![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Simulation of radio path strength for multipath propagation in land mobile communications
Based on the characteristics of the radio propagation in land mobile communications environment, a theoretical model for the reflecting (scattering) number of each radio path is derived firstly. This model can...
-
Article
Watermarking based on principal component analysis
A new watermarking scheme using principal component analysis (PCA) is described. The proposed method inserts highly robust watermarks into still images without degrading their visual quality. Experimental resu...
-
Article
Evolutionary computation for image feature extraction
Modifications to an image feature extraction approach involving evolutionary computation and autonomous agents are proposed. The described algorithm allows extraction of features with certain specified charact...
-
Article
Hurst exponent analysis of financial time series
Statistical properties of stock market time series and the implication of their Hurst exponents are discussed. Hurst exponents of DJIA (Dow Jones Industrial Average) components are tested using re-scaled range...
-
Article
Error reduction for visible watermarking in still images
Different digital watermarking techniques and their applications are briefly reviewed. Solution to a practical problem with visible image marking is presented, together with experimental results and discussion...
-
Article
Spectral analysis of stock data series and evidence of day-of-the-week effects
Daily return series of Dow Jones Industrial Average Index (DJIA) and Shanghai Conposite Index are investigated using spectral analysis methods. The day-of-the-week effect is found in the frequency domain in bo...
-
Article
Steganographic technique capable of withstanding RQP analysis
A new steganographic approach for 24-bit color images that can resist the RQP(raw-quick-pairs) steganalysis is described. The technique is based on modification of color triplets such that the existing color p...
-
Article
Watermarking capable of identifying embedding order based on an arithmetic mechanism
A digital watermark as a means for copyright protection may be crippled when a fake mark is embedded on top of it since both watermarks are detectable. In dealing with this problem, a watermarking scheme that ...
-
Article
Speaker identification based on fractal dimensions
This paper discusses application of fractal dimensions to speech processing. Generalized dimensions of arbitrary orders and associated fractal parameters are used in speaker identification. A characteristic va...
-
Article
Spatial domain technique for visible watermarking
A new technique for embedding visible watermarks into a digital image is described in this paper, which uses statistical properties of each pixel and its immediate surrounding pixels in the host image, and als...
-
Article
Undercover communication using image and text as disguise and countermeasures
A brief survey of some representative techniques of steganography and steganalysis is presented. Various methods developed in the authors’ laboratory are introduced, including symmetric LSB embedding, secure s...
-
Article
Electrical impedance tomography using adaptive mesh refinement
In electrical impedance tomography (EFT), distribution of the internal resistivity or conductivity of an unknown object is estimated using measured boundary voltage data induced by different current patterns w...
-
Article
Steganography in binary image by checking data-carrying eligibility of boundary pixels
We present a novel scheme for embedding secret data into a binary image without introducing noticeable artifacts. Unlike some block-based methods, the proposed scheme encodes the secret bits directly into boun...
-
Article
Image block feature vectors based on a singular-value information metric and color-texture description
In this work, image feature vectors are formed for blocks containing sufficient information, which are selected using a singular-value criterion. When the ratio between the first two SVs are below a given thre...
-
Article
Recent development of perceptual image hashing
The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concer...
-
Article
Layered image inpainting based on image decomposition
We propose a layered image inpainting scheme based on image decomposition. The damaged image is first decomposed into three layers: cartoon, edge, and texture. The cartoon and edge layers are repaired using an...
-
Article
Parallel computation of unified finite-difference time-domain for underwater sound scattering
In this work, we treat scattering objects, water, surface and bottom in a truly unified manner in a parallel finite-difference time-domain (FDTD) scheme, which is suitable for distributed parallel computing in...
-
Article
Extraction of color-intensity feature towards image authentication
A color-intensity feature extraction method is proposed aimed at supplementing conventional image hashing algorithms that only consider intensity of the image. An image is mapped to a set of blocks represented...