Search Results - "Niu Xiamu"

Refine Results
  1. 1

    Threshold construction from specific cases in visual cryptography without the pixel expansion by Yan, Xuehu, Wang, Shen, Niu, Xiamu

    Published in Signal processing (01-12-2014)
    “…Unexpanded shares can decrease the bandwidth and save storage in a visual cryptography scheme (VCS). To avoid the pixel expansion, some previous VCSs without…”
    Get full text
    Journal Article
  2. 2

    Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization by Li, Yuenan, Lu, Zheming, Zhu, Ce, Niu, Xiamu

    Published in IEEE transactions on image processing (01-04-2012)
    “…In this paper, we propose a robust-hash function based on random Gabor filtering and dithered lattice vector quantization (LVQ). In order to enhance the…”
    Get full text
    Journal Article
  3. 3

    A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces by Abd El-Latif, Ahmed A., Li, Li, Wang, Ning, Han, Qi, Niu, Xiamu

    Published in Signal processing (01-11-2013)
    “…How to protect the secret information is an important issue in commercial or military application. Attributed to quantum chaotic system that can be…”
    Get full text
    Journal Article
  4. 4

    Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images by Li, Li, Abd El-Latif, Ahmed A., Niu, Xiamu

    Published in Signal processing (01-04-2012)
    “…This paper proposes an encryption scheme with a new additive homomorphism based on Elliptic Curve ElGamal (EC-ElGamal) for sharing secret images over unsecured…”
    Get full text
    Journal Article
  5. 5

    A weak blind signature scheme based on quantum cryptography by Wen, Xiaojun, Niu, Xiamu, Ji, Liping, Tian, Yuan

    Published in Optics communications (15-02-2009)
    “…In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein–Padolsky–Rosen) pairs. Different from classical blind…”
    Get full text
    Journal Article
  6. 6

    A hybrid chaotic system and cyclic elliptic curve for image encryption by Abd El-Latif, Ahmed A., Niu, Xiamu

    “…Recently, several image encryption schemes based on chaotic maps have been proposed. Nevertheless, most of them hinder the system performance, security, and…”
    Get full text
    Journal Article
  7. 7

    An Aeromagnetic Compensation Coefficient-Estimating Method Robust to Geomagnetic Gradient by Dou, Zhenjia, Han, Qi, Niu, Xiamu, Peng, Xiang, Guo, Hong

    Published in IEEE geoscience and remote sensing letters (01-05-2016)
    “…Most existing methods used in aeromagnetic compensation assume a constant geomagnetic field. These methods do not take into consideration the geomagnetic…”
    Get full text
    Journal Article
  8. 8

    Quantum realization of the nearest-neighbor interpolation method for FRQI and NEQR by Sang, Jianzhi, Wang, Shen, Niu, Xiamu

    Published in Quantum information processing (01-01-2016)
    “…This paper is concerned with the feasibility of the classical nearest-neighbor interpolation based on flexible representation of quantum images (FRQI) and…”
    Get full text
    Journal Article
  9. 9

    Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion by Wang, XiaoTong, Shao, ChengYong, Xu, XiaoGang, Niu, XiaMu

    “…Reversible watermarking is suitable for hiding data in 2-D vector maps because the distortions induced by data embedding can be removed after extracting the…”
    Get full text
    Journal Article
  10. 10

    An Adaptive Filter for Aeromagnetic Compensation Based on Wavelet Multiresolution Analysis by Dou, Zhenjia, Han, Qi, Niu, Xiamu, Peng, Xiang, Guo, Hong

    Published in IEEE geoscience and remote sensing letters (01-08-2016)
    “…In aeromagnetic compensation, the multicolinearity of the Tolles-Lawson model is one of the main factors limiting the performance of the coefficient-estimating…”
    Get full text
    Journal Article
  11. 11

    Robust Speech Hashing for Content Authentication by Yuhua Jiao, Yuhua Jiao, Liping Ji, Liping Ji, Xiamu Niu, Xiamu Niu

    Published in IEEE signal processing letters (01-09-2009)
    “…Robust hashing for multimedia authentication is an emerging research area. A novel key-dependent robust speech hashing based on speech production model is…”
    Get full text
    Journal Article
  12. 12

    Dynamic watermarking scheme for quantum images based on Hadamard transform by Song, Xianhua, Wang, Shen, A. Abd El-Latif, Ahmed, Niu, Xiamu

    Published in Multimedia systems (2014)
    “…In this paper, a novel watermarking scheme for quantum images based on Hadamard transform is proposed. In the new scheme, a unitary transform controlled by a…”
    Get full text
    Journal Article
  13. 13

    A Novel DIBR 3D Image Watermarking Algorithm Resist to Geometrical Attacks by Wang, Shen, Cui, Chen, Niu, Xiamu

    Published in Chinese Journal of Electronics (01-11-2017)
    “…A histogram shape based method is utilized to design watermarking algorithm to protect the Depthimage‐based rendering (DIBR) 3D images. To make the…”
    Get full text
    Journal Article
  14. 14

    Quality Assessment for Reassembled Image Files by Wu, Xianyan, Han, Qi, Niu, Xiamu

    Published in IEEE signal processing letters (01-02-2016)
    “…Reassembling fragmented image files plays a crucial role in seizing digital evidence from scattered digital image files. However, little attention has been…”
    Get full text
    Journal Article
  15. 15

    Novel Similarity Measurements for Reassembling Fragmented Image Files by Wu, Xianyan, Han, Qi, Niu, Xiamu, Zhang, Hongli

    Published in Chinese Journal of Electronics (01-03-2019)
    “…Reassembling fragmented image files is a useful technique to seize image evidence in digital forensics. A key problem of reassembly is how to measure the…”
    Get full text
    Journal Article
  16. 16

    Saliency detection based on integrated features by Jing, Huiyun, He, Xin, Han, Qi, Abd El-Latif, Ahmed A., Niu, Xiamu

    Published in Neurocomputing (Amsterdam) (10-04-2014)
    “…This paper presents a novel computational model for saliency detection. The proposed model utilizes feature level fusion method to integrate different kinds of…”
    Get full text
    Journal Article Conference Proceeding
  17. 17

    A new image encryption scheme based on cyclic elliptic curve and chaotic system by El-Latif, Ahmed A. Abd, Li, Li, Niu, Xiamu

    Published in Multimedia tools and applications (01-06-2014)
    “…Recently, several cryptosystems based on chaos have been proposed. Nevertheless, most of them hinder the system performance, security, and suffer from the…”
    Get full text
    Journal Article
  18. 18

    Quantum Cosine Transform Based Watermarking Scheme for Quantum Images by Wang, Shen, Song, Xianhua, Niu, Xiamu

    Published in Chinese Journal of Electronics (01-04-2015)
    “…A novel watermarking scheme for quantumimage is proposed based on Quantum cosine transform(QCT). The cosine coefficients are extracted by executingQCT on…”
    Get full text
    Journal Article
  19. 19

    Background contrast based salient region detection by Jing, Huiyun, He, Xin, Han, Qi, Niu, Xiamu

    Published in Neurocomputing (Amsterdam) (26-01-2014)
    “…This paper proposes a novel salient region detection method based on background contrast. Salient regions are widely considered as those distinct to the image…”
    Get full text
    Journal Article
  20. 20

    Toward accurate localization and high recognition performance for noisy iris images by Wang, Ning, Li, Qiong, Abd El-Latif, Ahmed A., Zhang, Tiejun, Niu, Xiamu

    Published in Multimedia tools and applications (01-08-2014)
    “…Iris recognition plays an important role in biometrics. Until now, many scholars have made different efforts in this field. However, the recognition…”
    Get full text
    Journal Article