Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Robust Watermarking Algorithm for Medical Images Based on Non-Subsampled Shearlet Transform and Schur Decomposition

    Meng Yang1, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2, Chunyan Shao1, Yen-Wei Chen3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5539-5554, 2023, DOI:10.32604/cmc.2023.036904

    Abstract With the development of digitalization in healthcare, more and more information is delivered and stored in digital form, facilitating people’s lives significantly. In the meanwhile, privacy leakage and security issues come along with it. Zero watermarking can solve this problem well. To protect the security of medical information and improve the algorithm’s robustness, this paper proposes a robust watermarking algorithm for medical images based on Non-Subsampled Shearlet Transform (NSST) and Schur decomposition. Firstly, the low-frequency subband image of the original medical image is obtained by NSST and chunked. Secondly, the Schur decomposition of low-frequency blocks to get stable values, extracting… More >

  • Open Access

    ARTICLE

    Webpage Matching Based on Visual Similarity

    Mengmeng Ge1, Xiangzhan Yu1,*, Lin Ye1,2, Jiantao Shi1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3393-3405, 2022, DOI:10.32604/cmc.2022.017220

    Abstract With the rapid development of the Internet, the types of webpages are more abundant than in previous decades. However, it becomes severe that people are facing more and more significant network security risks and enormous losses caused by phishing webpages, which imitate the interface of real webpages and deceive the victims. To better identify and distinguish phishing webpages, a visual feature extraction method and a visual similarity algorithm are proposed. First, the visual feature extraction method improves the Vision-based Page Segmentation (VIPS) algorithm to extract the visual block and calculate its signature by perceptual hash technology. Second, the visual similarity… More >

  • Open Access

    ARTICLE

    Defend Against Adversarial Samples by Using Perceptual Hash

    Changrui Liu1, Dengpan Ye1, *, Yueyun Shang2, Shunzhi Jiang1, Shiyu Li1, Yuan Mei1, Liqiang Wang3

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1365-1386, 2020, DOI:10.32604/cmc.2020.07421

    Abstract Image classifiers that based on Deep Neural Networks (DNNs) have been proved to be easily fooled by well-designed perturbations. Previous defense methods have the limitations of requiring expensive computation or reducing the accuracy of the image classifiers. In this paper, we propose a novel defense method which based on perceptual hash. Our main goal is to destroy the process of perturbations generation by comparing the similarities of images thus achieve the purpose of defense. To verify our idea, we defended against two main attack methods (a white-box attack and a black-box attack) in different DNN-based image classifiers and show that,… More >

  • Open Access

    ARTICLE

    A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on DTCWT-DCT and Chaotic Map

    Jing Liu1,5, Jingbing Li1,*, Jieren Cheng1, Jixin Ma2, Naveed Sadiq3, Baoru Han4, Qiang Geng5, Yang Ai5

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 889-910, 2019, DOI:10.32604/cmc.2019.06034

    Abstract In order to solve the problem of patient information security protection in medical images, whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected, a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT) and chaotic map is proposed in this paper. First, DTCWT-DCT transformation was performed on medical images, and dot product was per-formed in relation to the transformation matrix and logistic map. Inverse transformation was undertaken to obtain encrypted medical images. Then, in… More >

Displaying 1-10 on page 1 of 4. Per Page