- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Neonatal Respiratory Health Research
- Mobile Agent-Based Network Management
- Infant Nutrition and Health
- Soil Mechanics and Vehicle Dynamics
- Congenital Diaphragmatic Hernia Studies
- Image Processing and 3D Reconstruction
- Landslides and related hazards
- Advanced Image Fusion Techniques
- Multimedia Communication and Technology
- Tree Root and Stability Studies
- Network Traffic and Congestion Control
- Image Processing Techniques and Applications
- Ideological and Political Education
Xuzhou University of Technology
2008-2022
Dalian University
2016-2022
Dalian University of Technology
2016-2022
Guangxi University of Science and Technology
2021
Bronchopulmonary dysplasia (BPD) is one of the most common complications in premature infants. This disease caused by long-time use supplemental oxygen, which seriously affects lung function child and imposes a heavy burden on family society. research aims to adopt method ensemble learning machine learning, combining Boruta algorithm random forest determine predictors infants with BPD establish predictive model help clinicians conduct an optimal treatment plan. Data were collected from...
A novel binary image digital watermarking algorithm based on DWT and chaotic encryption is proposed. The proposed scheme utilized the Logistic sequences generalized cat mapping to scramble watermarks, so that security of embedding watermarks was enhanced. improved method are embedded low frequency coefficients deep wavelet domain. original not required for detecting .Using statistical veracity improved. experimental results show watermark robust against cut attack, salt-pepper noise JPEG et al.
In this article, based on wavelet reconstruction and fractal dimension, a medical image authentication method is implemented. According to the local global methods, regularity of mutation structure in carrier information analyzed through measurement defined transformation domain. To eliminate redundancy reconstructed data, dimension used reduce attributes coefficients. singularity block information, key features are extracted feature constructed as images. The experimental results show that...
The transmission of digital medical information is affected by data compression, noise, scaling, labeling, and other factors. At the same time, may be illegally copied maliciously tampered with without authorization. Therefore, copyright protection integrity authentication are worthy attention. In this paper, based on wavelet packet energy entropy, a new method image designed. proposed uses sliding window to measure detail information. time-frequency distribution, local details mined....
In this paper, we aimed to discuss the security authentication requirements of medical images in network, and a method is designed based on fractal visual cryptography. Based discrete Brownian random field model, gray-level statistical information spatial structure fully mined. The gray distribution expressed form features. By using data mining methods, space analyzed, by stability energy structure, features are formed. Using cryptography (VC), robustness further enhanced. Through...
The paper,by adopting jointly Artificial Neural Network(ANN),general Amold mapping,and statistical methods,intends to formulate an algorithm based on image spatial domain watermark.While the ANN was used as texture analyzer of original image,the zone would be given prominently.The safety watermark improved by using amold mapping rearrangement.An optimizing strategy minimizing changes pixels adopted when is embedded.The application method guaranteed sightlessness and robustness digital...
On the basis of analyzing traffic actuality, a set video attemper system based on IP network is designed. Capable reliably transmitting video, audio, record and other monitoring information, this described with respect to its structure work flow. Some pivotal technologies involved in system, such as clipping method used clip input data, distributing strategy matrix, are analyzed detail. At last, typical applications intelligent transportation analyzed. It has been proved that can meet...