-
Previous Article
The application of improved-DAA for the vehicle network node security in single- and multi-trusted domain
- DCDS-S Home
- This Issue
-
Next Article
Higher order uniformly close-to-convex functions
Characteristic analysis of carrier based on the filtering and a multi-wavelet method for the information hiding
1. | School of Information Engineering, Chang'an University, Xi'an, Shaanxi 710064, China |
2. | School of Electronic and Control Engineering, Chang'an University, Xi'an, Shaanxi 710064, China |
3. | School of Information Engineering, Xizang Minzu University, Xianyang, Shaanxi 712082, China |
References:
[1] |
A. Basu, A. Saha, J. Das, S. Roy, S. Mitra and I. Mal, On the implementation of a digital watermarking based on phase congruency, Advances in Intelligent Systems & Computing, 328 (2014), 113-120.
doi: 10.1007/978-3-319-12012-6_13. |
[2] |
L. Cui and W. Li, Adaptive multiwavelet-based watermarking through JPW masking, IEEE Transactions on Image Processing, 20 (2011), 1047-1060.
doi: 10.1109/TIP.2010.2079551. |
[3] |
A. Durdek, S. R. Jensen and J. Juselius, et al., Adaptive order polynomial algorithm in a multiwavelet representation scheme, Applied Numerical Mathematics, 92 (2015), 40-53.
doi: 10.1016/j.apnum.2014.12.006. |
[4] |
K. Jafari-Khouzani, Multiwavelet grading of pathological images of prostate, IEEE Trans. Biomed. Eng., 50 (2003), 697-704.
doi: 10.1109/TBME.2003.812194. |
[5] |
J. Kim, M. Yi and M. S. Obaidat, Advanced computer mathematics based cryptography and security technologies, International Journal of Computer Mathematics, 90 (2013), 2512-2514.
doi: 10.1080/00207160.2013.868728. |
[6] |
Y. Kutlu, Feature extraction for ECG heartbeats using higher order statistics of WPD coefficients, Comput. Methods Programs Biomed., 105 (2012), 257-267.
doi: 10.1016/j.cmpb.2011.10.002. |
[7] |
Y. Li, H. L. Wei and S. A. Billings, Identification of time-varying systems using multi-wavelet basis functions, Control Systems Technology IEEE Transactions on, 19 (2011), 656-663.
doi: 10.1109/TCST.2010.2052257. |
[8] |
X. B. Ren, An optimal image thresholding using genetic algorithm, Proceedings of the 2009 International Forum on Computer Science-Technology and Applications, 1 (2009), 169-172.
doi: 10.1109/IFCSTA.2009.48. |
[9] |
B. Stoyanov and K. Kordov, Novel image encryption scheme based on chebyshev polynomial and duffing map, The Scientific World Journal, 2014 (2014), Article ID 283639, 11 pages.
doi: 10.1155/2014/283639. |
[10] |
M. Saini and R. Chhikara, Performance evaluation of DCT and DWT features for blind image steganalysis using neural networks, International Journal of Computer Applications, 114 (2015), 20-23.
doi: 10.5120/19974-1868. |
[11] |
A. R. Tate, N. Beloff and A. R. Balques, et al., Exploiting the potential of large databases of electronic health records for research using rapid search algorithms and an intuitive query interface, Applied Numerical Mathematics, 21 (2014), 292-298.
doi: 10.1136/amiajnl-2013-001847. |
[12] |
L. Yang, J. Lv and Y. Xiang, Underdetermined blind source separation by parallel factor analysis in time-frequency domain, Cognitive Computation, 5 (2013), 207-214.
doi: 10.1007/s12559-012-9177-9. |
[13] |
T. Zhang, D. J. Mu and S. Ren, A confidential communication-oriented information hiding algorithm based on GHM multi-wavelet and DCT, Applied Mathematics & Information Sciences, 7 (2013), 1803-1807.
doi: 10.12785/amis/070518. |
show all references
References:
[1] |
A. Basu, A. Saha, J. Das, S. Roy, S. Mitra and I. Mal, On the implementation of a digital watermarking based on phase congruency, Advances in Intelligent Systems & Computing, 328 (2014), 113-120.
doi: 10.1007/978-3-319-12012-6_13. |
[2] |
L. Cui and W. Li, Adaptive multiwavelet-based watermarking through JPW masking, IEEE Transactions on Image Processing, 20 (2011), 1047-1060.
doi: 10.1109/TIP.2010.2079551. |
[3] |
A. Durdek, S. R. Jensen and J. Juselius, et al., Adaptive order polynomial algorithm in a multiwavelet representation scheme, Applied Numerical Mathematics, 92 (2015), 40-53.
doi: 10.1016/j.apnum.2014.12.006. |
[4] |
K. Jafari-Khouzani, Multiwavelet grading of pathological images of prostate, IEEE Trans. Biomed. Eng., 50 (2003), 697-704.
doi: 10.1109/TBME.2003.812194. |
[5] |
J. Kim, M. Yi and M. S. Obaidat, Advanced computer mathematics based cryptography and security technologies, International Journal of Computer Mathematics, 90 (2013), 2512-2514.
doi: 10.1080/00207160.2013.868728. |
[6] |
Y. Kutlu, Feature extraction for ECG heartbeats using higher order statistics of WPD coefficients, Comput. Methods Programs Biomed., 105 (2012), 257-267.
doi: 10.1016/j.cmpb.2011.10.002. |
[7] |
Y. Li, H. L. Wei and S. A. Billings, Identification of time-varying systems using multi-wavelet basis functions, Control Systems Technology IEEE Transactions on, 19 (2011), 656-663.
doi: 10.1109/TCST.2010.2052257. |
[8] |
X. B. Ren, An optimal image thresholding using genetic algorithm, Proceedings of the 2009 International Forum on Computer Science-Technology and Applications, 1 (2009), 169-172.
doi: 10.1109/IFCSTA.2009.48. |
[9] |
B. Stoyanov and K. Kordov, Novel image encryption scheme based on chebyshev polynomial and duffing map, The Scientific World Journal, 2014 (2014), Article ID 283639, 11 pages.
doi: 10.1155/2014/283639. |
[10] |
M. Saini and R. Chhikara, Performance evaluation of DCT and DWT features for blind image steganalysis using neural networks, International Journal of Computer Applications, 114 (2015), 20-23.
doi: 10.5120/19974-1868. |
[11] |
A. R. Tate, N. Beloff and A. R. Balques, et al., Exploiting the potential of large databases of electronic health records for research using rapid search algorithms and an intuitive query interface, Applied Numerical Mathematics, 21 (2014), 292-298.
doi: 10.1136/amiajnl-2013-001847. |
[12] |
L. Yang, J. Lv and Y. Xiang, Underdetermined blind source separation by parallel factor analysis in time-frequency domain, Cognitive Computation, 5 (2013), 207-214.
doi: 10.1007/s12559-012-9177-9. |
[13] |
T. Zhang, D. J. Mu and S. Ren, A confidential communication-oriented information hiding algorithm based on GHM multi-wavelet and DCT, Applied Mathematics & Information Sciences, 7 (2013), 1803-1807.
doi: 10.12785/amis/070518. |
[1] |
Xueyan Wu. An algorithm for reversible information hiding of encrypted medical images in homomorphic encrypted domain. Discrete and Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1441-1455. doi: 10.3934/dcdss.2019099 |
[2] |
Jingwen Zhang, Wanjun Liu, Wanlin Liu. An efficient genetic algorithm for decentralized multi-project scheduling with resource transfers. Journal of Industrial and Management Optimization, 2022, 18 (1) : 1-24. doi: 10.3934/jimo.2020140 |
[3] |
Daniel Fusca. The Madelung transform as a momentum map. Journal of Geometric Mechanics, 2017, 9 (2) : 157-165. doi: 10.3934/jgm.2017006 |
[4] |
Jae Gil Choi, David Skoug. Algebraic structure of the $ L_2 $ analytic Fourier–Feynman transform associated with Gaussian paths on Wiener space. Communications on Pure and Applied Analysis, 2020, 19 (7) : 3829-3842. doi: 10.3934/cpaa.2020169 |
[5] |
P. Cerejeiras, M. Ferreira, U. Kähler, F. Sommen. Continuous wavelet transform and wavelet frames on the sphere using Clifford analysis. Communications on Pure and Applied Analysis, 2007, 6 (3) : 619-641. doi: 10.3934/cpaa.2007.6.619 |
[6] |
T. W. Leung, Chi Kin Chan, Marvin D. Troutt. A mixed simulated annealing-genetic algorithm approach to the multi-buyer multi-item joint replenishment problem: advantages of meta-heuristics. Journal of Industrial and Management Optimization, 2008, 4 (1) : 53-66. doi: 10.3934/jimo.2008.4.53 |
[7] |
Jianbin Yang, Cong Wang. A wavelet frame approach for removal of mixed Gaussian and impulse noise on surfaces. Inverse Problems and Imaging, 2017, 11 (5) : 783-798. doi: 10.3934/ipi.2017037 |
[8] |
Ömer Oruç, Alaattin Esen, Fatih Bulut. A unified finite difference Chebyshev wavelet method for numerically solving time fractional Burgers' equation. Discrete and Continuous Dynamical Systems - S, 2019, 12 (3) : 533-542. doi: 10.3934/dcdss.2019035 |
[9] |
C. Bonanno, G. Menconi. Computational information for the logistic map at the chaos threshold. Discrete and Continuous Dynamical Systems - B, 2002, 2 (3) : 415-431. doi: 10.3934/dcdsb.2002.2.415 |
[10] |
Chihiro Matsuoka, Koichi Hiraide. Special functions created by Borel-Laplace transform of Hénon map. Electronic Research Announcements, 2011, 18: 1-11. doi: 10.3934/era.2011.18.1 |
[11] |
Yaw Chang, Lin Chen. Solve the vehicle routing problem with time windows via a genetic algorithm. Conference Publications, 2007, 2007 (Special) : 240-249. doi: 10.3934/proc.2007.2007.240 |
[12] |
Didem Cinar, José António Oliveira, Y. Ilker Topcu, Panos M. Pardalos. A priority-based genetic algorithm for a flexible job shop scheduling problem. Journal of Industrial and Management Optimization, 2016, 12 (4) : 1391-1415. doi: 10.3934/jimo.2016.12.1391 |
[13] |
Abdel-Rahman Hedar, Alaa Fahim. Filter-based genetic algorithm for mixed variable programming. Numerical Algebra, Control and Optimization, 2011, 1 (1) : 99-116. doi: 10.3934/naco.2011.1.99 |
[14] |
Ashkan Ayough, Farbod Farhadi, Mostafa Zandieh, Parisa Rastkhadiv. Genetic algorithm for obstacle location-allocation problems with customer priorities. Journal of Industrial and Management Optimization, 2021, 17 (4) : 1753-1769. doi: 10.3934/jimo.2020044 |
[15] |
Anatoli F. Ivanov. On global dynamics in a multi-dimensional discrete map. Conference Publications, 2015, 2015 (special) : 652-659. doi: 10.3934/proc.2015.0652 |
[16] |
Luigi Ambrosio, Federico Glaudo, Dario Trevisan. On the optimal map in the $ 2 $-dimensional random matching problem. Discrete and Continuous Dynamical Systems, 2019, 39 (12) : 7291-7308. doi: 10.3934/dcds.2019304 |
[17] |
Shi Yan, Jun Liu, Haiyang Huang, Xue-Cheng Tai. A dual EM algorithm for TV regularized Gaussian mixture model in image segmentation. Inverse Problems and Imaging, 2019, 13 (3) : 653-677. doi: 10.3934/ipi.2019030 |
[18] |
Sanming Liu, Zhijie Wang, Chongyang Liu. Proximal iterative Gaussian smoothing algorithm for a class of nonsmooth convex minimization problems. Numerical Algebra, Control and Optimization, 2015, 5 (1) : 79-89. doi: 10.3934/naco.2015.5.79 |
[19] |
Justyna Jarczyk, Witold Jarczyk. Gaussian iterative algorithm and integrated automorphism equation for random means. Discrete and Continuous Dynamical Systems, 2020, 40 (12) : 6837-6844. doi: 10.3934/dcds.2020135 |
[20] |
Abderrazek Karoui. A note on the construction of nonseparable wavelet bases and multiwavelet matrix filters of $L^2(\R^n)$, where $n\geq 2$. Electronic Research Announcements, 2003, 9: 32-39. |
2021 Impact Factor: 1.865
Tools
Metrics
Other articles
by authors
[Back to Top]