Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241100037-7.doi: 10.11896/jsjkx.241100037
• Image Processing & Multimedia Technology • Previous Articles Next Articles
ZHANG Xiaorui1, XU Yanan1, SUN Wei2
CLC Number:
| [1]BAKER J,STANLEY A.Telemedicine technology:a review of services,equipment,and other aspects[J].Current Allergy and Asthma Reports,2018,18:1-8. [2]SHEN Y T,CHEN L,YUE W W,et al.Digital technology-based telemedicine for the COVID-19 pandemic[J].Frontiers in Medicine,2021,8:646506. [3]ZHANG X,ZHANG W,SUN W,et al.A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection[J].Computer Systems Science & Engineering,2022,41(3):1043-1056. [4]ALSHANBARI H S.Medical image watermarking for ownership &tamper detection[J].Multimedia Tools and Applications,2021,80(11):16549-16564. [5]GULL S,PARAH S A.Advances in medical image watermar-king:a state of the art review[J].Multimedia Tools and Applications,2024,83(1):1407-1447. [6]CHAN P W,LYU M R.A DWT-based digital video watermarking scheme with error correcting code[C]//International Confe-rence on Information and Communications Security.Berlin:Springer,2003:202-213. [7]KAWAGUCHI S.Spread-spectrum watermarking model using a parity-check code for simultaneous restoration of message and image[J].Journal of the Physical Society of Japan,2021,90(10):104003. [8]THAKUR S,SINGH A K,KUMAR B,et al.Improved DWT-SVD-based medical image watermarking through hamming code and chaotic encryption[C]//Advances in VLSI,Communication,and Signal Processing:Select Proceedings of VCAS 2018.Springer,2020:897-905. [9]REZA F A,ASLI M E,SARBISHEIE G.Security Evaluation of DWT Based Watermarking Schemes and its Improvement Using BER Coding[J].Research Journal of Applied Sciences,Engineering and Technology,2012,4(17):3031-3039. [10]LU S P,WANG R,ZHONG T,et al.Large-capacity image steganography based on invertible neural networks[C]//Procee-dings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:10816-10825. [11]LAN Y,SHANG F,YANG J,et al.Robust image steganogra-phy:hiding messages in frequency coefficients[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2023:14955-14963. [12]JING J,DENG X,XU M,et al.HiNet:Deep image hiding by invertible network[C]//Proceedings of the IEEE/CVF International Conference on Computer Vision.2021:4733-4742. [13]WANG C Y,LIAO H Y M,WU Y H,et al.CSPNet:A new backbone that can enhance learning capability of CNN[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops.2020:390-391. [14]WANG C Y,BOCHKOVSKIY A,LIAO H Y M.Scaled-yolov4:Scaling cross stage partial network[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:13029-13038. [15]SHEN L,WANG Y.TCCT:Tightly-coupled convolutionaltransformer on time series forecasting[J].Neurocomputing,2022,480:131-145. [16]GUAN Z,JING J,DENG X,et al.DeepMIH:Deep invertible network for multiple image hiding[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2022,45(1):372-390. [17]XU Y,MAO Y.A Robustness Improved Watermarking Scheme based on Invertible Neural Network[C]//2024 36th Chinese Control and Decision Conference(CCDC).IEEE,2024:1304-1309. [18]NORIEGA J A M,KURKOSKI B M,MIYATAKE M N,et al.Image authentication and recovery using BCH error-correcting codes[J].International Journal of Computers,2011,5(1):26-33. [19]GOLEA N E H,MELKEMI K E,BEHLOUL A.Zero-bit fragilewatermarking for medical image tamper detection and recovery using RS code and lifting wavelet transform[J].The Imaging Science Journal,2021,69(5/6/7/8):334-349. [20]ZHU J.HiDDeN:hiding data with deep networks[J].arXiv:1807.09937,2018. [21]LIANG Z,ZHANG W.Efficient Berlekamp-Massey algorithmand architecture for Reed-Solomon decoder[J].Journal of Signal Processing Systems,2017,86:51-65. [22]AHMADI M,NOROUZI A,KARIMI N,et al.ReDMark:Framework for residual diffusion watermarking based on deep networks[J].Expert Systems with Applications,2020,146:113157. [23]SHIN R,SONG D.JPEG-resistant adversarial images[C]//NIPS 2017 Workshop on Machine Learning and Computer Security.2017. [24]HORE A,ZIOU D.Image quality metrics:PSNR vs.SSIM[C]//2010 20th International Conference on Pattern Recognition.IEEE,2010:2366-2369. [25]ZHANG K A,CUESTA-INFANTE A,XU L,et al.Stega-noGAN:High capacity image steganography with GANs[J].arXiv:1901.03892,2019. |
| [1] | FENG Yimeng, FENG Yan, XIE Sijiang, ZHANG Qing. Proxy-based Bidirectional Coin Mixing Mechanism of Blockchain [J]. Computer Science, 2025, 52(8): 385-392. |
| [2] | DAI Xiangguang, HE Chenglong, GUAN Mingyu, ZHANG Wei, ZHOU Yang, LIU Jianfeng, LYU Qingguo. State-decomposition Distributed Dual Averaging Algorithm for Privacy Online ConstrainedOptimization over Directed Networks [J]. Computer Science, 2025, 52(8): 411-420. |
| [3] | WANG Chundong, ZHANG Qinghua, FU Haoran. Federated Learning Privacy Protection Method Combining Dataset Distillation [J]. Computer Science, 2025, 52(6A): 240500132-7. |
| [4] | LIU Runjun, XIAO Fengjun, HU Weitong, WANG Xu. Reversible Data Hiding in Fully Encrypted Images Based on Pixel Interval Partitioning andPrediction Recovery [J]. Computer Science, 2025, 52(6A): 240900030-8. |
| [5] | YUAN Lin, HUANG Ling, HAO Kaile, ZHANG Jiawei, ZHU Mingrui, WANG Nannan, GAO Xinbo. Adversarial Face Privacy Protection Based on Makeup Style Patch Activation [J]. Computer Science, 2025, 52(6): 405-413. |
| [6] | CAO Tengfei, YIN Runtian, ZHU Liang, XU Changqiao. Survey of Personalized Location Privacy Protection Technologies [J]. Computer Science, 2025, 52(5): 307-321. |
| [7] | ZHENG Xu, HUANG Xiangjie, YANG Yang. Reversible Facial Privacy Protection Method Based on “Invisible Masks” [J]. Computer Science, 2025, 52(5): 384-391. |
| [8] | MA Yixin, ZENG Junhao, YANG Xinyan, LIANG Gang. Automatic Recognition of Irrelevant Individuals in Videos Based on Multi-object Tracking [J]. Computer Science, 2025, 52(11A): 241100155-8. |
| [9] | ZHAO Tong, CHEN Xuebin, WANG Liu, JING Zhongrui, ZHONG Qi. Backdoor Attack Method for Federated Learning Based on Knowledge Distillation [J]. Computer Science, 2025, 52(11): 434-443. |
| [10] | LIU Yuming, DAI Yu, CHEN Gongping. Review of Federated Learning in Medical Image Processing [J]. Computer Science, 2025, 52(1): 183-193. |
| [11] | FU Yanming, ZHANG Siyuan. Privacy Incentive Mechanism for Mobile Crowd-sensing with Comprehensive Scoring [J]. Computer Science, 2024, 51(7): 397-404. |
| [12] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
| [13] | SUN Min, DING Xining, CHENG Qian. Federated Learning Scheme Based on Differential Privacy [J]. Computer Science, 2024, 51(6A): 230600211-6. |
| [14] | TAN Zhiwen, XU Ruzhi, WANG Naiyu, LUO Dan. Differential Privacy Federated Learning Method Based on Knowledge Distillation [J]. Computer Science, 2024, 51(6A): 230600002-8. |
| [15] | WANG Chenzhuo, LU Yanrong, SHEN Jian. Study on Fingerprint Recognition Algorithm for Fairness in Federated Learning [J]. Computer Science, 2024, 51(6A): 230800043-9. |
|
||