supported by the National Key Research and Development Program of China (Grant No.2022YFB3102904);the National Natural Science Foundation of China (Grant Nos.62172435,U1804263,and 61872448);the Zhongyuan Science and Technology Innovation Leading Talent Project of China (Grant No.214200510019);the Henan Province Key Research,Development and Promotion Project on Tackling Key Scientific Problems (Grant No.222102210018);the Key Research and Development Project of Henan Province (Grant No.221111321200)。
Network flow watermarking(NFW)is usually used for flow correlation.By actively modulating some features of the carrier traffic,NFW can establish the correspondence between different network nodes.In the face of strict...
supported by the National Natural Science Foundation of China(No.61100187,No.61301099,No.61361166006);Laboratory of Network and Information Security Technology(CAEP)
A histogram shape based method is utilized to design watermarking algorithm to protect the Depthimage-based rendering(DIBR) 3D images. To make the watermarking method robust to common attacks, much more suitable pixel...
Reversible watermarking techniques enable the extraction of the embedding bits from a watermarked image in a lossless way. It exploits the high spatial correlation among neighboring pixels. Application in reversible w...
supported by the National Natural Science Foundation of China(No.61301099,No.61100187,No.61361166006);Heilongjiang Province Educational Department Funds of China(No.12521107)
A novel watermarking scheme for quantum image is proposed based on Quantum cosine transform(QCT). The cosine coefficients are extracted by executing QCT on quantum image. A dynamic vector for controlling embedding str...
This work is supported in part by the National Natural Science Foundation of China (No.90604032, No.60373028), Specialized Research Fund for the Doctoral Program of Higher Education, Program for New Century Excellent Talents in University and Specialized Research Foundation of BJTU.
A novel video watermarking scheme is pro- posed in this paper. In the scheme, a new geometrical invariance---Average AC energy (AAE) and discrete Walsh transform are used to embed watermark signal and resist geometr...
The biometric person authentication technique based on the pattern of the human iris is well suited to be applied to any access control system requiring a high level of security. With the wide spread utilization of bi...
This paper describes a new watermarking technique for printed images, using the texture synthesis method. In this aspect, a few techniques have been proposed, but those techniques are all based on FMS (Frequency modul...