints and FQGPCET-GLCM feature

    With the rapid development of image editing software, forged images have become a serious social problem because of their great destructiveness. Copy-move is one of the most commonly used types of forgery. The...

    **ang-yang Wang, **ng-qi Wang, Pan-pan Niu in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    Geochronology and Geochemistry of Wangjiadashan Quartz Syenite Porphyry in Suizao Area of Hubei Province in the Tongbai-Dabie Orogenic Belt

    The Wangjiadashan area in Suizhou-Zaoyang region of Hubei Province in the Tongbai-Dabie orogenic belt hosts important copper-gold deposits and contains a large number of quartz syenite porphyry dykes, occurrin...

    Pan-Pan Niu, Shao-Yong Jiang in Journal of Earth Science (2023)

  4. No Access

    Article

    A new statistical image watermark detector in RHFMs domain using beta-exponential distribution

    The detection of watermarks can be achieved by statistical approaches. How to select robust modeling object, appropriate statistical model, and decision rules is one of the major issues in statistical image wa...

    **ang-yang Wang, Pan-pan Niu, **g Tian, Jia-lin Tian in Soft Computing (2022)

  5. No Access

    Article

    RDWT domain statistical watermark detector using FRHFMs magnitudes and bivariate Cauchy-Rayleigh distribution

    Imperceptibility, robustness and data payload, which are complimentary to each other, are widely considered as the three main properties vital for any image watermarking systems. It is a challenging work to de...

    Pan-pan Niu, Fei Wang, **g Tian, **g Cai in Multimedia Tools and Applications (2022)

  6. No Access

    Article

    Fast Quaternion Log-Polar Radial Harmonic Fourier Moments for Color Image Zero-Watermarking

    As a copyright protection technology, zero-watermarking has received widespread attention in recent years. The zero-watermarking algorithm based on moments has been extensively studied due to its better compre...

    Pan-Pan Niu, Li Wang, Fei Wang in Journal of Mathematical Imaging and Vision (2022)

  7. No Access

    Article

    Statistical texture image retrieval in DD-DTCWT domain using magnitudes and relative phases

    Statistical models of transform coefficients are an efficient way to discriminate between texture classes. Statistical-based approaches provide a natural way to solve texture retrieval problem. In this paper, ...

    Pan-Pan Niu, **g Tian, Qiu-Cheng Wu, Can Zhang in Multimedia Tools and Applications (2021)

  8. No Access

    Article

    Robust and effective multiple copy-move forgeries detection and localization

    Copy-move (or copy-paste or cloning) is one of the most common image forgeries, wherein one or more region are copied and pasted within the same image. The motivations of such forgery include hiding an element...

    **ang-yang Wang, Chao Wang, Li Wang, Hong-ying Yang in Pattern Analysis and Applications (2021)

  9. No Access

    Article

    Color Image Zero-Watermarking Using Accurate Quaternion Generalized Orthogonal Fourier–Mellin Moments

    In recent years, digital image zero-watermarking algorithm has made great progress. But there are still some problems. First, most algorithms only focus on robustness and ignore discrimination. Second, most me...

    **ang-yang Wang, Li Wang, Jia-lin Tian in Journal of Mathematical Imaging and Vision (2021)

  10. No Access

    Article

    Statistical image watermark decoder based on local frequency-domain Exponent-Fourier moments modeling

    There are three indispensable, yet contrasting requirements for a watermarking scheme: perceptual transparency, watermark capacity, and robustness against attacks. Therefore, a watermarking scheme should provi...

    **ang-yang Wang, **n Shen, Jia-lin Tian, Pan-pan Niu in Multimedia Tools and Applications (2021)

  11. No Access

    Article

    Locally optimum watermark decoder in NSST domain using RSS-based Cauchy distribution

    It is important to consider the tradeoff between imperceptibility and robustness requirements in develo** an image-watermarking technique, some statistical model-based image watermarking schemes have been de...

    Pan-pan Niu, **n Shen, Ya-fei Song, Yu-nan Liu in Multimedia Tools and Applications (2020)

  12. No Access

    Article

    Texture image segmentation using Vonn mixtures-based hidden Markov tree model and relative phase

    Texture segmentation is a frequently occurring and challenging problem in many computer vision and pattern recognition applications. The importance of phase information for texture analysis has been earlier es...

    Pan-pan Niu, Li Wang, **n Shen, Qian Wang in Multimedia Tools and Applications (2020)

  13. No Access

    Article

    A novel robust image watermarking in quaternion wavelet domain based on superpixel segmentation

    Feature-based image watermarking is a well-developed area of digital image watermarking. The key advantage of such an approach is the ability to guard against the local desynchronization attacks. However, rese...

    Pan-pan Niu, Li Wang, **n Shen, Si-yu Zhang in Multidimensional Systems and Signal Proces… (2020)

  14. No Access

    Article

    A fast and high accurate image copy-move forgery detection approach

    Copy-move is one of the most common image forgeries, wherein one or more region are copied and pasted within the same image. The motivations of such forgery include hiding an element in the image or emphasizin...

    **ang-Yang Wang, Chao Wang, Li Wang in Multidimensional Systems and Signal Proces… (2020)

  15. No Access

    Article

    A blind watermark algorithm in SWT domain using bivariate generalized Gaussian distributions

    Imperceptibility, robustness, and payload are three main requirements of any audio watermarking systems to guarantee desired functionalities, but there is a tradeoff among them from the information-theoretic p...

    Pan-Pan Niu, **ang-Yang Wang, Hong-Ying Yang, Li Li in Multimedia Tools and Applications (2020)

  16. No Access

    Article

    Color image segmentation using proximal classifier and quaternion radial harmonic Fourier moments

    Segmentation involves separating an object from the background in a given image. Image segmentation has a variety of applications and has received considerable attention in multimedia application and computer ...

    **ang-Yang Wang, Qian Wang, Xue-Bin Wang in Pattern Analysis and Applications (2020)

  17. No Access

    Article

    Copy-move forgery detection based on adaptive keypoints extraction and matching

    Copy-move (region duplication) is one of the most common types of image forgeries, in which at least one part of an image is copied and pasted onto another area of the same image. The main aims of the copy-mov...

    Hong-Ying Yang, Shu-Ren Qi, Ying Niu, Pan-Pan Niu in Multimedia Tools and Applications (2019)

  18. No Access

    Article

    Weibull statistical modeling for textured image retrieval using nonsubsampled contourlet transform

    In this paper, we proposed a new framework for textured image retrieval, which is based on Weibull statistical distribution and nonsubsampled contourlet transform. Firstly, the image is decomposed into one low...

    Hong-ying Yang, Lin-lin Liang, Can Zhang, Xue-bing Wang, Pan-pan Niu in Soft Computing (2019)

  19. No Access

    Article

    Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching

    Copy-move (region duplication) is one of the most common types of image forgeries, in which at least one part of an image is copied and pasted onto another area of the same image. The main aims of the copy-mov...

    **ang-yang Wang, Li-xian Jiao, Xue-bing Wang in Multimedia Tools and Applications (2019)

  20. No Access

    Article

    A new keypoint-based copy-move forgery detection for color image

    Over the past decade, many efforts have been made in copy-move forgery detection (CMFD), and some promising methodologies have been proposed to detect copy-move forgeries. Keypoint based CMFD approaches extrac...

    **ang-Yang Wang, Li-**an Jiao, Xue-Bing Wang, Hong-Ying Yang in Applied Intelligence (2018)

previous disabled Page of 2