Home / Journals / CMC / Vol.61, No.2, 2019
Special Issues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Efficient Computation Offloading in Mobile Cloud Computing for Video Streaming Over 5G

    Bokyun Jo1, Md. Jalil Piran2,*, Daeho Lee3, Doug Young Suh4,*
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 439-463, 2019, DOI:10.32604/cmc.2019.08194
    Abstract In this paper, we investigate video quality enhancement using computation offloading to the mobile cloud computing (MCC) environment. Our objective is to reduce the computational complexity required to covert a low-resolution video to high-resolution video while minimizing computation at the mobile client and additional communication costs. To do so, we propose an energy-efficient computation offloading framework for video streaming services in a MCC over the fifth generation (5G) cellular networks. In the proposed framework, the mobile client offloads the computational burden for the video enhancement to the cloud, which renders the side information needed to… More >

  • Open AccessOpen Access

    ARTICLE

    Geek Talents: Who are the Top Experts on GitHub and Stack Overflow?

    Yijun Tian 1, *, Waii Ng1, Jialiang Cao1, Suzanne McIntosh1
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 465-479, 2019, DOI:10.32604/cmc.2019.07818
    Abstract In the field of Computer Science, software developers need to use a wide array of social collaborative platforms for learning and cooperating. The most popular ones are GitHub and Stack Overflow. Existing platforms only support search queries to extract relevant repository information from GitHub, or questions and answers from Stack Overflow. This ignores the valuable coder-related part-who are the top experts (geek talents) in a specific area? This information is important to companies, open source projects, and to those who want to learn from an expert role model. Thus, how to find the right developers More >

  • Open AccessOpen Access

    ARTICLE

    Implementing the Node Based Smoothed Finite Element Method as User Element in Abaqus for Linear and Nonlinear Elasticity

    S. Kshrisagar1, A. Francis1, J. J. Yee2, S. Natarajan1, C. K. Lee3,*
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 481-502, 2019, DOI:10.32604/cmc.2019.07967
    Abstract In this paper, the node based smoothed-strain Abaqus user element (UEL) in the framework of finite element method is introduced. The basic idea behind of the node based smoothed finite element (NSFEM) is that finite element cells are divided into subcells and subcells construct the smoothing domain associated with each node of a finite element cell [Liu, Dai and Nguyen-Thoi (2007)]. Therefore, the numerical integration is globally performed over smoothing domains. It is demonstrated that the proposed UEL retains all the advantages of the NSFEM, i.e., upper bound solution, overly soft stiffness and free from More >

  • Open AccessOpen Access

    ARTICLE

    Dynamics of the Moving Ring Load Acting in the System “Hollow Cylinder + Surrounding Medium” with Inhomogeneous Initial Stresses

    Surkay D. Akbarov1,2, Emin T. Bagirov2, Muslum Ozisik3,*
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 503-534, 2019, DOI:10.32604/cmc.2019.07561
    Abstract This paper studies the influence of the inhomogeneous initial stress state in the system consisting of a hollow cylinder and surrounding elastic medium on the dynamics of the moving ring load acting in the interior of the cylinder. It is assumed that in the initial state the system is compressed by uniformly distributed normal forces acting at infinity in the radial inward direction and as a result of this compression the inhomogeneous initial stresses appear in the system. After appearance of the initial stresses, the interior of the hollow cylinder is loaded by the moving… More >

  • Open AccessOpen Access

    ARTICLE

    Human Behavior Classification Using Geometrical Features of Skeleton and Support Vector Machines

    Syed Muhammad Saqlain Shah1,*, Tahir Afzal Malik2, Robina khatoon1, Syed Saqlain Hassan3, Faiz Ali Shah4
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 535-553, 2019, DOI:10.32604/cmc.2019.07948
    Abstract Classification of human actions under video surveillance is gaining a lot of attention from computer vision researchers. In this paper, we have presented methodology to recognize human behavior in thin crowd which may be very helpful in surveillance. Research have mostly focused the problem of human detection in thin crowd, overall behavior of the crowd and actions of individuals in video sequences. Vision based Human behavior modeling is a complex task as it involves human detection, tracking, classifying normal and abnormal behavior. The proposed methodology takes input video and applies Gaussian based segmentation technique followed More >

  • Open AccessOpen Access

    ARTICLE

    Improvement of Flat Surfaces Quality of Aluminum Alloy 6061-O By a Proposed Trajectory of Ball Burnishing Tool

    Ruba Alghazoul1, Almohanad Makki1, Magd Abdel Wahab2,3,*
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 555-568, 2019, DOI:10.32604/cmc.2019.06337
    Abstract Burnishing is a profitable process of surface finishing due to its ability to be automated, which makes burnishing method more desirable than other finishing methods. To obtain high surface finish, non-stop operation is required for CNC machine and we can attain that by choosing a suitable trajectory of the finishing tool. In other words, burnishing paths should be multidirectional rather than monotonic, in order to cover uniformly the surface. Indeed, the burnishing force is also a key parameter of the burnishing process because it determines the degree of plastic deformation, and that makes determining the… More >

  • Open AccessOpen Access

    ARTICLE

    Keyphrase Generation Based on Self-Attention Mechanism

    Kehua Yang1,*, Yaodong Wang1, Wei Zhang1, Jiqing Yao2, Yuquan Le1
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 569-581, 2019, DOI:10.32604/cmc.2019.05952
    Abstract Keyphrase greatly provides summarized and valuable information. This information can help us not only understand text semantics, but also organize and retrieve text content effectively. The task of automatically generating it has received considerable attention in recent decades. From the previous studies, we can see many workable solutions for obtaining keyphrases. One method is to divide the content to be summarized into multiple blocks of text, then we rank and select the most important content. The disadvantage of this method is that it cannot identify keyphrase that does not include in the text, let alone… More >

  • Open AccessOpen Access

    ARTICLE

    Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network

    Weidong Fang1, Wuxiong Zhang1,2,*, QianQian Zhao1,2, Xiaohong Ji3, Wei Chen4, Biruk Assefa5
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 583-599, 2019, DOI:10.32604/cmc.2019.05237
    Abstract As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Feature Fusion Model for Sentence Semantic Matching

    Xu Zhang1, Wenpeng Lu1,*, Fangfang Li2,3, Xueping Peng3, Ruoyu Zhang1
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 601-616, 2019, DOI:10.32604/cmc.2019.06045
    Abstract Sentence semantic matching (SSM) is a fundamental research in solving natural language processing tasks such as question answering and machine translation. The latest SSM research benefits from deep learning techniques by incorporating attention mechanism to semantically match given sentences. However, how to fully capture the semantic context without losing significant features for sentence encoding is still a challenge. To address this challenge, we propose a deep feature fusion model and integrate it into the most popular deep learning architecture for sentence matching task. The integrated architecture mainly consists of embedding layer, deep feature fusion layer, More >

  • Open AccessOpen Access

    ARTICLE

    Generating Questions Based on Semi-Automated and End-to-End Neural Network

    Tianci Xia1,2, Yuan Sun1,2,*, Xiaobing Zhao1,2, Wei Song1, Yumiao Guo3
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 617-628, 2019, DOI:10.32604/cmc.2019.05860
    Abstract With the emergence of large-scale knowledge base, how to use triple information to generate natural questions is a key technology in question answering systems. The traditional way of generating questions require a lot of manual intervention and produce lots of noise. To solve these problems, we propose a joint model based on semi-automated model and End-to-End neural network to automatically generate questions. The semi-automated model can generate question templates and real questions combining the knowledge base and center graph. The End-to-End neural network directly sends the knowledge base and real questions to BiLSTM network. Meanwhile, More >

  • Open AccessOpen Access

    ARTICLE

    ICVSS: A New Method for Vulnerability Quantitative Grading

    Tiantian Tan1,*, Baosheng Wang1, Yong Tang1, Xu Zhou1, Jingwen Han2
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 629-641, 2019, DOI:10.32604/cmc.2019.06049
    Abstract Vulnerability technology is the basic of network security technology, vulnerability quantitative grading methods, such as CVSS, WIVSS, ICVSS, provide a reference to vulnerability management, but the problems of ignoring the risk elevation caused by a group of vulnerabilities and low accuracy of exploitable level evaluation exist in current vulnerability quantitative grading methods. To solve problems above in current network security quantitative evaluation methods, this paper verified the high relevance degree between type and exploitable score of vulnerability, proposed a new vulnerability quantitative grading method ICVSS, ICVSS can explore attack path using continuity level defined by More >

  • Open AccessOpen Access

    ARTICLE

    Instant Edit Propagation on Images Based on Bilateral Grid

    Feng Li1,2, Chaofeng Ou2, Yan Gui1,2,3,*, Lingyun Xiang1,2
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 643-656, 2019, DOI:10.32604/cmc.2019.06094
    Abstract The ability to quickly and intuitively edit digital content has become increasingly important in our everyday life. However, existing edit propagation methods for editing digital images are typically based on optimization with high computational cost for large inputs. Moreover, existing edit propagation methods are generally inefficient and highly time-consuming. Accordingly, to improve edit efficiency, this paper proposes a novel edit propagation method using a bilateral grid, which can achieve instant propagation of sparse image edits. Firstly, given an input image with user interactions, we resample each of its pixels into a regularly sampled bilateral grid,… More >

  • Open AccessOpen Access

    ARTICLE

    Novel DDoS Feature Representation Model Combining Deep Belief Network and Canonical Correlation Analysis

    Chen Zhang1, Jieren Cheng1,2,3,*, Xiangyan Tang1, Victor S. Sheng4, Zhe Dong1, Junqi Li1
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 657-675, 2019, DOI:10.32604/cmc.2019.06207
    Abstract Distributed denial of service (DDoS) attacks launch more and more frequently and are more destructive. Feature representation as an important part of DDoS defense technology directly affects the efficiency of defense. Most DDoS feature extraction methods cannot fully utilize the information of the original data, resulting in the extracted features losing useful features. In this paper, a DDoS feature representation method based on deep belief network (DBN) is proposed. We quantify the original data by the size of the network flows, the distribution of IP addresses and ports, and the diversity of packet sizes of More >

  • Open AccessOpen Access

    ARTICLE

    Research on Architecture of Risk Assessment System Based on Block Chain

    Yang Zhao1, Shibin Zhang1,*, Min Yang1, Peilin He1, Qirun Wang2
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 677-686, 2019, DOI:10.32604/cmc.2019.05936
    Abstract The risk assessment system has been applied to the information security, energy, medical and other industries. Through the risk assessment system, it is possible to quantify the possibility of the impact or loss caused by an event before or after an event, thereby avoiding the risk or reducing the loss. However, the existing risk assessment system architecture is mostly a centralized architecture, which could lead to problems such as data leakage, tampering, and central cheating. Combined with the technology of block chain, which has the characteristics of decentralization, security and credibility, collective maintenance, and untamperability. More >

  • Open AccessOpen Access

    ARTICLE

    Cryptanalysis and Improvement of a Chaotic Map-Control-Based and the Plain Image-Related Cryptosystem

    Bin Lu1, Fenlin Liu1, Xin Ge1,*, Zhenyu Li2
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 687-699, 2019, DOI:10.32604/cmc.2019.05633
    Abstract Due to the characteristics of chaotic systems, different cryptosystems based on chaos have been proposed to satisfy the security of multimedia data. A plain image-related chaotic algorithm is proposed by Luo et al. with high speed and efficiency. Security weaknesses of the cryptosystem are studied in this paper. It is found that the important secret key information is leaked because an important parameter can be obtained after an inverse operation in the last step of the cryptosystems without secret key. Meanwhile, the value zero is processed improperly in quantification algorithm. Based on the weaknesses, chosen More >

  • Open AccessOpen Access

    ARTICLE

    The Topology Sampling of H2SO4·NH3 with Meta-Dynamics Method

    Yugai Huang1,2,3, Yu Shang1,4, Wenqing Li1, Jiajing He1, Hairong Zhou1, Bin Gu1,*
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 701-710, 2019, DOI:10.32604/cmc.2019.03109
    Abstract The configurations of molecular clusters have significant impacts on their growth into fine particles in atmosphere. In this paper, we explore the topology space of the structure of H2SO4·NH3 dimer with a novel sampling technique of meta-dynamics (MTD) method and ab initio molecular dynamics simulations. The simulations are carried out at the temperatures of both 50 K and 242 K, which represent the typical high and low latitudes of troposphere. The results show that, compared with only traditional MD simulations, the structure samplings are significantly accelerated with MTD method. Therefore, more isomers of the dimer More >

  • Open AccessOpen Access

    ARTICLE

    A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things

    Chaoyang Li1,2,3, Gang Xu2, Yuling Chen1,*, Haseeb Ahmad4, Jian Li3
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 711-726, 2019, DOI:10.32604/cmc.2019.06279
    Abstract Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public, distributed and decentration. And blockchain-enabled internet of things (BIoT) has a tendency to make a revolutionary change for the internet of things (IoT) which requires distributed trustless consensus. However, the scalability and security issues become particularly important with the dramatically increasing number of IoT devices. Especially, with the development of quantum computing, many extant cryptographic algorithms applied in blockchain or BIoT systems are vulnerable to the quantum attacks. In this paper, an anti-quantum proxy blind signature scheme based on More >

  • Open AccessOpen Access

    ARTICLE

    Achieving Privacy-Preserving Iris Identification Via El Gamal

    Yong Ding1, Lei Tian1, Bo Han2, Huiyong Wang2,*, Yujue Wang1, James Xi Zheng3
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 727-738, 2019, DOI:10.32604/cmc.2019.06220
    Abstract Currently, many biometric systems maintain the user’s biometrics and templates in plaintext format, which brings great privacy risk to uses’ biometric information. Biometrics are unique and almost unchangeable, which means it is a great concern for users on whether their biometric information would be leaked. To address this issue, this paper proposes a confidential comparison algorithm for iris feature vectors with masks, and develops a privacy-preserving iris verification scheme based on the El Gamal encryption scheme. In our scheme, the multiplicative homomorphism of encrypted features is used to compare of iris features and their mask More >

  • Open AccessOpen Access

    ARTICLE

    A Dynamic Memory Allocation Optimization Mechanism Based on Spark

    Suzhen Wang1, Shanshan Geng1, Zhanfeng Zhang1, Anshan Ye2, Keming Chen2, Zhaosheng Xu2, Huimin Luo2, Gangshan Wu3,*, Lina Xu4, Ning Cao5 CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 739-757, 2019, DOI:10.32604/cmc.2019.06097
    Abstract Spark is a distributed data processing framework based on memory. Memory allocation is a focus question of Spark research. A good memory allocation scheme can effectively improve the efficiency of task execution and memory resource utilization of the Spark. Aiming at the memory allocation problem in the Spark2.x version, this paper optimizes the memory allocation strategy by analyzing the Spark memory model, the existing cache replacement algorithms and the memory allocation methods, which is on the basis of minimizing the storage area and allocating the execution area according to the demand. It mainly including two… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient Quantum Key Distribution Protocol with Dense Coding on Single Photons

    Hao Xiao1,*, Jun Zhang2, Wenhua Huang3, Mi Zhou4, Wencheng Hu5
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 759-775, 2019, DOI:10.32604/cmc.2019.06085
    Abstract Combined with the dense coding mechanism and the bias-BB84 protocol, an efficient quantum key distribution protocol with dense coding on single photons (QDKD-SP) is proposed. Compared with the BB84 or bias-BB84 protocols based on single photons, our QDKD-SP protocol has a higher capacity without increasing the difficulty of its experiment implementation as each correlated photon can carry two bits of useful information. Compared with the quantum dense key distribution (QDKD) protocol based on entangled states, our protocol is more feasible as the preparation and the measurement of a single-photon quantum state is not difficult with More >

  • Open AccessOpen Access

    ARTICLE

    Task-Based Resource Allocation Bid in Edge Computing Micro Datacenter

    Yeting Guo1, Fang Liu2,*, Nong Xiao1, Zhengguo Chen1,3
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 777-792, 2019, DOI:10.32604/cmc.2019.06366
    Abstract Edge computing attracts online service providers (SP) to offload services to edge computing micro datacenters that are close to end users. Such offloads reduce packet-loss rates, delays and delay jitter when responding to service requests. Simultaneously, edge computing resource providers (RP) are concerned with maximizing incomes by allocating limited resources to SPs. Most works on this topic make a simplified assumption that each SP has a fixed demand; however, in reality, SPs themselves may have multiple task-offloading alternatives. Thus, their demands could be flexibly changed, which could support finer-grained allocations and further improve the incomes… More >

  • Open AccessOpen Access

    ARTICLE

    GPR Wave Propagation Model in a Complex Geoelectric Structure Using Conformal First-Order Symplectic Euler Algorithm

    Man Yang1,2,3, Hongyuan Fang1,2,3,*, Juan Zhang4, Fuming Wang1,2,3, Jianwei Lei1,2,3, Heyang Jia1,2,3
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 793-816, 2019, DOI:10.32604/cmc.2019.06042
    Abstract Possessing advantages such as high computing efficiency and ease of programming, the Symplectic Euler algorithm can be applied to construct a ground-penetrating radar (GPR) wave propagation numerical model for complex geoelectric structures. However, the Symplectic Euler algorithm is still a difference algorithm, and for a complicated boundary, ladder grids are needed to perform an approximation process, which results in a certain amount of error. Further, grids that are too dense will seriously decrease computing efficiency. This paper proposes a conformal Symplectic Euler algorithm based on the conformal grid technique, amends the electric/magnetic field-updating equations of… More >

  • Open AccessOpen Access

    ARTICLE

    Cultivated Land Monitoring System Based on Dynamic Wake-Up UAV and Wireless of Distributed Storage

    Longqing Zhang1, Liping Bai1,*, Xinwei Zhang2, Yanghong Zhang2, Lei Yang1, Xiangdu Yan2
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 817-828, 2019, DOI:10.32604/cmc.2019.06062
    Abstract The drawbacks of the traditional multi-hop structure of wireless sensor networks (WSNS) are susceptible to reflection, scattering and diffraction, serious attenuation of signal intensity and phase deviation due to various obstacles in cultivated land environment and mountains. In this paper, the wireless signal intensity is measured and curve fitting is done respectively in both open environment and obstacle-environment with both sending and receiving height of 0 m, 1 m, and 2 m. It is found out that packet loss probability is too high when an obstacle exists. In such a case, unmanned aerial vehicle (UAV) More >

  • Open AccessOpen Access

    ARTICLE

    Long Short Term Memory Networks Based Anomaly Detection for KPIs

    Haiqi Zhu1, Fanzhi Meng2,*, Seungmin Rho3, Mohan Li4,*, Jianyu Wang1, Shaohui Liu1, Feng Jiang1
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 829-847, 2019, DOI:10.32604/cmc.2019.06115
    Abstract In real-world many internet-based service companies need to closely monitor large amounts of data in order to ensure stable operation of their business. However, anomaly detection for these data with various patterns and data quality has been a great challenge, especially without labels. In this paper, we adopt an anomaly detection algorithm based on Long Short-Term Memory (LSTM) Network in terms of reconstructing KPIs and predicting KPIs. They use the reconstruction error and prediction error respectively as the criteria for judging anomalies, and we test our method with real data from a company in the More >

  • Open AccessOpen Access

    ARTICLE

    A New Time-Aware Collaborative Filtering Intelligent Recommendation System

    Weijin Jiang1,2,3, Jiahui Chen1,*, Yirong Jiang4,*, Yuhui Xu1, Yang Wang1, Lina Tan1, Guo Liang5
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 849-859, 2019, DOI:10.32604/cmc.2019.05932
    Abstract Aiming at the problem that the traditional collaborative filtering recommendation algorithm does not fully consider the influence of correlation between projects on recommendation accuracy, this paper introduces project attribute fuzzy matrix, measures the project relevance through fuzzy clustering method, and classifies all project attributes. Then, the weight of the project relevance is introduced in the user similarity calculation, so that the nearest neighbor search is more accurate. In the prediction scoring section, considering the change of user interest with time, it is proposed to use the time weighting function to improve the influence of the More >

  • Open AccessOpen Access

    ARTICLE

    Texture Feature Extraction Method for Ground Nephogram Based on Contourlet and the Power Spectrum Analysis Algorithm

    Xiaoying Chen1, 2, *, Shijun Zhao2, Xiaolei Wang2, Xuejin Sun2, Jing Feng2, Nan Ye3
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 861-875, 2019, DOI:10.32604/cmc.2019.06230
    Abstract It is important to extract texture feature from the ground-base cloud image for cloud type automatic detection. In this paper, a new method is presented to capture the contour edge, texture and geometric structure of cloud images by using Contourlet and the power spectrum analysis algorithm. More abundant texture information is extracted. Cloud images can be obtained a multiscale and multidirection decomposition. The coefficient matrix from Contourlet transform of ground nephogram is calculated. The energy, mean and variance characteristics calculated from coefficient matrix are composed of the feature information. The frequency information of the data More >

  • Open AccessOpen Access

    ARTICLE

    Measure-Resend Semi-Quantum Private Comparison Scheme Using GHZ Class States

    Lili Yan1,*, Yan Chang1, Shibin Zhang1, Qirun Wang2, Zhiwei Sheng1, Yuhua Sun1
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 877-887, 2019, DOI:10.32604/cmc.2019.06222
    Abstract Quantum private comparison is an important topic in quantum cryptography. Recently, the idea of semi-quantumness has been often used in designing private comparison protocol, which allows some of the participants to remain classical. In this paper, we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger (GHZ) class states, which allows two classical participants to compare the equality of their private secret with the help of a quantum third party (server). In the proposed protocol, server is semi-honest who will follow the protocol honestly, but he may try to learn additional information from the More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on DTCWT-DCT and Chaotic Map

    Jing Liu1,5, Jingbing Li1,*, Jieren Cheng1, Jixin Ma2, Naveed Sadiq3, Baoru Han4, Qiang Geng5, Yang Ai5
    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 889-910, 2019, DOI:10.32604/cmc.2019.06034
    Abstract In order to solve the problem of patient information security protection in medical images, whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected, a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT) and chaotic map is proposed in this paper. First, DTCWT-DCT transformation was performed on medical images, and dot product was per-formed in relation to the transformation matrix and logistic map. Inverse transformation was undertaken to obtain… More >

Per Page:

Share Link