Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Ko Chin Chang"'
Publikováno v:
EURASIP Journal on Advances in Signal Processing, Vol 2021, Iss 1, Pp 1-18 (2021)
Abstract Pixel-value differencing (PVD) steganography is a popular spatial domain technology. Several PVD-based studies have proposed extended PVD steganography methods. The majority of these studies have verified their security against the regular-s
Externí odkaz:
https://doaj.org/article/e5b09ea1152548ebbfc532bf5df7e857
Publikováno v:
IEEE Access, Vol 9, Pp 126735-126747 (2021)
Since unmanned aerial vehicles (UAV) are easily deployed, highly mobile, and hover capability, they are utilized for many commercial applications. In particular, small cells mounted on UAVs, also known as drone small cells (DSC), may provide temporar
Externí odkaz:
https://doaj.org/article/2d68fb0e23514f84958bb53a13bbccd7
Publikováno v:
EURASIP Journal on Advances in Signal Processing, Vol 2021, Iss 1, Pp 1-18 (2021)
Pixel-value differencing (PVD) steganography is a popular spatial domain technology. Several PVD-based studies have proposed extended PVD steganography methods. The majority of these studies have verified their security against the regular-singular (
Publikováno v:
2022 IEEE 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC).
Autor:
Ko-Chin Chang
Publikováno v:
Multimedia Tools and Applications. 77:23579-23606
Prediction-error expansion based lossless watermarking techniques for images have received extensive attention due to versatile performance. In particular, the capacity-distortion control is one of the most important studies. This paper investigates
Publikováno v:
Multimedia Tools and Applications. 76:6031-6050
Concomitant with the rapid advancements in information technology, the issue of secure data transmission through the Internet has become increasingly important. Hiding data in images is an important technique in digital media; it facilitates confiden
Publikováno v:
Journal of Systems and Software. 86:2870-2876
With the increasing needs in security systems, vein recognition is one of the important and reliable solutions of identity security for biometrics-based identification systems. The obvious and stable line-feature-based approach can be used to clearly
Publikováno v:
Information Sciences. 221:439-451
As the demand for information security increases, more attention is being paid to biometrics-based, automated personal identification. One of the most promising current biometric techniques is based on the human iris. This paper attempts to detect sh
Publikováno v:
Information Sciences. 191:214-225
This paper presents a practical method of using a cover image to hide one larger image or several images the same size as the cover image. The secret image is compressed by JPEG2000 and then embedded in the cover image using tri-way pixel-value diffe
Autor:
Ko Chin Chang
Publikováno v:
Applied Mechanics and Materials. 145:119-123
For general image capture device, it is difficult to obtain an image with every object in focus. To solve the fusion issue of multiple same view point images with different focal settings, a novel image fusion algorithm based on local energy pattern