Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 27, Issue 3Jun 2021
Reflects downloads up to 09 Feb 2025Bibliometrics
Skip Table Of Content Section
research-article
Reversible data hiding in encrypted medical DICOM image
Abstract

This paper proposes a novel reversible data hiding (RDH) scheme in encrypted domain for medical DICOM images. Although a lot of RDH schemes for encrypted images have been presented, however, most of them are unsuitable for medical DICOM images, as ...

research-article
Low-complexity reversible data hiding in encrypted image via MSB hierarchical coding and LSB compression
Abstract

Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive attention, which can be used in secure cloud computing and privacy protection effectively. In this paper, a low-complexity RDHEI scheme based on MSB hierarchical ...

research-article
Steganography in animated emoji using self-reference
Abstract

Animated emoji is a kind of GIF image, which is widely used in online social networks (OSN) for its efficiency in transmitting vivid and personalized information. Aiming at realizing covert communication in animated emoji, this paper proposes an ...

research-article
Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal hamming distance expected value to a secret
Abstract

To improve the imperceptibility without decreasing the steganographic capacity when steganography by a modification to an audio is carried out, this paper proposes an optimal matching path algorithm to reduce the modification to achieve it. A ...

research-article
Low-complexity fake face detection based on forensic similarity
Abstract

In recent years, face synthesis and manipulation technology have been developed rapidly, and now it is feasible to synthesize extremely realistic fake face videos, which can easily deceive existing face recognition systems. Due to the high quality ...

research-article
Resampling parameter estimation via dual-filtering based convolutional neural network
Abstract

Resampling detection is an important problem in image forensics. Several exiting approaches have been proposed to solve it, but few of them focus on resampling parameter estimation. Especially, the estimation of downsampling scenarios is very ...

research-article
Low-complexity JPEG steganalysis via filters optimation from symmetric property
Abstract

Steganalysis is a technique for detecting existence of secret data hidden in digital media. Researchers are often concentrated in minimizing the misclassification rate. Many steganalysis methods try to choose high-dimension features to reveal ...

research-article
Steganalysis of convolutional neural network based on neural architecture search
Abstract

Recent studies show that the performance of deep convolutional neural network (CNN) applied to steganalysis is better than that of traditional methods. However, the existing network structure is still caused by artificial design, which may not be ...

research-article
Robust and fast image hashing with two-dimensional PCA
Abstract

Image hashing is a useful technology of many multimedia systems, such as image retrieval, image copy detection, multimedia forensics and image authentication. Most of the existing hashing algorithms do not reach a good classification between ...

research-article
A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing
Abstract

To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image ...

research-article
A hybrid DST-SBPNRM approach for compressed video steganography
Abstract

The proposed research work is presenting a novel approach in the field of steganography, especially in the compressed video domain with optimum imperceptibility to secure the secret information. In this approach, the specific secret cover video ...

research-article
Evaluation of accurate iris center and eye corner localization method in a facial image for gaze estimation
Abstract

Accurate estimation of eye-related information is important for many applications such as gaze estimation, face alignment, driver drowsiness detection, etc. Earlier works fail to estimate eye information in low-resolution images captured by a ...

research-article
Optical flow and pattern noise-based copy–paste detection in digital videos
Abstract

Digital videos are an incredibly important source of information, and as evidence, they are highly inculpatory. Digital videos are also inherently prone to conscious semantic manipulations, such as copy–paste forgeries, which involve insertion or ...

research-article
Study of transmission system for compressed and encrypted image
Abstract

An evolutionary asymmetric cryptosystem is proposed using QWT + SPIHT and AES. This system is based on the Quincunx wavelet transform coupled with progressive encoder SPIHT (QWT + SPIHT) and encrypted by the algorithm “Advanced Encryption Standard”...

research-article
Video-based driver action recognition via hybrid spatial–temporal deep learning framework
Abstract

Driver action recognition aims to distinguish normal driver action and some abnormal driver actions such as leaving the wheel, talking on the phone, diving with smoking, etc. For the purpose of traffic safety, studies on the computer vision ...

research-article
Deep reconstruction of 1D ISOMAP representations
Abstract

This paper proposes a deep learning priors-based data reconstruction method of 1D isometric feature mapping (ISOMAP) representations. ISOMAP is a classical algorithm of nonlinear dimensionality reduction (NLDR) or manifold leaning (ML), which is ...

research-article
SHetConv: target keypoint detection based on heterogeneous convolution neural networks
Abstract

Keypoint detection is an important research topic in target recognition and classification. This paper studies the detection of keypoints in images of Amur tigers and proposes a target keypoint detection method based on heterogeneous convolution ...

research-article
A novel pixel-wise authentication-based self-embedding fragile watermarking method
Abstract

Self-embedding fragile watermarking algorithms can perform detection of the manipulated areas as well as recovery of these detected areas. Most of the self-embedding fragile watermarking algorithms are performed block-wise authentication approach. ...

research-article
Understanding the limits of 2D skeletons for action recognition
Abstract

With the development of motion capture technologies, 3D action recognition has become a popular task that finds great applicability in many areas, such as augmented reality, human–computer interaction, sports, or healthcare. On the other hand, the ...

research-article
3D color channel based adaptive contrast enhancement using compensated histogram system
Abstract

Low contrast image is one of the major challenges in photography. The low contrast image not only poses difficulty to the interpretation of the scene but also causes trouble in the onward processing of the image for computer vision tasks. ...

Comments