We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Embedding watermark based on the attacks' characteristic was brought up, and it brought forward the region division algorithm and the double steps embedding method, put forward the characteristic and its representation in DWT transform domain based on visual features model, and brought forward the quantized central limit theorem which was applied to(More)
Image compression operator based on discrete cosine transform was brought up. A securer scrambling locational operator was put forward based on the concept of anti-tamper radius. The basic idea of the algorithm is that it first combined image block compressed data with eigenvalue of image block and its offset block, then scrambled or encrypted and embeded(More)
  • 1