- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Chaos-based Image/Signal Encryption
- Cloud Computing and Resource Management
- High-Voltage Power Transmission Systems
- Icing and De-icing Technologies
- Cryptographic Implementations and Security
- Lightning and Electromagnetic Phenomena
Qiqihar University
2023-2024
Existing optical information hiding algorithms for multiple images require generating hidden keys embedded images, resulting in the transmission of numerous keys. This challenge undermines usage these low-quality networks. To address this issue and enhance efficiency, we present a multi-image algorithm based on Fourier transformation principles, which is employed to generate frequency maps carrier maps. Specific low-frequency zones are extracted within A chaotic system integrates phase mask,...
In recent years, in order to meet the huge demand for electricity brought about by economic development, many ultra-high voltage project lines China have been built one after another, alternating vertically and horizontally, gradually forming a large-scale high-voltage trunk line network. transmission world, there is lack of relevant standards operational experience. Lightning strikes as most profound influence on stable operation current line. This paper conducts an in-depth study how...
To address the problem of weak robustness some current image encryption algorithms, this paper proposes a strong robust algorithm. The Logistic chaotic system is improved to produce more random sequence distribution. plaintext hash used construct initial key and spiral matrix transformation for first scrambling. A novel cross-diffusion method constructed by introducing two values correlation val1 val2. Through sequences, it improves sensitivity, which can resist selective attack, has...
How to maximize embedding capacity is one of the current challenges in field reversible data hiding. A hiding scheme proposed based on rearrangement and compression prediction error bit-planes this paper. The image holder first predicts pixels obtain map, then decomposes them into bit-planes, rearranges compresses space, embeds auxiliary information secret freed space according certain rules generate a cryptographic image. After acquiring image, receiver extracts embedded recovers original...