You are currently viewing a new version of our website. To view the old version click .

87 Results Found

  • Article
  • Open Access
7 Citations
4,701 Views
13 Pages

4 September 2019

With the wide use of various image altering tools, digital image manipulation becomes very convenient and easy, which makes the detection of image originality and authenticity significant. Among various image tampering detection tools, double JPEG im...

  • Article
  • Open Access
3 Citations
1,935 Views
15 Pages

High-Embedded Low-Distortion Multihistogram Shift Video Reversible Data Hiding Based on DCT Coefficient

  • Yuhang Yang,
  • Xuyu Xiang,
  • Jiaohua Qin,
  • Yun Tan,
  • Zhangdong Wang and
  • Yajie Liu

Video reversible data hiding technology can be applied to copyright protection, medical images, the military, and other fields, but it cannot guarantee high visual quality with an effective embedded capacity. In this paper, a high-embedding and low-d...

  • Article
  • Open Access
5 Citations
6,291 Views
22 Pages

21 January 2021

In the field of image steganography research, more and more attention is paid to the importance of stego image robustness. In order to make steganography accessible from laboratory to practical applications, it becomes critical that the stego images...

  • Article
  • Open Access
5 Citations
1,605 Views
20 Pages

25 March 2024

This paper aims to explore an alternative reversible digital watermarking solution to guarantee the integrity of and detect tampering with data of probative importance. Since the payload for verification is embedded in the contents, algorithms for re...

  • Article
  • Open Access
2 Citations
2,107 Views
22 Pages

Robust Reversible Watermarking Scheme in Video Compression Domain Based on Multi-Layer Embedding

  • Yifei Meng,
  • Ke Niu,
  • Yingnan Zhang,
  • Yucheng Liang and
  • Fangmeng Hu

20 September 2024

Most of the existing research on video watermarking schemes focus on improving the robustness of watermarking. However, in application scenarios such as judicial forensics and telemedicine, the distortion caused by watermark embedding on the original...

  • Article
  • Open Access
1,917 Views
14 Pages

18 November 2021

JPEG is the most commonly utilized image coding standard for storage and transmission purposes. It achieves a good rate–distortion trade-off, and it has been adopted by many, if not all, handheld devices. However, often information loss occurs due to...

  • Article
  • Open Access
1 Citations
1,625 Views
16 Pages

3 January 2025

To guarantee the reliability and integrity of audio, data have been focused on as an essential topic as the fast development of generative AI. Significant progress in machine learning and speech synthesis has increased the potential for audio tamperi...

  • Article
  • Open Access
7 Citations
2,717 Views
14 Pages

24 February 2023

In this paper, we propose a lightweight deep learning network (DRRU-Net) for image-splicing forgery detection. DRRU-Net is an architecture that combines RRU-Net for learning the visual content of images and image acquisition artifacts, and a JPEG art...

  • Article
  • Open Access
5 Citations
5,208 Views
19 Pages

19 August 2022

Camera sensor identification can have numerous forensics and authentication applications. In this work, we follow an identification methodology for smartphone camera sensors using properties of the Dark Signal Nonuniformity (DSNU) in the collected im...

  • Article
  • Open Access
2 Citations
1,790 Views
15 Pages

As the next generation video coding standard, Versatile Video Coding (VVC) significantly improves coding efficiency over the current High-Efficiency Video Coding (HEVC) standard. In practice, this improvement comes at the cost of increased pre-proces...

  • Article
  • Open Access
13 Citations
4,857 Views
14 Pages

Reversible Data Hiding in JPEG Images Using Quantized DC

  • Suah Kim,
  • Fangjun Huang and
  • Hyoung Joong Kim

26 August 2019

Reversible data hiding in JPEG images has become an important topic due to the prevalence and overwhelming support of the JPEG image format these days. Much of the existing work focuses on embedding using AC (quantized alternating current coefficient...

  • Article
  • Open Access
3 Citations
3,318 Views
19 Pages

Exploiting the Symmetry of Integral Transforms for Featuring Anuran Calls

  • Amalia Luque,
  • Jesús Gómez-Bellido,
  • Alejandro Carrasco and
  • Julio Barbancho

20 March 2019

The application of machine learning techniques to sound signals requires the previous characterization of said signals. In many cases, their description is made using cepstral coefficients that represent the sound spectra. In this paper, the performa...

  • Article
  • Open Access
7 Citations
2,578 Views
19 Pages

13 May 2020

Histogram shifting (HS) has been proved to be a great success in reversible data hiding (RDH). To reduce the quality loss of marked media and the increase in file size, several two-dimensional (2D) HS schemes based on the characteristics of cover med...

  • Article
  • Open Access
10 Citations
2,926 Views
23 Pages

A Modulo Function-Based Robust Asymmetric Variable Data Hiding Using DCT

  • Sahib Khan,
  • Khalil Khan,
  • Arslan Arif,
  • Mahmoud Hassaballah,
  • Jehad Ali,
  • Qui Thanh Hoai Ta and
  • Lisu Yu

12 October 2020

This work presents a new asymmetric data hiding technique that hides a variable number of secret message bits in the discrete cosine transform (DCT) coefficients of a cover image using a modular distance technique. Prior to data hiding, the proposed...

  • Article
  • Open Access
23 Citations
4,727 Views
17 Pages

An Optimized Digital Watermarking Scheme Based on Invariant DC Coefficients in Spatial Domain

  • Musrrat Ali,
  • Chang Wook Ahn,
  • Millie Pant,
  • Sanoj Kumar,
  • Manoj K. Singh and
  • Deepika Saini

2 September 2020

Digital watermarking has become an essential and important tool for copyright protection, authentication, and security of multimedia contents. It is the process of embedding a watermark in the multimedia content and its extraction. Block-based discre...

  • Article
  • Open Access
10 Citations
4,261 Views
32 Pages

5 December 2019

In this paper, spectral–spatial preprocessing using discrete wavelet transform (DWT) multilevel decomposition and spatial filtering is proposed for improving the accuracy of hyperspectral imagery classification. Specifically, spectral DWT multi...

  • Article
  • Open Access
15 Citations
4,421 Views
22 Pages

29 June 2019

Low frequency loop-loop electromagnetic induction (EMI) is a widely-used geophysical measurement method to rapidly measure in situ the apparent electrical conductivity (ECa) of variably-saturated soils. Here, we couple Bayesian inversion of a quasi-t...

  • Article
  • Open Access
19 Citations
4,608 Views
21 Pages

Effect of Deep Cryogenic Treatment on Wear Behavior of Cold Work Tool Steel

  • Mahmoud A. Essam,
  • Ahmed Y. Shash,
  • Mohamed Kamal El-Fawakhry,
  • Emad El-Kashif and
  • Hassan Megahed

13 February 2023

Shock resisting cold work tool steel is one of the most applicable steels for several applications such as cutting sheets, chisels, hammers, etc. It has been categorized according to its characteristic properties into different categories as hot and...

  • Article
  • Open Access
9 Citations
2,275 Views
15 Pages

1 October 2023

The existing discrete cosine transform (DCT) differential quantization robust watermarking has poor robustness against JPEG compression, cropping, and combined attacks. To improve such issues, a pair of adjacent block coefficients are selected to red...

  • Article
  • Open Access
10 Citations
5,714 Views
16 Pages

VLSI Architecture for 8-Point AI-based Arai DCT having Low Area-Time Complexity and Power at Improved Accuracy

  • Amila Edirisuriya,
  • Arjuna Madanayake,
  • Vassil S. Dimitrov,
  • Renato J. Cintra and
  • Jithra Adikari

A low complexity digital VLSI architecture for the computation of an algebraic integer (AI) based 8-point Arai DCT algorithm is proposed. AI encoding schemes for exact representation of the Arai DCT transform based on a particularly sparse 2-D AI rep...

  • Article
  • Open Access
4 Citations
2,863 Views
15 Pages

2 September 2022

Removal of baseline wander (BW) is an important preprocessing step before manually or automatically interpreting electrocardiogram (ECG) records. It is a challenging issue to fully remove BW while preserving original clinical information because BW i...

  • Article
  • Open Access
1 Citations
1,361 Views
12 Pages

The anodic behaviour of isradipine was studied using cyclic voltammetry (CV), direct current (DCt) and differential-pulse (DPP) polarography. lsradipine exhibited well-defined anodic polarographic waves over the pH range of 4–8 in Britton-Robinson bu...

  • Article
  • Open Access
2 Citations
4,778 Views
17 Pages

29 June 2016

Multiple description (MD) coding is a promising alternative for the robust transmission of information over error-prone channels. In 3D image technology, the depth map represents the distance between the camera and objects in the scene. Using the dep...

  • Article
  • Open Access
6 Citations
3,405 Views
11 Pages

17 December 2020

Surface exchange coefficient (k) and bulk diffusion coefficient (D) are important properties to evaluate the performance of mixed ionic-electronic conducting (MIEC) ceramic oxides for use in energy conversion devices, such as solid oxide fuel cells....

  • Article
  • Open Access
10 Citations
6,844 Views
18 Pages

12 March 2015

In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria) Committee of Japan. This committee was established in 2011 with the aim of establishing standard evaluation criteria...

  • Article
  • Open Access
1 Citations
1,315 Views
18 Pages

A Retrospective Analysis of the First Clinical 5DCT Workflow

  • Michael Lauria,
  • Minji Kim,
  • Dylan O’Connell,
  • Yi Lao,
  • Claudia R. Miller,
  • Louise Naumann,
  • Peter Boyle,
  • Ann Raldow,
  • Alan Lee and
  • Ricky R. Savjani
  • + 2 authors

5 February 2025

Background/Objectives: 5DCT was first proposed in 2005 as a motion-compensated CT simulation approach for radiotherapy treatment planning to avoid sorting artifacts that arise in 4DCT when patients breathe irregularly. Since March 2019, 5DCT has been...

  • Article
  • Open Access
2 Citations
1,692 Views
19 Pages

Determining Thresholds for Optimal Adaptive Discrete Cosine Transformation

  • Alexander Khanov,
  • Anastasija Shulzhenko,
  • Anzhelika Voroshilova,
  • Alexander Zubarev,
  • Timur Karimov and
  • Shakeeb Fahmi

21 August 2024

The discrete cosine transform (DCT) is widely used for image and video compression. Lossy algorithms such as JPEG, WebP, BPG and many others are based on it. Multiple modifications of DCT have been developed to improve its performance. One of them is...

  • Article
  • Open Access
2 Citations
3,755 Views
18 Pages

19 November 2019

History matching is a calibration of reservoir models according to their production history. Although ensemble-based methods (EBMs) have been researched as promising history matching methods, reservoir parameters updated using EBMs do not have ideal...

  • Article
  • Open Access
1,345 Views
28 Pages

Leveraging data redundancy has long been recognized as an effective approach for concealing large amounts of secret data. In digital images, the 2D-pixel matrix inherently provides opportunities for redundancy, as each pixel is connected to its eight...

  • Article
  • Open Access
3 Citations
4,085 Views
19 Pages

Time-Domain Blind ICI Compensation in Coherent Optical FBMC/OQAM System

  • Binqi Wu,
  • Jin Lu,
  • Mingyi Gao,
  • Hongliang Ren,
  • Zichun Le,
  • Yali Qin,
  • Shuqin Guo and
  • Weisheng Hu

9 November 2020

A blind discrete-cosine-transform-based phase noise compensation (BD-PNC) is proposed to compensate the inter-carrier-interference (ICI) in the coherent optical offset-quadrature amplitude modulation (OQAM)-based filter-bank multicarrier (CO-FBMC/OQA...

  • Article
  • Open Access
20 Citations
5,964 Views
35 Pages

A Hybrid Robust Image Watermarking Method Based on DWT-DCT and SIFT for Copyright Protection

  • Mohamed Hamidi,
  • Mohamed El Haziti,
  • Hocine Cherifi and
  • Mohammed El Hassouni

19 October 2021

In this paper, a robust hybrid watermarking method based on discrete wavelet transform (DWT), discrete cosine transform (DCT), and scale-invariant feature transformation (SIFT) is proposed. Indeed, it is of prime interest to develop robust feature-ba...

  • Article
  • Open Access
3 Citations
1,897 Views
17 Pages

8 June 2023

In this paper, we propose a new hardware algorithm for an integer based discrete cosine transform (IntDCT) that was designed to allow an efficient VLSI implementation of the discrete cosine transform using the systolic array architectural paradigm. T...

  • Article
  • Open Access
3 Citations
1,652 Views
24 Pages

High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach

  • Tamer Rabie,
  • Mohammed Baziyad and
  • Ibrahim Kamel

27 July 2024

The Discrete Cosine Transform (DCT) is fundamental to high-capacity data hiding schemes due to its ability to condense signals into a few significant coefficients while leaving many high-frequency coefficients relatively insignificant. These high-fre...

  • Article
  • Open Access
12 Citations
2,514 Views
15 Pages

The Sclerometrical, Mechanical, and Wear Behavior of Mg-Y-Nd Magnesium Alloy after Deep Cryogenic Treatment Combined with Heat Treatment

  • Adrian Barylski,
  • Krzysztof Aniołek,
  • Grzegorz Dercz,
  • Marian Kupka,
  • Izabela Matuła and
  • Sławomir Kaptacz

4 March 2021

The paper investigates changes in the structure, microhardness, and sclerometrical and tribological properties of a Mg-Y-Nd alloy under the influence of deep cryogenic treatment (DCT) in combination with heat treatment. The solution treatment was car...

  • Article
  • Open Access
22 Citations
5,221 Views
22 Pages

Watermarking Based on Compressive Sensing for Digital Speech Detection and Recovery

  • Wenhuan Lu,
  • Zonglei Chen,
  • Ling Li,
  • Xiaochun Cao,
  • Jianguo Wei,
  • Naixue Xiong,
  • Jian Li and
  • Jianwu Dang

23 July 2018

In this paper, a novel imperceptible, fragile and blind watermark scheme is proposed for speech tampering detection and self-recovery. The embedded watermark data for content recovery is calculated from the original discrete cosine transform (DCT) co...

  • Article
  • Open Access
22 Citations
6,471 Views
13 Pages

8 April 2018

The huge quantity of information and the high spectral resolution of hyperspectral imagery present a challenge when performing traditional processing techniques such as classification. Dimensionality and noise reduction improves both efficiency and a...

  • Article
  • Open Access
518 Views
15 Pages

22 September 2025

To address the issues of image quality degradation and file size expansion encountered during reversible data hiding (RDH) of JPEG images, a JPEG reversible data hiding algorithm based on block smoothness estimation and optimal zero coefficient selec...

  • Article
  • Open Access
3 Citations
2,472 Views
14 Pages

Effect of Rolling Process and Aging on the Microstructure and Properties of Cu-1.0Cr-0.1Zr Alloy

  • Jun Zha,
  • Yu Zhao,
  • Yihui Qiao,
  • Haohao Zou,
  • Zeen Hua,
  • Weiwei Zhu,
  • Ying Han,
  • Guoqing Zu and
  • Xu Ran

14 February 2023

In order to study the effect of the rolling process and aging on the microstructure evolution and mechanical and tribological properties of the material, room-temperature rolling (RTR), cryogenic rolling (CR), and deep cryogenic treatment after rolli...

  • Article
  • Open Access
28 Citations
10,518 Views
24 Pages

Reconstruction of Sentinel-2 Image Time Series Using Google Earth Engine

  • Kaixiang Yang,
  • Youming Luo,
  • Mengyao Li,
  • Shouyi Zhong,
  • Qiang Liu and
  • Xiuhong Li

4 September 2022

Sentinel-2 NDVI and surface reflectance time series have been widely used in various geoscience research, but the data is deteriorated or missing due to the cloud contamination, so it is necessary to reconstruct the Sentinel-2 NDVI and surface reflec...

  • Article
  • Open Access
24 Citations
5,047 Views
17 Pages

In order to improve the robustness and imperceptibility in practical application, a novel audio watermarking algorithm with strong robustness is proposed by exploring the multi-resolution characteristic of discrete wavelet transform (DWT) and the ene...

  • Article
  • Open Access
18 Citations
3,950 Views
13 Pages

Effect of Cryogenic Treatment on the Microstructure and Wear Resistance of 17Cr2Ni2MoVNb Carburizing Gear Steel

  • Yongming Yan,
  • Zixiang Luo,
  • Ke Liu,
  • Chen Zhang,
  • Maoqiu Wang and
  • Xinming Wang

21 February 2022

Cryogenic treatment as a process that can effectively improve the performance of steel materials is widely used because of its simplicity and speed. This paper investigates the effects of different low temperature treatments on the microstructure and...

  • Article
  • Open Access
712 Views
10 Pages

Background/Objectives: Cardiac arrhythmia (ARR) and congestive heart failure (CHF) are heart diseases that can cause dysfunction of other body organs and possibly death. This paper describes a fast and accurate detection system to distinguish between...

  • Article
  • Open Access
7 Citations
9,883 Views
20 Pages

28 October 2024

The prediction and modeling of stock price movements have been shown to possess considerable economic significance within the finance sector. Recently, a range of artificial intelligence methodologies, encompassing both traditional machine learning a...

  • Article
  • Open Access
3 Citations
2,708 Views
16 Pages

12 October 2019

In the data-hiding field, it is mandatory that proposed schemes are key-secured as required by the Kerckhoff’s principle. Moreover, perceptual transparency must be guaranteed. On the other hand, volumetric attack is of special interest in audio...

  • Article
  • Open Access
37 Citations
6,138 Views
20 Pages

Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains

  • Nayeem Hasan,
  • Md Saiful Islam,
  • Wenyu Chen,
  • Muhammad Ashad Kabir and
  • Saad Al-Ahmadi

17 August 2021

This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analy...

  • Article
  • Open Access
1 Citations
2,059 Views
21 Pages

Automatic Classification of Anomalous ECG Heartbeats from Samples Acquired by Compressed Sensing

  • Enrico Picariello,
  • Francesco Picariello,
  • Ioan Tudosa,
  • Sreeraman Rajan and
  • Luca De Vito

In this paper, a method for the classification of anomalous heartbeats from compressed ECG signals is proposed. The method operating on signals acquired by compressed sensing is based on a feature extraction stage consisting of the evaluation of the...

  • Article
  • Open Access
7 Citations
4,077 Views
12 Pages

Face recognition, including emotion classification and face attribute classification, has seen tremendous progress during the last decade owing to the use of deep learning. Large-scale data collected from numerous users have been the driving force in...

  • Article
  • Open Access
5 Citations
2,312 Views
25 Pages

QuatJND: A Robust Quaternion JND Model for Color Image Watermarking

  • Wenbo Wan,
  • Wenqing Li,
  • Wenxiu Liu,
  • Zihan Diao and
  • Yantong Zhan

30 July 2022

Robust quantization watermarking with perceptual JND model has made a great success for image copyright protection. Generally, either restores each color channel separately or processes the vector representation from three color channels with the tra...

  • Article
  • Open Access
9 Citations
2,933 Views
17 Pages

4 September 2020

In the robust image watermarking framework, watermarks are usually embedded in the direct current (DC) coefficients in discrete cosine transform (DCT) domain, since the DC coefficients have a larger perceptual capacity than any alternating current (A...

  • Article
  • Open Access
17 Citations
3,197 Views
21 Pages

Advanced Dipper-Throated Meta-Heuristic Optimization Algorithm for Digital Image Watermarking

  • El-Sayed M. El-Kenawy,
  • Nima Khodadadi,
  • Ashin Khoshnaw,
  • Seyedali Mirjalili,
  • Amel Ali Alhussan,
  • Doaa Sami Khafaga,
  • Abdelhameed Ibrahim and
  • Abdelaziz A. Abdelhamid

21 October 2022

Recently, piracy and copyright violations of digital content have become major concerns as computer science has advanced. In order to prevent unauthorized usage of content, digital watermarking is usually employed. This work proposes a new approach t...

of 2