Bin Ma

ORCID: 0000-0002-9030-7393
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Speech Recognition and Synthesis
  • Speech and Audio Processing
  • Biometric Identification and Security
  • Image Processing Techniques and Applications
  • Advanced Image Processing Techniques
  • Generative Adversarial Networks and Image Synthesis
  • Cognitive Radio Networks and Spectrum Sensing
  • Algorithms and Data Compression
  • Adversarial Robustness in Machine Learning
  • Advanced Image and Video Retrieval Techniques
  • Image and Video Stabilization
  • Image Retrieval and Classification Techniques
  • Image and Signal Denoising Methods
  • Anomaly Detection Techniques and Applications
  • Wireless Communication Networks Research
  • User Authentication and Security Systems
  • Advanced Vision and Imaging
  • Energy Efficient Wireless Sensor Networks
  • Music and Audio Processing
  • Advanced Data Compression Techniques
  • Reconstructive Surgery and Microvascular Techniques
  • Vehicle License Plate Recognition

Qilu University of Technology
2016-2025

Shandong Academy of Sciences
2018-2025

Shandong University
2010-2024

Liaoning Cancer Hospital & Institute
2023-2024

China Medical University
2023-2024

Guangdong Ocean University
2023

Lanzhou University Second Hospital
2023

Lanzhou University
2021-2023

Alibaba Group (United States)
2019-2023

Shanghai University
2022-2023

A new class of distances appropriate for measuring similarity relations between sequences, say one type per distance, is studied. We propose a "normalized information distance," based on the noncomputable notion Kolmogorov complexity, and show that it in this minorizes every computable distance (that is, universal discovers all similarities). demonstrate metric call . This theory forms foundation practical tool. To evidence generality robustness, we give two distinctive applications widely...

10.1109/tit.2004.838101 article EN IEEE Transactions on Information Theory 2004-11-30

Abstract Motivation: Genomics and proteomics studies routinely depend on homology searches based the strategy of finding short seed matches which are then extended. The exploding genomic data growth presents a dilemma for DNA search techniques: increasing size decreases sensitivity whereas decreasing slows down computation. Results: We present new algorithm ‘PatternHunter’ that uses novel model increased hit-processing techniques significantly speed. At Blast levels sensitivity,...

10.1093/bioinformatics/18.3.440 article EN Bioinformatics 2002-03-01

In the past two decades, reversible data hiding (RDH), also referred to as lossless or invertible hiding, has gradually become a very active research area in field of hiding. This been verified by more and papers on increasingly wide-spread subjects RDH that have published these days. this paper, various algorithms researches classified into following six categories: 1) image spatial domain; 2) compressed domain (e.g., JPEG); 3) suitable for semi-fragile authentication; 4) with contrast...

10.1109/access.2016.2573308 article EN cc-by-nc-nd IEEE Access 2016-01-01

Due to their good rotational invariance and stability, image continuous orthogonal moments are intensively applied in rotationally invariant recognition processing. However, most produce numerical instability, which impacts the reconstruction performance. In this paper, a new set of moments, polar harmonic Fourier (PHFMs), free instability is designed. The radial basis functions (RBFs) PHFMs much simpler than those Chebyshev-Fourier (CHFMs), Fourier-Mellin (OFMMs), Zernike (ZMs),...

10.1109/tcsvt.2019.2960507 article EN IEEE Transactions on Circuits and Systems for Video Technology 2019-12-18

Arc-annotated sequences are useful in representing the structural information of RNA sequences. In general, secondary and tertiary structures can be represented as a set nested arcs crossing arcs, respectively. Since functions largely determined by molecular confirmation therefore structures, comparison between has received much attention recently. this paper, we propose notion edit distance to measure similarity two incorporating various operations performed on both bases (i.e.,...

10.1089/10665270252935511 article EN Journal of Computational Biology 2002-04-01

In this paper, a novel code division multiplexing (CDM) algorithm-based reversible data hiding (RDH) scheme is presented. The covert are denoted by different orthogonal spreading sequences and embedded into the cover image. original image can be completely recovered after have been extracted exactly. Walsh Hadamard matrix employed to generate sequences, which overlappingly without interfering each other, multilevel embedding utilized enlarge capacity. Furthermore, most elements of mutually...

10.1109/tifs.2016.2566261 article EN IEEE Transactions on Information Forensics and Security 2016-05-10

While existing watermarking attack methods can disturb the correct extraction of watermark information, visual quality watermarked images will be greatly damaged. Therefore, a concealed based on generative adversarial network and perceptual losses for robust is proposed. First, image utilized as input networks, its generating target (i.e. attacked image) original image. Inspired by U-Net network, networks consist encoder-decoder architecture with skip connection, which combine low-level...

10.1109/tcsvt.2021.3138795 article EN IEEE Transactions on Circuits and Systems for Video Technology 2021-12-27

An efficient predictor is crucial for high embedding capacity and low image distortion. In this letter, a ridge regression-based precision error prediction algorithm reversible data hiding proposed. The regression penalized least-square algorithm, which solves the overfitting problem of method. Reversible based on minimizes residual sum squares between predicted target pixels subject to constraint expressed in terms L2-norm. Compared least-square-based predictor, can obtain more small...

10.1109/lsp.2021.3080181 article EN IEEE Signal Processing Letters 2021-01-01

Some research progress has been made on fractional-order continuous orthogonal moments (FrCOMs) in the past two years. Compared with integer-order (InCOMs), FrCOMs increase number of affine invariants and effectively improve numerical stability. However, existing types are still very limited, which all planar image oriented. No report stereoscopic images is available yet. To this end, paper, corresponding to various InCOMs first deduced, then, they combined trinion theory construct (TFrCOMs)...

10.1109/tcsvt.2021.3094882 article EN IEEE Transactions on Circuits and Systems for Video Technology 2021-07-05

Convolutional recurrent networks (CRN) integrating a convolutional encoder-decoder (CED) structure and have achieved promising performance for monaural speech enhancement. However, feature representation across frequency context is highly constrained due to limited receptive fields in the convolutions of CED. In this paper, we propose (CRED) boost along axis. The CRED applies recurrence on 3D maps axis following each convolution, therefore, it capable catching long-range correlations...

10.1109/icassp43922.2022.9747578 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2022-04-27

An important phase of sensor networks operation is deployment sensors in the field interest. Critical goals during include coverage, connectivity, load balancing, etc. A class work has recently appeared, where mobility leveraged to meet objectives. In this paper, we study using mobile sensors. The distinguishing feature our that model have limited mobilities. More specifically, consider restricted a flip, distance flip bounded. We call such as flip-based Given an initial field, problem...

10.1109/tpds.2007.28 article EN IEEE Transactions on Parallel and Distributed Systems 2007-01-10

Most current reversible data hiding (RDH) techniques are designed for uncompressed images. However, JPEG images more commonly used in our daily lives. Up to now, several RDH methods have been proposed, yet few of them investigated the adaptive embedding as lack accurate measurement distortion. To realize and optimize performance, this article, a novel scheme based on multiple histogram modification (MHM) rate-distortion optimization is proposed. Firstly, with selected coefficients,...

10.1109/tcsvt.2020.3027391 article EN IEEE Transactions on Circuits and Systems for Video Technology 2020-09-30

This article proposes a novel grayscale image steganography scheme that is capable of hiding an encrypted secret into cover the same size. The using chaos encryption technology before being hidden. and are then transformed steg by convolutional neural network (CNN). Also, generative adversarial (GAN) adopted to produce more realistic image, whose appearance difficult distinguish from image. composed three CNNs which regarded as network, discriminative extracting respectively. Additionally,...

10.1109/access.2020.3021103 article EN cc-by IEEE Access 2020-01-01

Deep complex U-Net structure and convolutional recurrent network (CRN) achieve state-of-the-art performance for monaural speech enhancement. Both deep CRN are encoder decoder structures with skip connections, which heavily rely on the representation power of complex-valued layers. In this paper, we propose a block attention module (CCBAM) to boost layers by constructing more informative features. The CCBAM is lightweight general can be easily integrated into any We integrate enhance their...

10.1109/icassp39728.2021.9414569 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2021-05-13

Finger veins are widely used in various fields due to their high safety. Existing finger vein recognition methods have some shortcomings, such as low accuracy and large model size. To address these a multi-scale feature bilinear fusion network (MSFBF-Net) was designed. First, the extracts global features local detail of performs linear obtain second-order with richer information. Then, mixed depthwise separable convolution replaces ordinary convolution, which greatly reduces computational...

10.1038/s41598-023-27524-4 article EN cc-by Scientific Reports 2023-01-05

Aiming at the problem of most Robust Reversible Data Hiding (RRDH) schemes failing to anti geometric deformation attacks, a new RRDH algorithm based on Polar Harmonic Fourier Moments (PHFMs) is presented in this paper, thereby enhancing both robustness embedded data and perceptual quality data-embedded image. Firstly, by leveraging anti-geometric transformation high-fidelity features PHFMs, image transformed into its frequency domain for RRDH. Then, quantitation index modulation (QIM)...

10.1109/tcsvt.2023.3311483 article EN IEEE Transactions on Circuits and Systems for Video Technology 2023-09-04

Face Recognition (FR) systems, while widely used across various sectors, are vulnerable to adversarial attacks, particularly those based on deep neural networks. Despite existing efforts enhance the robustness of FR models, they still face risk secondary attacks. To address this, we propose a novel approach employing "strengthened face" with preemptive defensive perturbations. Strengthened ensures original recognition accuracy safeguarding systems against In white-box scenario, strengthened...

10.1109/tai.2025.3527923 article EN IEEE Transactions on Artificial Intelligence 2025-01-01
Coming Soon ...