scispace - formally typeset
Search or ask a question

Showing papers in "Signal Processing in 2020"


Journal ArticleDOI
TL;DR: In this article, the authors present a selective survey of algorithms for the offline detection of multiple change points in multivariate time series, and a general yet structuring methodological strategy is adopted to organize this vast body of work.

506 citations


Journal ArticleDOI
TL;DR: This paper proposes a feature set to capture color image statistics for identifying deep network generated (DNG) images and shows that the DNG images are more distinguishable from real ones in the chrominance components, especially in the residual domain.

162 citations


Journal ArticleDOI
TL;DR: An image encryption scheme based on conservative hyper-chaotic system and closed-loop diffusion between blocks and the key, plaintext and ciphertext form an organic whole to ensure the sensitivity of the encryption system is proposed.

146 citations


Journal ArticleDOI
TL;DR: A 4-D hyperchaotic system is applied to produce chaotic sequences for confusion and diffusion, such that the proposed image cryptosystem may withstand known-plaintext and chosen-plain Text attacks.

126 citations


Journal ArticleDOI
TL;DR: A new meaningful image encryption algorithm based on compressive sensing and information hiding technology, which hides the existence of the plain image and reduces the possibility of being attacked.

120 citations


Journal ArticleDOI
TL;DR: It is found that, for each parameter and order, there exists a large interval to make the system remain a hyper-chaotic state, which illustrates that the hyper- Chaotic sequence could be more random to be applied in image encryption.

113 citations


Journal ArticleDOI
TL;DR: A novel structured optimal graph based sparse feature extraction (SOGSFE) method for semi-supervised learning is proposed, in which the local structure learning, sparse representation, and label propagation are simultaneously framed to perform data dimensionality reduction.

112 citations


Journal ArticleDOI
TL;DR: Based on the local approximation of linear frequency modulation mode, this paper analyzed the well-separated condition of non-stationary multicomponent signals using the adaptive short-time Fourier transform (STFT) with the Gaussian window function.

105 citations


Journal ArticleDOI
TL;DR: A new multi-image encryption scheme based on quaternion discrete fractional Hartley transform (QDFrHT) and an improved pixel adaptive diffusion is proposed, which can simultaneously increase the encryption capacity and reduce the consumption of keys.

100 citations


Journal ArticleDOI
TL;DR: A similar concept to the average absolute gray difference (AAGD) is utilized to construct a novel directional small target detection algorithm called absolute directional mean difference (ADMD).

88 citations


Journal ArticleDOI
Liya Zhu1, Huansheng Song1, Xi Zhang, Maode Yan1, Tao Zhang1, Wang Xiaoyan1, Juan Xu1 
TL;DR: An efficient and robust meaningful image encryption (MIE) scheme is developed by combining block compressive sensing and singular value decomposition (SVD) embedding by combining hyper-chaotic Lorenz system and SVD embedding.

Journal ArticleDOI
TL;DR: An improved cryptosystem is proposed based on a new two-dimensional chaotic map derived from the Sine map, the Chebyshev map and a linear function (2D-SCL), which has high security, low time complexity, and the ability to withstand common attacks.

Journal ArticleDOI
TL;DR: The simulations show that the proposed visual security strategy based on STP-CS can not only greatly reduce the storage space occupied by the measurement matrix but also maintain high reconstruction quality compared with the traditional CS model while ensuring visual security quality.

Journal ArticleDOI
TL;DR: A novel lossless image encryption algorithm based on edge detection and generalized chaotic maps for key generation that has higher statistical and cryptanalytic properties and is suitable for medical imaging security is presented.

Journal ArticleDOI
TL;DR: In this paper, a new method is introduced, namely successive variational mode decomposition (SVMD), which extracts the modes successively and does not need to know the number of modes.

Journal ArticleDOI
TL;DR: A new two-dimensional infinite collapse map (2D-ICM) is proposed, which has better ergodicity, hyperchaotic property, unpredictability, and a wider chaotic region than existing 2D chaotic maps.

Journal ArticleDOI
TL;DR: A novel Bayesian fusion model is established for infrared and visible images that can generate better fused images with highlighting targets and rich texture details, which may potentially improve the reliability of the target automatic detection and recognition system.

Journal ArticleDOI
TL;DR: Experimental results and security analysis show that the improved encryption algorithm can not only resist chosen plain image attacks but also maintain the merits of the original algorithm.

Journal ArticleDOI
TL;DR: The experimental results show the capacity of the FrCMs proposed for image reconstruction and image watermarking against different attacks such as noise and geometric distortions.

Journal ArticleDOI
TL;DR: This Communication revisits the parameter estimation problem in a bistatic multiple-input multiple-output (MIMO) radar system with electromagnetic vector sensors (EMVS), and a modified algorithm is suggested that provides better estimation accuracy than state-of-the-art matrix-based methods.

Journal ArticleDOI
TL;DR: A computationally more efficient while architecturally more robust auto-encoder is developed as a substitute of the original generator in DeBlurGAN, promoting DeblurGAN to a new state-of-the-art method for DSD.

Journal ArticleDOI
TL;DR: The theoretical analysis and new view of a time-frequency analysis method termed synchroextracting transform (SET), which is inspired by the Fourier-based synchrosqueezing transform (FSST) and the ideal time- frequencies analysis theory, are considered.

Journal ArticleDOI
TL;DR: A novel color image encryption scheme to generate visually meaningful cipher image that enhances the relationship between plain image and encryption process and Embedding hash value into carrier image prevents extra transmission and storage is proposed.

Journal ArticleDOI
TL;DR: It is shown that EEMD comes with irremovable new mode splitting while the proposed method can greatly reduce this problem on a breakdown point of 50% and is verified by extensive numerical examples as well as industrial oscillation case in terms of reducing the mode splitting.

Journal ArticleDOI
TL;DR: A new robust adaptive beamforming algorithm with the coprime array that avoids the coarray aperture loss and enhances the accuracy of INCM reconstruction and outperforms the existing approaches in high SNR regions.

Journal ArticleDOI
TL;DR: A tunable detector, which is parametrized by a non-negative scaling factor, referred to as the tunable parameter, which can smoothly change its capability in rejecting or robustly detecting a mismatch signal.

Journal ArticleDOI
TL;DR: The good performance against impulsive noise and theoretical results of the proposed algorithm are validated by simulations, and a variable-λ Llncosh (VLlncosh) scheme is introduced, aiming to acquire a compromise between fast initial convergence rate and satisfactory steady-state performance.

Journal ArticleDOI
TL;DR: Subspace methods for robust adaptive beamforming (RAB) utilize the orthogonality of subspace to reconstruct the interference covariance matrix (ICM) and are robust against types of mismatch to achieve well performance.

Journal ArticleDOI
TL;DR: An accuratePHFMs computation method based on Gaussian numerical integration (GNI) is proposed, which effectively mitigated the numerical integration error, and a novel watermarking algorithm resistant to geometric attacks based on accurate PHFMs and chaotic mapping is proposed.

Journal ArticleDOI
TL;DR: In this guide, an optimized blind image watermarking approach based on principal component analysis (PCA) in redundant discrete wavelet (R-DW) domain is proposed and extensive comparison of test results with conventional BW approaches show the robustness of the proposed framework.