Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (67)
  • Open Access

    ARTICLE

    A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on DTCWT-DCT and Chaotic Map

    Jing Liu1,5, Jingbing Li1,*, Jieren Cheng1, Jixin Ma2, Naveed Sadiq3, Baoru Han4, Qiang Geng5, Yang Ai5

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 889-910, 2019, DOI:10.32604/cmc.2019.06034

    Abstract In order to solve the problem of patient information security protection in medical images, whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected, a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT) and chaotic map is proposed in this paper. First, DTCWT-DCT transformation was performed on medical images, and dot product was per-formed in relation to the transformation matrix and logistic map. Inverse transformation was undertaken to obtain… More >

  • Open Access

    ARTICLE

    Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing

    Zhen Yang1,2, Yongfeng Huang1,2,*, Xing Li1,2, Wenyu Wang3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 1-17, 2018, DOI:10.3970/cmc.2018.03697

    Abstract To cope with privacy leakage caused by multimedia outsourcing and sharing, data provenance is used to analyze leaked multimedia and provide reactive accountability. Existing schemes of multimedia provenance are based on watermarking protocols. In an outsourcing scenario, existing schemes face two severe challenges: 1) when data leakage occurs, there exists a probability that data provenance results can be repudiated, in which case data provenance tracking fails; and 2) when outsourced data are shared, data encryption transfer causes key management burden outside the schemes, and privacy leakage threatens users. In this paper, we propose a novel More >

  • Open Access

    ARTICLE

    A Survey of Image Information Hiding Algorithms Based on Deep Learning

    Ruohan Meng1,2,*, Qi Cui1,2, Chengsheng Yuan1,2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.3, pp. 425-454, 2018, DOI:10.31614/cmes.2018.04765

    Abstract With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed. Image information hiding is to make use of the redundancy of the cover image to hide secret information in it. Ensuring that the stego image cannot be distinguished from the cover image, and sending secret information to receiver through the transmission of the stego image. At present, the model based on deep learning is also widely applied to the More >

  • Open Access

    ARTICLE

    A Robust Zero-Watermarking Based on SIFT-DCT for Medical Images in the Encrypted Domain

    Jialing Liu1, Jingbing Li1,2,*, Yenwei Chen3, Xiangxi Zou1, Jieren Cheng1,2, Yanlin Liu1, Uzair Aslam Bhatti1,2

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 363-378, 2019, DOI:10.32604/cmc.2019.06037

    Abstract Remote medical diagnosis can be realized by using the Internet, but when transmitting medical images of patients through the Internet, personal information of patients may be leaked. Aim at the security of medical information system and the protection of medical images, a novel robust zero-watermarking based on SIFT-DCT (Scale Invariant Feature Transform-Discrete Cosine Transform) for medical images in the encrypted domain is proposed. Firstly, the original medical image is encrypted in transform domain based on Logistic chaotic sequence to enhance the concealment of original medical images. Then, the SIFT-DCT is used to extract the feature More >

  • Open Access

    ARTICLE

    A Robust Image Watermarking Scheme Using Z-Transform, Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition

    N. Jayashree1,*, R. S. Bhuvaneswaran1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 263-285, 2019, DOI:10.32604/cmc.2019.03924

    Abstract Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images, videos, and audio data. Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties. This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform (DWT), Z-transform (ZT) and Bidiagonal Singular Value Decomposition (BSVD). The original image is decomposed into 3-level DWT, and then, ZT is applied on the HH3 and HL3 sub-bands. The watermark image is encrypted using Arnold Cat Map. BSVD for the More >

  • Open Access

    ARTICLE

    Self-embedding Image Watermarking based on Combined Decision Using Pre-offset and Post-offset Blocks

    Daofu Gong1,2, Yan Chen1,2, Haoyu Lu1,*, Zhenyu Li3, Yibing Han1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 243-260, 2018, DOI:10.32604/cmc.2018.03781

    Abstract To detect and recover random tampering areas, a combined-decision-based self-embedding watermarking scheme is proposed herein. In this scheme, the image is first partitioned into 2×2 size blocks. Next, the high 5 bits of a block’s average value is embedded into its offset block. The tampering type of block is detected by comparing the watermarks of its pre-offset and post-offset blocks. The theoretical analysis and experiments demonstrate that the proposed scheme not only has a lower ratio of false detection but also better performance with regard to avoiding random tampering. More >

  • Open Access

    ARTICLE

    Reversible Natural Language Watermarking Using Synonym Substitution and Arithmetic Coding

    Lingyun Xiang1,2, Yan Li2, Wei Hao3,*, Peng Yang4, Xiaobo Shen5

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 541-559, 2018, DOI:10.3970/cmc.2018.03510

    Abstract For protecting the copyright of a text and recovering its original content harmlessly, this paper proposes a novel reversible natural language watermarking method that combines arithmetic coding and synonym substitution operations. By analyzing relative frequencies of synonymous words, synonyms employed for carrying payload are quantized into an unbalanced and redundant binary sequence. The quantized binary sequence is compressed by adaptive binary arithmetic coding losslessly to provide a spare for accommodating additional data. Then, the compressed data appended with the watermark are embedded into the cover text via synonym substitutions in an invertible manner. On the More >

Displaying 61-70 on page 7 of 67. Per Page