Jinkun You

ORCID: 0000-0003-1991-1851
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Face and Expression Recognition
  • Cellular Automata and Applications

University of Macau
2024

Shenzhen Institutes of Advanced Technology
2021-2022

University of Chinese Academy of Sciences
2022

Chinese Academy of Sciences
2021-2022

Spread spectrum (SS) watermarking has gained significant attention as it prevents attackers from reading, tampering with, or removing watermarks. Secret key estimation can help with the first two unauthorized operations but cannot remove Moreover, existing deep-learning watermark removal methods do not consider characteristics of SS watermarking, thus leading to unsatisfactory results. In this paper, we design a secret method that treats binary classification problem and updates estimated...

10.1109/tmm.2024.3370380 article EN IEEE Transactions on Multimedia 2024-01-01

Over the past two decades, spread spectrum (SS) embedding has been widely used in digital watermarking due to its competitive performance robustness and security. However, of existing secure SS methods, such as natural (NW) robust-NW (RNW), is still weak. In this article, we propose a new method named truncated-RNW (TRNW), which improves RNW while maintaining same security level. The main idea TRNW move RNW-watermarked correlations within an origin-centered sphere onto spherical surface...

10.1109/tcsvt.2021.3065199 article EN IEEE Transactions on Circuits and Systems for Video Technology 2021-03-10

The security of spread spectrum (SS) watermarking largely depends on the difficulty estimating its secret key. Some estimators have been proposed to estimate key in known-message attack (KMA) scenario. However, estimation accuracies existing are not satisfactory when number observations is large enough. Currently, it still a challenging and open problem design more effective estimators. In this paper, we propose an equivalent keys (EK)-based estimator for both traditional secure SS methods....

10.1109/tmm.2022.3147379 article EN IEEE Transactions on Multimedia 2022-02-01

Subspace learning has been widely applied for joint feature extraction and dimensionality reduction, demonstrating significant efficacy. Numerous subspace methods with diverse assumptions regarding the criteria target subspaces have developed to obtain compact interpretable data representations. However, when image data, existing fail fully exploit inherent correlations within set. This paper proposes a Robust Discriminative t-Linear Learning model (RDtSL) tackle this issue using t-product....

10.1109/tcsvt.2024.3375997 article EN IEEE Transactions on Circuits and Systems for Video Technology 2024-03-14
Coming Soon ...