-
Article
(k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability
In the traditional secret image sharing (SIS) scheme, the secret image is divided into several noise-like shares, which lack authentication and may attract the attention of malicious users. Therefore, the auth...
-
Article
An ultrahigh-resolution image encryption algorithm using random super-pixel strategy
Almost all existing image encryption algorithms are only suitable for low-resolution images in the standard image library. When they are used to encrypt high-resolution images, they will inevitably suffer from...
-
Article
A novel compressive sensing-based framework for image compression-encryption with S-box
In this paper, we find that compressive sensing (CS) with the chaotic measurement matrix has a strong sensitivity to plaintext. Because of the quantification executed after CS, however, the plaintext sensitivi...
-
Article
Object and patch based anomaly detection and localization in crowded scenes
Detecting and localizing anomalies in crowded scenes is an ongoing challenge for public security. Existing approaches are mainly based on patches and trajectories. However, they fall short in semantic understa...
-
Article
Efficient protection using chaos for Context-Adaptive Binary Arithmetic Coding in H.264/Advanced Video Coding
Recently, video encryption has been widely investigated to enhance the protection for video data, yet the encryption efficiency may not be considered sufficiently so that some encryption schemes are unsuitable...
-
Article
A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization
This paper proposes a novel robust image watermarking scheme in Discrete Cosine Transform (DCT) domain for active forensics. We investigate the relation between the positions and the modification magnitudes of...
-
Article
Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection
This paper intents to solve the challenging problem of steganographer detection in the real world from a new perspective: side channel attack. We propose utilizing the behavior of actors in the social network ...
-
Article
A no-reference quality assessment for contrast-distorted image based on improved learning method
No-reference image quality assessment (NR-IQA), which aims to predict image quality without accessing to reference images, is a fundamental and challenging problem in the field of image processing. Nevertheles...
-
Article
Which gray level should be given the smallest cost for adaptive steganography?
Currently, the most successful approach to steganography in digital image is distortion-minimization framework, which reduces the steganographers’ work to the design of distortion function with the aid of prac...
-
Article
A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images
In this paper, we attempt to investigate the secure archiving of medical images which are stored on semi-trusted cloud servers, and focus on addressing the complicated and challenging integrity control and pri...
-
Article
Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification
This study proposes a reversible data hiding (RDH) algorithm for 3D mesh models based on the optimal three-dimensional prediction-error histogram (PEH) modification with recursive construction coding (RCC). Fi...
-
Article
Optimal structural similarity constraint for reversible data hiding
Until now, most reversible data hiding techniques have been evaluated by peak signal-to-noise ratio(PSNR), which based on mean squared error(MSE). Unfortunately, MSE turns out to be an extremely poor measure w...
-
Article
Unified entropy-based sorting for reversible data hiding
Reversible data hiding schemes compete against each other for a sharply distributed prediction error histogram, usually realized by utilizing prediction strategies together with sorting technique that aims to ...
-
Article
Open AccessSmart motion reconstruction system for golf swing: a DBN model based transportable, non-intrusive and inexpensive golf swing capture and reconstruction system
In the past decade, golf has stimulated people’s great interest and the number of golf players has increased significantly. Therefore, how to train a golfer to make a perfect swing has attracted extensive rese...
-
Article
Improving visual quality of reversible data hiding by twice sorting
In most literatures on reversible data hiding (RDH), the visual quality of marked images is only assessed by PSNR, and the smoothness-priority-based sorting technique is efficient for improving PSNR. However, ...
-
Article
Protecting patient confidential information based on ECG reversible data hiding
Nowadays telecardiology is widely popular due to the fact that an increasing number of people are suffering from cardiac disease in the world. Therefore huge amount of ECG signal as well as patient confidentia...
-
Article
Defining embedding distortion for motion vector-based video steganography
This paper presents an effective methodology for motion vector-based video steganography. The main principle is to design a suitable distortion function expressing the embedding impact on motion vectors by exp...
-
Article
Recursive code construction for reversible data hiding in DCT domain
Reversible data hiding has extensive applications in fields like data authentication, medical data management and error concealment. In this paper, we formulate the model of reversible data hiding over a speci...