Article-Journal

A Symmetric Self-Embedding Mechanism for High-Fidelity Image Recovery Against Tampering featured image

A Symmetric Self-Embedding Mechanism for High-Fidelity Image Recovery Against Tampering

Digital images are inherently fragile and vulnerable to malicious tampering, significantly compromising their authenticity and integrity. Image recovery is crucial for restoring …

avatar
Tong Liu
A Symmetric Self-Embedding Mechanism for High-Fidelity Image Recovery Against Tampering featured image

A Symmetric Self-Embedding Mechanism for High-Fidelity Image Recovery Against Tampering

Digital images are inherently fragile and vulnerable to malicious tampering, significantly compromising their authenticity and integrity. Image recovery is crucial for restoring …

Tong liu
GHCW: A novel Guarded High-fidelity Compression-based Watermarking scheme for AI model protection and self-recovery featured image

GHCW: A novel Guarded High-fidelity Compression-based Watermarking scheme for AI model protection and self-recovery

Artificial Intelligence (AI) models are valuable and frequently face malicious tampering attacks, which require significant data and time to retrain when compromised. To address …

avatar
Tong Liu
GHCW: A novel Guarded High-fidelity Compression-based Watermarking scheme for AI model protection and self-recovery featured image

GHCW: A novel Guarded High-fidelity Compression-based Watermarking scheme for AI model protection and self-recovery

Artificial Intelligence (AI) models are valuable and frequently face malicious tampering attacks, which require significant data and time to retrain when compromised. To address …

Tong liu
A Two-Phase Scheme by Integration of Deep and Corner Feature for Balanced Copy-Move Forgery Localization featured image

A Two-Phase Scheme by Integration of Deep and Corner Feature for Balanced Copy-Move Forgery Localization

In the era of Industry 4.0, the widespread application of digitization, automation, and Internet technology in industrial production has led to a significant increase in image …

avatar
Tong Liu
A Two-Phase Scheme by Integration of Deep and Corner Feature for Balanced Copy-Move Forgery Localization featured image

A Two-Phase Scheme by Integration of Deep and Corner Feature for Balanced Copy-Move Forgery Localization

In the era of Industry 4.0, the widespread application of digitization, automation, and Internet technology in industrial production has led to a significant increase in image …

Tong liu
RNPM: Neural-Guided Embedding Region Selection and Error Correction for Robust Audio Multi-Watermarking featured image

RNPM: Neural-Guided Embedding Region Selection and Error Correction for Robust Audio Multi-Watermarking

Robust audio watermarking plays a crucial role in copyright protection; however, existing techniques suffer from low embedding capacity and limited robustness under severe signal …

Qiutong li
LED-Net: A lightweight edge detection network featured image

LED-Net: A lightweight edge detection network

As a fundamental task in computer vision, edge detection is becoming increasingly vital in many fields. Recently, large-parameter pre-training models have been used in edge …

Shucheng ji
A novel blockchain-watermarking mechanism utilizing interplanetary file system and fast walsh hadamard transform featured image

A novel blockchain-watermarking mechanism utilizing interplanetary file system and fast walsh hadamard transform

This article proposes a new digital watermarking mechanism based on the Ethereum blockchain, Smart Contract, and Interplanetary File System (IPFS), with an enhanced Fast Walsh …

avatar
Tong Liu
CAMU-Net: Copy-move forgery detection utilizing coordinate attention and multi-scale feature fusion-based up-sampling featured image

CAMU-Net: Copy-move forgery detection utilizing coordinate attention and multi-scale feature fusion-based up-sampling

In this paper, we construct CAMU-Net, an image forgery detection method, to obtain evidence of copy-move forgery areas in images. In CAMU-Net, the hierarchical feature extraction …

Kaiqi zhao
PFPS: Polymerized Feature Panoptic Segmentation Based on Fully Convolutional Networks featured image

PFPS: Polymerized Feature Panoptic Segmentation Based on Fully Convolutional Networks

Panoptic segmentation requires the prediction of a pixel-level mask with a category label in an image. In recent years, panoptic segmentation has been gaining more attention since …

Shucheng ji
Image Manipulation Localization Using Dual-Shallow Feature Pyramid Fusion and Boundary Contextual Incoherence Enhancement featured image

Image Manipulation Localization Using Dual-Shallow Feature Pyramid Fusion and Boundary Contextual Incoherence Enhancement

This paper proposes a novel end-to-end network for Image Manipulation Localization (IML) comprising three modules: feature fusion, encoder, and decoder. To address the limitations …

Yan xiang
Tampering localization and self-recovery using block labeling and adaptive significance featured image

Tampering localization and self-recovery using block labeling and adaptive significance

This paper proposes a scheme for localization and restoration of image tampered regions using block labelling and adaptive significance. To generate the watermark information which …

Qiyuan zhang
FRRW: A feature extraction-based robust and reversible watermarking scheme utilizing zernike moments and histogram shifting featured image

FRRW: A feature extraction-based robust and reversible watermarking scheme utilizing zernike moments and histogram shifting

This paper introduces a feature extraction-based approach to ensure both robustness and reversibility of image. Low-order Zernike moments are utilized to embed a robust binary …

Ying sun
Paralinguistic and spectral feature extraction for speech emotion classification using machine learning techniques featured image

Paralinguistic and spectral feature extraction for speech emotion classification using machine learning techniques

Emotion plays a dominant role in speech. The same utterance with different emotions can lead to a completely different meaning. The ability to perform various of emotion during …

Tong liu
A dual-tamper-detection method for digital image authentication and content self-recovery featured image

A dual-tamper-detection method for digital image authentication and content self-recovery

This paper proposes an approach to protect image content against malicious tampering based on watermarking technology. The watermark is composed of two kinds of check bits which …

avatar
Tong Liu
Adaptive feature calculation and diagonal mapping for successive recovery of tampered regions featured image

Adaptive feature calculation and diagonal mapping for successive recovery of tampered regions

This article proposes an adaptive scheme for image tampered region localization and content recovery. To generate the watermark information comprised of the authentication data and …

avatar
Tong Liu
Adaptive feature calculation and diagonal mapping for successive recovery of tampered regions featured image

Adaptive feature calculation and diagonal mapping for successive recovery of tampered regions

This article proposes an adaptive scheme for image tampered region localization and content recovery. To generate the watermark information comprised of the authentication data and …

Tong liu
Gauss–Jordan elimination-based image tampering detection and self-recovery featured image

Gauss–Jordan elimination-based image tampering detection and self-recovery

This paper proposes a novel Gauss–Jordan elimination-based image tampering detection and self-recovery scheme, aiming at dealing with the problem of malicious tampering on digital …

Xiaochen yuan
An example journal article featured image

An example journal article

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Duis posuere tellus ac convallis placerat. Proin tincidunt magna sed ex sollicitudin condimentum.

avatar
Tong Liu