-
41
Self-embedding robust digital watermarking algorithm with perfectly blind detection
Published 2012-10-01“…Those existing robust watermarking algorithms couldn’t achieve perfectly blind detection.A robust watermarking algorithm with perfectly blind detection was proposed by introducing the self-embedding idea into robust watermarking literature.At first,the original image was split into non-overlapping blocks,and each block was transformed by DCT.The feature watermark was derived from judging the numerical relationship between each block’s DC coefficient and average of DC coefficients form all blocks.After encrypted by Logistic chaos sequence,the feature watermark was self-embedded into each block by adjusting two middle or low frequency DCT coefficients.Finally,the watermarked image was obtained after IDCT.The proposed algorithm achieved perfectly blind detection by combining self-embedding the encrypted feature watermark and blindly extracting authentication watermark.Experimental results show that the proposed algorithm has strong robustness to resist various attacks such as smoothing,adding noise,JPEG compression,resampling,cropping and geometric attacks like random row removal,downward shifting and right shifting.…”
Get full text
Article -
42
Cartoon Image Encryption Algorithm by a Fractional-Order Memristive Hyperchaos
Published 2019-01-01“…Then, the 0–1 test analysis is applied to detect random nature of chaotic sequences exhibited by the fractional-order systems. …”
Get full text
Article -
43
Deconvolution Filtering for Nonlinear Stochastic Systems with Randomly Occurring Sensor Delays via Probability-Dependent Method
Published 2013-01-01“…When the time-varying sensor delays occur randomly with a time-varying probability sequence, the proposed gain-scheduled filtering algorithm is very effective. …”
Get full text
Article -
44
Blind video watermarking algorithm based on correlations between neighboring frames
Published 2006-01-01Get full text
Article -
45
Historical Feature Pattern Extraction Based Network Attack Situation Sensing Algorithm
Published 2014-01-01“…The situation sequence contains a series of complicated and multivariate random trends, which are very sudden, uncertain, and difficult to recognize and describe its principle by traditional algorithms. …”
Get full text
Article -
46
Research on the algorithm for reducing the PAPR of OFDM system based on quantum chaotic mapping
Published 2019-01-01“…Aiming at the high peak to average power ratio (PAPR) problem of OFDM system,a modified selective mapping algorithm based on quantum loigstic chaotic map was proposed.To solve the problem of fixed point and stable window,the quantum loigstic chaotic maps were used as random phase sequence vectors,which provided a large number signals with fine correlation and random characteristics,easy to produce and regenerate.Matlab simulation results show that the proposed algorithm effectively reduces the PAPR,increases the numbers of candidate signals,cuts down the amount of redundant information transmission,bring down the side band power.The proposed scheme has a broad application prospect in OFDM system.…”
Get full text
Article -
47
Research on meaningful image encryption algorithm based on 2-dimensional compressive sensing
Published 2022-05-01“…Aiming at the problems that the existing compressive sensing-based meaningful image encryption algorithms have low visual security of the encrypted images and poor quality of the reconstructed images, a 2-dimensional compressive sensing-based (2DCS) meaningful image encryption algorithm was proposed.Firstly, a chaotic pseudo-random sequence generation method associated with plaintext was designed, and the global random permutation and grayscale transformation operations were used for pre-encryption to improve the decrypted image quality.The generated pre-encrypted image was used as the input for 2DCS, and the secret image was generated after the compression encryption and quantization operations.Secondly, the relationship between the hidden and the modified data was considered, and an adaptive embedding method was adopted to modify the carrier coefficient values to improve the visual security of meaningful encrypted image.Finally, the 2-dimensional projection gradient reconstruction method was adopted to decompress and decrypt to obtain the decrypted image.The experimental results show that, compared with the existing algorithms, the proposed algorithm not only improves the visual security of encrypted image and the quality of reconstructed image, but also can resist noise and cropping attacks.…”
Get full text
Article -
48
Multi-type spectrum resources joint distribution algorithm based on guaranteed QoS
Published 2016-01-01Get full text
Article -
49
An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
Published 2014-01-01“…In this paper, a new algorithm for data splitting called EPPA is presented to strengthen the confidentiality of data by two-phase process. …”
Get full text
Article -
50
MIP Models and Hybrid Algorithms for Simultaneous Job Splitting and Scheduling on Unrelated Parallel Machines
Published 2014-01-01“…We developed algorithms that satisfy the adaptation of results of local search into the genetic algorithms with minimum relocation operation of genes’ random key numbers. …”
Get full text
Article -
51
A Numerical Study on the Regularity of d-Primes via Informational Entropy and Visibility Algorithms
Published 2020-01-01“…Then, these sequences are mapped into graphs by employing two visibility algorithms. …”
Get full text
Article -
52
The role of hybrid models in financial decision-making: Forecasting stock prices with advanced algorithms
Published 2025-03-01“…To reduce the complexity of the time series decomposition and clustering methods were employed. Then, the high sequences underwent processing using the optimized random forest algorithm, and the remaining sequences were subjected to processing utilizing optimized bidirectional long short-term memory. …”
Get full text
Article -
53
A Multiuser Detector Based on Artificial Bee Colony Algorithm for DS-UWB Systems
Published 2013-01-01“…In this paper, an efficient multiuser detector based on a suboptimal code mapping multiuser detector and artificial bee colony algorithm (SCM-ABC-MUD) is proposed and implemented in direct-sequence ultra-wideband (DS-UWB) systems under the additive white Gaussian noise (AWGN) channel. …”
Get full text
Article -
54
Species determination using AI machine-learning algorithms: Hebeloma as a case study
Published 2022-06-01Get full text
Article -
55
Hybrid genetic algorithm to minimize scheduling cost with unequal and job dependent earliness tardiness cost
Published 2023-11-01“…The sequence of jobs produced in basic UET and JDET as a chromosome is added to the random population of GA. …”
Get full text
Article -
56
Predictions of Multilevel Linguistic Features to Readability of Hong Kong Primary School Textbooks: A Machine Learning Based Exploration
Published 2024-12-01“…Fifteen combinations of linguistic features were trained using Support Vector Machine (SVM) and Random Forest (RF) algorithms. Model performance was evaluated by prediction accuracy and the mean absolute error between predicted and actual readability. …”
Get full text
Article -
57
-
58
Solutions to No-Wait Flow Shop Scheduling Problem Using the Flower Pollination Algorithm Based on the Hormone Modulation Mechanism
Published 2018-01-01“…Random keys are encoded based on an ascending sequence of components to make the flower pollination algorithm (FPA) suitable for the no-wait flow shop scheduling problem. …”
Get full text
Article -
59
High-Accuracy Fault Location Detection in Double-Circuit Transmission Lines Utilizing Extreme Learning Machine Algorithm
Published 2024-09-01“…Traditional fault-location methods applied to a double-circuit transmission line are usually implemented according to an abc-domain or a sequence network equivalent circuit that also varies with fault type. …”
Get full text
Article -
60
A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map.
Published 2025-01-01“…When scrambling, each pixel changes position with the three pixels before it according to the chaotic sequence. Finally, through many experiments, it is proved that the image encryption algorithm not only greatly improves the encryption and decryption speed, but also improves various indexes. …”
Get full text
Article