Showing papers in "Signal Processing in 2020"
••
TL;DR: In this article, the authors present a selective survey of algorithms for the offline detection of multiple change points in multivariate time series, and a general yet structuring methodological strategy is adopted to organize this vast body of work.
506 citations
••
TL;DR: This paper proposes a feature set to capture color image statistics for identifying deep network generated (DNG) images and shows that the DNG images are more distinguishable from real ones in the chrominance components, especially in the residual domain.
162 citations
••
TL;DR: An image encryption scheme based on conservative hyper-chaotic system and closed-loop diffusion between blocks and the key, plaintext and ciphertext form an organic whole to ensure the sensitivity of the encryption system is proposed.
146 citations
••
TL;DR: A 4-D hyperchaotic system is applied to produce chaotic sequences for confusion and diffusion, such that the proposed image cryptosystem may withstand known-plaintext and chosen-plain Text attacks.
126 citations
••
TL;DR: A new meaningful image encryption algorithm based on compressive sensing and information hiding technology, which hides the existence of the plain image and reduces the possibility of being attacked.
120 citations
••
TL;DR: It is found that, for each parameter and order, there exists a large interval to make the system remain a hyper-chaotic state, which illustrates that the hyper- Chaotic sequence could be more random to be applied in image encryption.
113 citations
••
TL;DR: A novel structured optimal graph based sparse feature extraction (SOGSFE) method for semi-supervised learning is proposed, in which the local structure learning, sparse representation, and label propagation are simultaneously framed to perform data dimensionality reduction.
112 citations
••
TL;DR: Based on the local approximation of linear frequency modulation mode, this paper analyzed the well-separated condition of non-stationary multicomponent signals using the adaptive short-time Fourier transform (STFT) with the Gaussian window function.
105 citations
••
TL;DR: A new multi-image encryption scheme based on quaternion discrete fractional Hartley transform (QDFrHT) and an improved pixel adaptive diffusion is proposed, which can simultaneously increase the encryption capacity and reduce the consumption of keys.
100 citations
••
TL;DR: A similar concept to the average absolute gray difference (AAGD) is utilized to construct a novel directional small target detection algorithm called absolute directional mean difference (ADMD).
88 citations
••
TL;DR: An efficient and robust meaningful image encryption (MIE) scheme is developed by combining block compressive sensing and singular value decomposition (SVD) embedding by combining hyper-chaotic Lorenz system and SVD embedding.
••
TL;DR: An improved cryptosystem is proposed based on a new two-dimensional chaotic map derived from the Sine map, the Chebyshev map and a linear function (2D-SCL), which has high security, low time complexity, and the ability to withstand common attacks.
••
TL;DR: The simulations show that the proposed visual security strategy based on STP-CS can not only greatly reduce the storage space occupied by the measurement matrix but also maintain high reconstruction quality compared with the traditional CS model while ensuring visual security quality.
••
TL;DR: A novel lossless image encryption algorithm based on edge detection and generalized chaotic maps for key generation that has higher statistical and cryptanalytic properties and is suitable for medical imaging security is presented.
••
TL;DR: In this paper, a new method is introduced, namely successive variational mode decomposition (SVMD), which extracts the modes successively and does not need to know the number of modes.
••
TL;DR: A new two-dimensional infinite collapse map (2D-ICM) is proposed, which has better ergodicity, hyperchaotic property, unpredictability, and a wider chaotic region than existing 2D chaotic maps.
••
TL;DR: A novel Bayesian fusion model is established for infrared and visible images that can generate better fused images with highlighting targets and rich texture details, which may potentially improve the reliability of the target automatic detection and recognition system.
••
TL;DR: Experimental results and security analysis show that the improved encryption algorithm can not only resist chosen plain image attacks but also maintain the merits of the original algorithm.
••
TL;DR: The experimental results show the capacity of the FrCMs proposed for image reconstruction and image watermarking against different attacks such as noise and geometric distortions.
••
TL;DR: This Communication revisits the parameter estimation problem in a bistatic multiple-input multiple-output (MIMO) radar system with electromagnetic vector sensors (EMVS), and a modified algorithm is suggested that provides better estimation accuracy than state-of-the-art matrix-based methods.
••
TL;DR: A computationally more efficient while architecturally more robust auto-encoder is developed as a substitute of the original generator in DeBlurGAN, promoting DeblurGAN to a new state-of-the-art method for DSD.
••
TL;DR: The theoretical analysis and new view of a time-frequency analysis method termed synchroextracting transform (SET), which is inspired by the Fourier-based synchrosqueezing transform (FSST) and the ideal time- frequencies analysis theory, are considered.
••
TL;DR: A novel color image encryption scheme to generate visually meaningful cipher image that enhances the relationship between plain image and encryption process and Embedding hash value into carrier image prevents extra transmission and storage is proposed.
••
TL;DR: It is shown that EEMD comes with irremovable new mode splitting while the proposed method can greatly reduce this problem on a breakdown point of 50% and is verified by extensive numerical examples as well as industrial oscillation case in terms of reducing the mode splitting.
••
TL;DR: A new robust adaptive beamforming algorithm with the coprime array that avoids the coarray aperture loss and enhances the accuracy of INCM reconstruction and outperforms the existing approaches in high SNR regions.
••
TL;DR: A tunable detector, which is parametrized by a non-negative scaling factor, referred to as the tunable parameter, which can smoothly change its capability in rejecting or robustly detecting a mismatch signal.
••
TL;DR: The good performance against impulsive noise and theoretical results of the proposed algorithm are validated by simulations, and a variable-λ Llncosh (VLlncosh) scheme is introduced, aiming to acquire a compromise between fast initial convergence rate and satisfactory steady-state performance.
••
TL;DR: Subspace methods for robust adaptive beamforming (RAB) utilize the orthogonality of subspace to reconstruct the interference covariance matrix (ICM) and are robust against types of mismatch to achieve well performance.
••
TL;DR: An accuratePHFMs computation method based on Gaussian numerical integration (GNI) is proposed, which effectively mitigated the numerical integration error, and a novel watermarking algorithm resistant to geometric attacks based on accurate PHFMs and chaotic mapping is proposed.
••
TL;DR: In this guide, an optimized blind image watermarking approach based on principal component analysis (PCA) in redundant discrete wavelet (R-DW) domain is proposed and extensive comparison of test results with conventional BW approaches show the robustness of the proposed framework.