Search Results - "Niu Xiamu"
-
1
Threshold construction from specific cases in visual cryptography without the pixel expansion
Published in Signal processing (01-12-2014)“…Unexpanded shares can decrease the bandwidth and save storage in a visual cryptography scheme (VCS). To avoid the pixel expansion, some previous VCSs without…”
Get full text
Journal Article -
2
Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization
Published in IEEE transactions on image processing (01-04-2012)“…In this paper, we propose a robust-hash function based on random Gabor filtering and dithered lattice vector quantization (LVQ). In order to enhance the…”
Get full text
Journal Article -
3
A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces
Published in Signal processing (01-11-2013)“…How to protect the secret information is an important issue in commercial or military application. Attributed to quantum chaotic system that can be…”
Get full text
Journal Article -
4
Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images
Published in Signal processing (01-04-2012)“…This paper proposes an encryption scheme with a new additive homomorphism based on Elliptic Curve ElGamal (EC-ElGamal) for sharing secret images over unsecured…”
Get full text
Journal Article -
5
A weak blind signature scheme based on quantum cryptography
Published in Optics communications (15-02-2009)“…In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein–Padolsky–Rosen) pairs. Different from classical blind…”
Get full text
Journal Article -
6
A hybrid chaotic system and cyclic elliptic curve for image encryption
Published in International journal of electronics and communications (01-02-2013)“…Recently, several image encryption schemes based on chaotic maps have been proposed. Nevertheless, most of them hinder the system performance, security, and…”
Get full text
Journal Article -
7
An Aeromagnetic Compensation Coefficient-Estimating Method Robust to Geomagnetic Gradient
Published in IEEE geoscience and remote sensing letters (01-05-2016)“…Most existing methods used in aeromagnetic compensation assume a constant geomagnetic field. These methods do not take into consideration the geomagnetic…”
Get full text
Journal Article -
8
Quantum realization of the nearest-neighbor interpolation method for FRQI and NEQR
Published in Quantum information processing (01-01-2016)“…This paper is concerned with the feasibility of the classical nearest-neighbor interpolation based on flexible representation of quantum images (FRQI) and…”
Get full text
Journal Article -
9
Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion
Published in IEEE transactions on information forensics and security (01-09-2007)“…Reversible watermarking is suitable for hiding data in 2-D vector maps because the distortions induced by data embedding can be removed after extracting the…”
Get full text
Journal Article -
10
An Adaptive Filter for Aeromagnetic Compensation Based on Wavelet Multiresolution Analysis
Published in IEEE geoscience and remote sensing letters (01-08-2016)“…In aeromagnetic compensation, the multicolinearity of the Tolles-Lawson model is one of the main factors limiting the performance of the coefficient-estimating…”
Get full text
Journal Article -
11
Robust Speech Hashing for Content Authentication
Published in IEEE signal processing letters (01-09-2009)“…Robust hashing for multimedia authentication is an emerging research area. A novel key-dependent robust speech hashing based on speech production model is…”
Get full text
Journal Article -
12
Dynamic watermarking scheme for quantum images based on Hadamard transform
Published in Multimedia systems (2014)“…In this paper, a novel watermarking scheme for quantum images based on Hadamard transform is proposed. In the new scheme, a unitary transform controlled by a…”
Get full text
Journal Article -
13
A Novel DIBR 3D Image Watermarking Algorithm Resist to Geometrical Attacks
Published in Chinese Journal of Electronics (01-11-2017)“…A histogram shape based method is utilized to design watermarking algorithm to protect the Depthimage‐based rendering (DIBR) 3D images. To make the…”
Get full text
Journal Article -
14
Quality Assessment for Reassembled Image Files
Published in IEEE signal processing letters (01-02-2016)“…Reassembling fragmented image files plays a crucial role in seizing digital evidence from scattered digital image files. However, little attention has been…”
Get full text
Journal Article -
15
Novel Similarity Measurements for Reassembling Fragmented Image Files
Published in Chinese Journal of Electronics (01-03-2019)“…Reassembling fragmented image files is a useful technique to seize image evidence in digital forensics. A key problem of reassembly is how to measure the…”
Get full text
Journal Article -
16
Saliency detection based on integrated features
Published in Neurocomputing (Amsterdam) (10-04-2014)“…This paper presents a novel computational model for saliency detection. The proposed model utilizes feature level fusion method to integrate different kinds of…”
Get full text
Journal Article Conference Proceeding -
17
A new image encryption scheme based on cyclic elliptic curve and chaotic system
Published in Multimedia tools and applications (01-06-2014)“…Recently, several cryptosystems based on chaos have been proposed. Nevertheless, most of them hinder the system performance, security, and suffer from the…”
Get full text
Journal Article -
18
Quantum Cosine Transform Based Watermarking Scheme for Quantum Images
Published in Chinese Journal of Electronics (01-04-2015)“…A novel watermarking scheme for quantumimage is proposed based on Quantum cosine transform(QCT). The cosine coefficients are extracted by executingQCT on…”
Get full text
Journal Article -
19
Background contrast based salient region detection
Published in Neurocomputing (Amsterdam) (26-01-2014)“…This paper proposes a novel salient region detection method based on background contrast. Salient regions are widely considered as those distinct to the image…”
Get full text
Journal Article -
20
Toward accurate localization and high recognition performance for noisy iris images
Published in Multimedia tools and applications (01-08-2014)“…Iris recognition plays an important role in biometrics. Until now, many scholars have made different efforts in this field. However, the recognition…”
Get full text
Journal Article