- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Chaos-based Image/Signal Encryption
- Internet Traffic Analysis and Secure E-voting
- Vehicle License Plate Recognition
- Advanced Image and Video Retrieval Techniques
- Biometric Identification and Security
- Image and Video Stabilization
- Image and Signal Denoising Methods
- User Authentication and Security Systems
- Ferroelectric and Piezoelectric Materials
- Acoustic Wave Resonator Technologies
- Generative Adversarial Networks and Image Synthesis
- Microwave Dielectric Ceramics Synthesis
- IoT and Edge/Fog Computing
- Metamaterials and Metasurfaces Applications
- Advanced Antenna and Metasurface Technologies
- Advanced Data Compression Techniques
- Caching and Content Delivery
- Video Surveillance and Tracking Methods
- Wood and Agarwood Research
- Image Enhancement Techniques
- Advanced Wireless Communication Technologies
- Visual Attention and Saliency Detection
- Cloud Data Security Solutions
Sichuan University
2015-2025
Chengdu University
2025
PLA Information Engineering University
2021-2025
Northeastern University
2024
Institute of Software
2024
China University of Petroleum, East China
2024
Chongqing University of Posts and Telecommunications
2024
Zhengzhou University of Science and Technology
2017-2023
Zhejiang Science and Technology Information Institute
2023
Jinan University
2023
Adaptive JPEG steganographic schemes are difficult to preserve the image texture features in all scales and orientations when embedding changes constrained complicated regions, then a steganalysis feature extraction method is proposed based on 2 dimensional (2D) Gabor filters. The 2D filters have certain optimal joint localization properties spatial domain frequency domain. They can describe from different orientations, therefore of statistical characteristics caused by steganography be...
Steganography detection based on Rich Model features is a hot research direction in steganalysis. However, rich model usually result large computation cost. To reduce the dimension of steganalysis and improve efficiency algorithm, differing from previous works that normally proposed new feature extraction this paper proposes general selection method decision rough set α-positive region reduction. First, it pointed out reduction suitable for selection. Second, quantization attribute...
Considering that traditional image steganography technologies suffer from the potential risk of failure under lossy channels, an enhanced adaptive with multiple robustness against processing attacks is proposed, while maintaining good detection resistance. First, a robust domain constructing method proposed utilizing element extraction and optimal modification, which can be applied to both spatial JPEG images. Then, based on "Robust Domain Constructing + RS-STC Codes," combined cover...
In order to safeguard image copyrights, zero-watermarking technology extracts robust features and generates watermarks without altering the original image. Traditional methods rely on handcrafted feature descriptors enhance their performance. With advancement of deep learning, this paper introduces “ZWNet”, an end-to-end scheme that obviates necessity for specialized knowledge in is exclusively composed artificial neural networks. The architecture ZWNet synergistically incorporates ConvNeXt...
Current typical adaptive Steganography algorithms cannot extract the embedded secret messages correctly after compression. In order to solve this problem, a JPEG-compression resistant steganography algorithm is proposed. Utilizing relationship between DCT coefficients, domain of embedding determined. The modifying magnitude different coefficients can be determined according quality factors JPEG To ensure completely correct extraction compression, RS codes used encode embedded. Besides, based...
The CAPTCHA has become an important issue in multimedia security. Aimed at a commonly used text-based CAPTCHA, this paper outlines some typical methods and summarizes the technological progress breaking. First, presents comprehensive review of recent developments breaking field. Second, framework technique is proposed. And mainly consists preprocessing, segmentation, combination, recognition, postprocessing, other modules. Third, research involved each module introduced, segmentation...
A robust audio watermarking method based on the time‐spread (TS) echo hiding scheme is proposed. Compared with existing TS methods, approach more as it exploits characteristics of host signals in encoding stage. Theoretical analysis and simulation examples demonstrate effectiveness advantages method.
Steganalysis feature selection shows excellent effectiveness on elevating the detection efficiency and decreasing time-space cost. However, single evaluation criterion for features subjective basis always lead to valuable neglect, which restricts improvement of accuracy. To alleviate this predicament, paper proposes a steganalysis method based multidimensional dynamic threshold allocation (MEDTA method). Firstly, measure components' contribution degree detection, concept partial entropy...
Traditional steganography methods are usually designed on a lossless channel; thus, messages often not extracted correctly from an image transmitted over lossy channel that includes attacks such as scaling. To address this issue, in recent years, the field of robust has emerged. In paper, process scaling by interpolation is first observed and serves basis for proposing idea inverse interpolation. Subsequently, constructing equation set proposed to solve problem intersectional blocks during...
With the rapid proliferation of urbanization, massive data in social networks are collected and aggregated real time, making it possible for criminals to use images as a cover spread secret information on Internet. How determine whether these contain is huge challenge multimedia computing security. The steganalysis method based deep learning can effectively judge pictures transmitted Internet urban scenes information, which great significance safeguarding national Image has powerful ability...
With the dimension of steganalysis feature increases rapidly, ensemble has become trend, and its performance is greatly influenced by selection subspaces. In order to select subspaces more effectively improve steganalysis, a subspace algorithm based on Fisher criterion proposed. The proposed computes weight for each component according value base probability value, then selects components with probabilities in proportion their weights. When it used appropriate searched steps. Experimental...
Besides vehicle both pedestrian and bicycle are two primary components in urban traffic flow. Video object tracking is an important method of information detection ITS. This system implements approach for detecting pedestrians bicycles scenes by means feature-based reason on visual data. In the video monitoring system, matching often used to find position moving image sequence. paper tried propose improved algorithm corner feature extraction, using motion a classification. Experiment results...