Tiankai Sun

ORCID: 0000-0003-0417-8044
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Neonatal Respiratory Health Research
  • Mobile Agent-Based Network Management
  • Infant Nutrition and Health
  • Soil Mechanics and Vehicle Dynamics
  • Congenital Diaphragmatic Hernia Studies
  • Image Processing and 3D Reconstruction
  • Landslides and related hazards
  • Advanced Image Fusion Techniques
  • Multimedia Communication and Technology
  • Tree Root and Stability Studies
  • Network Traffic and Congestion Control
  • Image Processing Techniques and Applications
  • Ideological and Political Education

Xuzhou University of Technology
2008-2022

Dalian University
2016-2022

Dalian University of Technology
2016-2022

Guangxi University of Science and Technology
2021

Bronchopulmonary dysplasia (BPD) is one of the most common complications in premature infants. This disease caused by long-time use supplemental oxygen, which seriously affects lung function child and imposes a heavy burden on family society. research aims to adopt method ensemble learning machine learning, combining Boruta algorithm random forest determine predictors infants with BPD establish predictive model help clinicians conduct an optimal treatment plan. Data were collected from...

10.3389/fped.2021.719352 article EN cc-by Frontiers in Pediatrics 2021-08-17

A novel binary image digital watermarking algorithm based on DWT and chaotic encryption is proposed. The proposed scheme utilized the Logistic sequences generalized cat mapping to scramble watermarks, so that security of embedding watermarks was enhanced. improved method are embedded low frequency coefficients deep wavelet domain. original not required for detecting .Using statistical veracity improved. experimental results show watermark robust against cut attack, salt-pepper noise JPEG et al.

10.1109/icycs.2008.199 article EN 2008-11-01

In this article, based on wavelet reconstruction and fractal dimension, a medical image authentication method is implemented. According to the local global methods, regularity of mutation structure in carrier information analyzed through measurement defined transformation domain. To eliminate redundancy reconstructed data, dimension used reduce attributes coefficients. singularity block information, key features are extracted feature constructed as images. The experimental results show that...

10.1177/15501477211014132 article EN cc-by International Journal of Distributed Sensor Networks 2021-04-01

The transmission of digital medical information is affected by data compression, noise, scaling, labeling, and other factors. At the same time, may be illegally copied maliciously tampered with without authorization. Therefore, copyright protection integrity authentication are worthy attention. In this paper, based on wavelet packet energy entropy, a new method image designed. proposed uses sliding window to measure detail information. time-frequency distribution, local details mined....

10.3390/e24060798 article EN cc-by Entropy 2022-06-08

In this paper, we aimed to discuss the security authentication requirements of medical images in network, and a method is designed based on fractal visual cryptography. Based discrete Brownian random field model, gray-level statistical information spatial structure fully mined. The gray distribution expressed form features. By using data mining methods, space analyzed, by stability energy structure, features are formed. Using cryptography (VC), robustness further enhanced. Through...

10.1155/2020/6642586 article EN cc-by Scientific Programming 2020-12-03

The paper,by adopting jointly Artificial Neural Network(ANN),general Amold mapping,and statistical methods,intends to formulate an algorithm based on image spatial domain watermark.While the ANN was used as texture analyzer of original image,the zone would be given prominently.The safety watermark improved by using amold mapping rearrangement.An optimizing strategy minimizing changes pixels adopted when is embedded.The application method guaranteed sightlessness and robustness digital...

10.3724/sp.j.1087.2011.01505 article EN Journal of Computer Applications 2012-04-05

On the basis of analyzing traffic actuality, a set video attemper system based on IP network is designed. Capable reliably transmitting video, audio, record and other monitoring information, this described with respect to its structure work flow. Some pivotal technologies involved in system, such as clipping method used clip input data, distributing strategy matrix, are analyzed detail. At last, typical applications intelligent transportation analyzed. It has been proved that can meet...

10.1109/emeit.2011.6023736 article EN 2011-08-01
Coming Soon ...