- Advanced Steganography and Watermarking Techniques
- Chaos-based Image/Signal Encryption
- Advanced Vision and Imaging
- Digital Media Forensic Detection
- Network Traffic and Congestion Control
- Advanced Image Processing Techniques
- Advanced Data Compression Techniques
- Image and Video Quality Assessment
- Optical measurement and interference techniques
- Peer-to-Peer Network Technologies
- Image Processing Techniques and Applications
- Advanced Wireless Network Optimization
- Stability and Control of Uncertain Systems
- Advanced Numerical Analysis Techniques
- Robotics and Sensor-Based Localization
- Electrical and Bioimpedance Tomography
- Flow Measurement and Analysis
- 3D Shape Modeling and Analysis
- Advanced X-ray Imaging Techniques
- Control Systems and Identification
- Wireless Signal Modulation Classification
- Medical Imaging Techniques and Applications
- Blind Source Separation Techniques
- Advanced Control Systems Optimization
- Advanced Measurement and Metrology Techniques
Ministry of Education
2023
Inner Mongolia University
2023
Wuhu Hit Robot Technology Research Institute
2023
China Automotive Engineering Research Institute
2023
Purdue University West Lafayette
2012
New Jersey Institute of Technology
1989-2005
Sun Yat-sen University
2003
Shantou University
2002
In this letter, we present a novel objective distortion measure for binary document images. This is based on the reciprocal of distance that straightforward to calculate. Our results show proposed matches well subjective evaluation by human visual perception.
In this paper, a general blind image steganalysis system is proposed, in which the statistical moments of characteristic functions prediction-error image, test and their wavelet subbands are selected as features. Artificial neural network utilized classifier. The performance proposed significantly superior to prior arts.
In this paper, we propose a DWT-based video watermarking algorithm. It embeds multiple information bits into uncompressed sequences. Its features include: i) embedding data in the LL subband; ii) reducing error probabilities of detection by exploiting BCH code; iii) combating bursts errors using novel 3-D interleaving technique; iv) developing an effective temporal synchronization technique (compared with sliding correlation proposed Hartung and Girod, our is more advance); v) valid secure...
This paper proposes a novel approach to high capacity lossless data hiding based on integer wavelet transform, which embeds into the most insensitive bit-planes of coefficients. Specifically, three methods, namely A, B and C are proposed. Method A is traditional technique, can losslessly recover original image. The reach 1/10 volume that image occupies histogram modification used prevent over/underflow. not technique. It only pre-processed instead However, 1/2 occupies. has better visual...
A novel formatted text document data hiding algorithm, called inter-word space modulation (ISM) scheme, is proposed in which the spaces between neighboring words are modulated to hide data. In contrast prior arts, this method does not require original documents for hidden extraction. The robust printing, copying and scanning. Our experiments show that after ten times of repeated copying, followed by scanning, can still be extracted without a single bit error. It expected it find wide...
The watermark embedding strategy is one of factors that affect the robustness watermark. In this paper, a new based on discrete wavelet transform (DWT) proposed. Different from existing schemes DWT which have explicitly excluded LL subband coefficients embedding, we claim watermarks should be embedded in first, and then high frequency subbands according to visual significance subbands. We compared performance our with commonly used ones, confirming superiority proposed strategy. Based...
Hiding a gray scale image encounters some difficulties. In this paper, DCT-based hiding algorithm is proposed. The bit rate of the hidden reduced by applying an compression technique. To extract data from corrupted watermarked image, BCH coding and matched filtering are applied. With proposed algorithm, we hide 64/spl times/64/spl times/8 in 512/spl times/512/spl times/8. experimental results demonstrated that embedded can be extracted reliably noisy images.
A watermark signal, which is a unique sequence of random variables, by itself does not give decisive indication ownership. This work addresses the need to include meaningful information such that string English characters, numbers, and punctuation embedded within while signal remains variables. We attempt provide answers for (1) maximum number symbols can carry, (2) most practical reliable way implement this. approached this problem as power constrained multiple signaling over an AWGN channel.
Variable bit rate (VBR) video traffic exhibits high burstiness and long range dependence properties, which, in conjunction with the stringent quality of service (QoS) requirements, pose a great challenge transporting over communication network. The authors propose QoS guaranteed bandwidth allocation for given resource utilisation. Simulation analytical results demonstrate that this scheme provides delay achieves
This paper introduces a new angle for enhancing the robustness of information symbols embedded in video sequences. The main idea is to apply 3D interleaving watermark signal. We first briefly explain technique used, then demonstrate increased signal as result interleaving. Simulation results are shown two types burst errors, error clusters and frame loss.
Robustness is one of the fundamental requirements digital watermarking for some applications. By modeling as communications, many authors proposed to use error correcting coding (ECC) improve robustness. However, a fact has long been neglected. That is, due requirement imperceptibility watermarking, redundancy introduced by ECC will lead decrease watermark strength. Hence, question arises. Could effectively robustness watermark? This paper investigates this problem from both theoretical...
A simple approach to model MPEG coded video traffic is proposed. The idea first decompose the into three components, corresponding I, P, and B frames, each modeled by a self-similar process. These processes are then structurally modulated in manner similar how frames grouped GOP (Group of Pictures) pattern. new shown be able capture statistical properties (both LRD SRD) traffic.
Markov modulated self-similar processes are proposed to model MPEG video sequences that can capture the LRD (long range dependency) characteristics of ACF (auto-correlation function). An compressed sequence is decomposed into three parts according different motion/change complexity such each part individually be described by a process. Beta distribution used characterize marginal cumulative function (CDF) processes, and chain govern transition among these processes. Network cell loss rate...
The initial weld position of large complex components has the characteristics irregular shape and random spatial distribution. Traditional welding robots have technical bottlenecks such as low teaching programming efficiency difficulty in offline this application scenario. Therefore, at present, method "workers piling up" is used to components. To overcome these problems, it necessary urgent develop intelligent identification for based on machine vision. Firstly, theoretical background...
The Krascheninnikovia compacta community is primarily distributed in extremely cold and arid high-altitude environments typically inaccessible to humans.It represents the most common widely type of vegetation alpine deserts Qingzang Plateau.Most investigations into this take form qualitative descriptions, which fail provide precious sample data.In order generate a dataset K. compacta, paper recorded organized spatial distribution, characteristics structure, climate species based on field...
In this paper, a Kalman filter-based algorithm for 3-D motion estimation from stereo image sequence using the unified temporal-spatial optical flow field (UOFF) has been proposed. The modeling problem is discussed first. More consideration given to determining covariance matrices system noise and sensor than previous works filtering in processing. newly visible areas, i.e., disocclusion issue, which have not considered most of works, are handled our by threshold method. Two experiments...
Through a linear fractional transformation in the frequency domain, set of hyperellipsoids, containing only such points coefficient space which correspond to stable polynomials discrete-time systems, was obtained. Procedures for searching suitable transform parameter beta that will achieve possibly larger perturbation range (with guaranteed stability) than obtained by C.B. Soh et al. (1985) are presented. When =0, hyperellipsoid degenerates largest hypersphere. The result this work is,...
A method of automatically classifying fingerprints into three groups, whorl, loop, and arch is described. It can help medical scientists to study the relationship between fingerprint patterns disorders, such as breast cancer. In research, a frequency domain approach that uses feature Fourier spectrum was developed; is, prominent peaks in give principal direction patterns. Using above feature, authors obtain every subregion. The pattern whole image then be determined. allows one classify...
To guarantee quality of service (QoS), the requirements for video transmission, such as delay and cell loss rate (CLR), are very stringent. These constraints difficult to meet if high network utilization is desired. In this paper, online dynamic bandwidth allocation algorithms, in which adjusted based on current frame size, proposed improve utilization. When deviation large enough, a re-negotiation process triggered. Compared with constant bit-rate (CBR) service, can be improved...
Abstract In Jiang (1988), a condition is given which supposedly necessary and sufficient for the stability of interval matrices in discrete-time systems. We demonstrate, via counter-example, that is, fact, not sufficient.