Jingbing Li

Jingbing Li
Hainan University · college of information and communication engineering

About

115
Publications
5,518
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
626
Citations
Citations since 2017
66 Research Items
531 Citations
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150

Publications

Publications (115)
Article
Full-text available
Object detection is a vital research direction in machine vision and deep learning. The object detection technique based on deep understanding has achieved tremendous progress in feature extraction, image representation, classification, and recognition in recent years, due to this rapid growth of deep learning theory and technology. Scholars have p...
Article
Full-text available
With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it. Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermark...
Article
Full-text available
With the help of big data, cloud computing, artificial intelligence and other technologies, the informatization and intelligence of the wisdom medical have been gradually realized. However, with the transmission and storage of massive amounts of medical images in the cloud, information security issues have become increasingly prominent. The privacy...
Article
Full-text available
To solve the problem of poor robustness of existing traditional DCT‐based medical image watermarking algorithms under geometric attacks, a novel deep learning‐based robust zero‐watermarking algorithm for medical images is proposed. A Residual‐DenseNet is designed, which took low‐frequency features after discrete cosine transformation of medical ima...
Chapter
Thanks to the rapid development of the telemedicine, medical treatment has turned in great convenience. However, as the internet network can be addressed by any user, the medical images cannot avoid the defects of suffering from information leakage and require information encryption techniques. To protect the privacy of patients in medical images,...
Chapter
The fast development of digital information technology has made great improvement on medical imaging digital information technology. The medical images can not avoid the defect of suffering being attacked or tampered maliciously when they are transmitted, and medical image watermarking algorithms can solve the impact of these attacks or malicious t...
Chapter
With the gradual rise of telemedicine, a large number of images will be transmitted on the network during network consultation, which may cause privacy disclosure. How to more effectively ensure the information security of patients and the copyright of medical images has attracted great attention of scholars in relevant fields. This paper proposed...
Chapter
Using traditional watermarking technology to embed watermark in the carrier image will destroy the pixel information and is not suitable for the privacy protection of medical images. Based on this, we proposed a zero-watermarking algorithm based on residual network and depthwise separable convolutions for medical images. First, a convolutional neur...
Article
Full-text available
The gradual improvement of traditional medicare in the cloud has greatly promoted the development of medical enterprise. Meanwhile, problems such as the leakage of patients’ personal information, the theft, and tamper of medical images transmitted in the cloud have become increasingly prominent. To solve the above problems, a novel zero-watermarkin...
Article
Full-text available
In the information age, network security has gradually become a potentially huge problem, especially in the medical field, it is essential to ensure the accuracy and safety of images, and patient information needs to be included with minimal change. Combined log-polar transform (LPT) and discrete cosine transform (DCT), a novel robust watermarking...
Article
Full-text available
With the wide application of digital watermarking technology in the field of medical imaging, the security of medical image information has been improved. Aiming at the problem of poor robustness of medical image watermarking algorithms against geometric attacks, the security of medical images cannot be guaranteed. This paper proposed a zero waterm...
Article
Full-text available
Digital medical system not only facilitates the storage and transmission of medical information but also brings information security problems. Aiming at the security of medical images, a robust zero watermarking algorithm for medical images based on Zernike-DCT is proposed. The algorithm first uses a chaotic logic sequence to preprocess and encrypt...
Article
Full-text available
To protect the patient information in medical images, this article proposes a robust watermarking algorithm for medical images based on Harris-SURF-DCT. First, the corners of the medical image are extracted using the Harris corner detection algorithm, and then, the previously extracted corners are described using the method of describing feature po...
Article
Full-text available
Studying the progress and trend of the novel coronavirus pneumonia (COVID-19) transmission mode will help effectively curb its spread. Some commonly used infectious disease prediction models are introduced. The hybrid model is proposed, which overcomes the disadvantages of the logistic model’s inability to predict the number of confirmed diagnoses...
Chapter
The development of digital age accelerated the development of digital medical systems, but it also inevitably brings security problems of the transmission and storage of medical images in the network. The wide use of digital watermarking technology in medical images has effectively improved such problems, but the research on the medical image water...
Chapter
In recent years, digital watermarking technology has been widely used to solve the protection of privacy issues in medical images. However, the existing algorithms are failed to solve the protection problems against geometric attacks. To solve this problem, a robust digital watermarking algorithm for medical images based on PHTs-DCT is proposed in...
Chapter
The rapid development of the information age of big data has promoted the development of traditional medicine and online diagnosis, as well as aroused concerns about the privacy of patient information. Aiming at the hidden dangers of copying, cutting, tampering, etc. in the dissemination of medical images, combined with the characteristics of medic...
Chapter
The patients’ case files may be maliciously tampered with during network transmission. Once the patients’ medical record information is altered by criminals, serious medical accidents will occur. To solve the problem of information leakage, a robust medical image watermarking algorithm based on Hough transform and discrete cosine transform (HOUGH-D...
Chapter
Image steganography has always an important part in the field of information security. In this paper, we propose a new color image steganography scheme base on convolutional neural network, which can hide the secret image into the cover image of the same size. The steganography scheme consists of two parts, the hiding network and the reveal network...
Article
Full-text available
Digital watermarking technology, as a powerful tool for copyright protection and content authentication of multimedia works, has received increasing attention, and the current image watermarking technology has developed significantly. Generally, embedding a watermark is done in grayscale images, mainly due to the fact that grayscale images are easi...
Article
Full-text available
Recent applications of convolutional neural networks (CNNs) in single image super-resolution (SISR) have achieved unprecedented performance. However, existing CNN-based SISR network structure design consider mostly only channel or spatial information, and cannot make full use of both channel and spatial information to improve SISR performance furth...
Article
With the advancement of networks and multimedia, digital watermarking technology has received worldwide attention as an effective method of copyright protection. Improving the anti-geometric attack ability of digital watermarking algorithms using image feature-based algorithms have received extensive attention. This paper proposes a novel robust wa...
Chapter
Recently, deep convolutional neural networks have enabled SISR to achieve amazing performance and visual experience. However, we note that most current methods fail to model effective long-distance dependence, either considering only channel-wise attention modeling or considering a self-attention mechanism to model long-range dependencies resulting...
Chapter
With the popularization of digital medicine, the protection of patients’ privacy has become extremely important in the medical field. Embedding watermarks into medical images is one of the effective ways to protect patients’ privacy. However, the existing watermarking algorithms have poor robustness under geometric attacks. To solve this problem, a...
Chapter
Full-text available
For most of the current watermarking algorithms, a multi-function color image that can simultaneously perform copyright protection and content authentication is proposed as Dual watermarking algorithm. First, the original image is converted from RGB space to YUV space, and the SURF (speeded up robust feature) of the luminance component is extracted...
Chapter
In order to solve the security problem of medical information and improve the robustness of watermarking algorithms for medical image, a noval watermarking algorithm based on discrete wavelet transform and discrete fractional fourier transform (DWT-DFRFT) was proposed. First, DWT-DFRFT transform was applied to extract the feature vectors of origina...
Article
Full-text available
In the continuous development of computer network technology, multimedia technology and information technology, digitization has become the main means of displaying information, thus facilitating the storage, copying and dissemination of digital multimedia information. In this context, there are no restrictions on arbitrary editing, copying, modifi...
Chapter
Aiming at the requirements of watermarking technology for medical images, a medical CT image watermarking algorithm based on compressed sensing and multiple transform domains is proposed to make the watermarking highly invisible. Compressing and preprocessing the watermark image can not only play the role of watermark encryption, but also reduce th...
Chapter
Face recognition technology is currently one of the most popular and widely used artificial intelligence technologies. The application system based on face recognition technology brings many new security and privacy issues. The face image database of the traditional face recognition method is stored in the cloud, which may be attacked by hackers an...
Article
Full-text available
The advancement of 5G technology, big data and cloud storage has promoted the rapid development of the Internet of Medical Things (IoMT). Based on the strict security requirements and high level of accuracy required for disease diagnosis and pathological analysis, 3D medical volume data have been created in large numbers. The IoMT facilitates the r...
Article
Full-text available
With the widespread use of color images, the copyright protection of those images using watermarks is one of the latest research topics. The use of color images as watermarks has advantages over binary and irreplaceable grayscale images. Color images are intuitive, rich, and lively; they have large amounts of copyright protection information and mo...
Chapter
With the rapid development of medical imaging technology, digital information systems have become more and more important. However, medical images are vulnerable to be attacked or malicious tampered during transmission. Medical image watermarking algorithm using wavelet transform can solve the above problems and has been widely used in recent years...
Chapter
Researching digital watermarking algorithms with better transparency and robustness is essential for protecting the copyright of medical images. Security issues in medical images are increasing day to day with the increase of health data all around the globe. This paper proposed a new algorithm image-based zero-watermarking using SURF-DCT perceptua...
Chapter
Medical images are a special kind of image, since the information contained within must be kept strictly confidential. With a view to protecting personal information, a plethora of research has been carried out in the field of digital watermarking. However, in previous studies, watermarkings were encrypted and the processing of original medical ima...
Chapter
The production, distribution, and consumption of counterfeit goods have been increasing at an alarming rate around the world. In order to resist the bad influence of fake and inferior products, an automatic encryption algorithm for anti-counterfeiting tags based on DWT-DCT and Chen’s chaos is proposed in this paper. Chen’s chaos is used to encrypt...
Chapter
In recent years use of a Wireless Sensor Network (WSN) has become a leading area of research in various applications. Because of WSN limitation of its own features that low ability of calculation, small volume of storage, resource constrain, bad communicational environment of wireless, which lead to WSN be besieged by imminent security problems, th...
Article
Full-text available
In the current medical system, the privacy and security of the medical information with respect to its transmission and storage is a key challenge. In pursuit of this, we proposed a contourlet transform and Discrete Cosine Transform (DCT) based multiple robust watermarking algorithms for medical imaging. The proposed scheme uses contourlet transfor...
Article
Full-text available
To resolve the contradiction between existing watermarking methods—which are not compatible with the watermark’s ability to resist geometric attacks—and robustness, a robust multi-watermarking algorithm suitable for medical images is proposed. First, the visual feature vector of the medical image was obtained by dual-tree complex wavelet transform...
Chapter
An intrusion detection method which is suitable for the characteristics of WSN (wireless sensor networks) is proposed intrusion detection based on single-class support vector machine. SVM (Support vector machines) can directly train and model the collected data sets, automatically generate detection models, and improve the efficiency of intrusion d...
Chapter
With the progress of the Internet and the development of science and technology, face recognition technology is becoming more and more mature, has been paid more and more attention and application in the fields of monitoring, finance and information security. Compare with the traditional authentication methods, face recognition technology is more s...
Chapter
Medical image containing patient information is often faced with various attacks in the transmission process. In order to enhance the medical information system security, and effectively solve the problem of medical data protection, a new algorithm of medical image watermarking based on SIFT-DCT perceptual hashing (scale invariant feature transform...
Conference Paper
The medical image needs to be encrypted before storing in cloud platform to protect against leaking the personal private information of medical image. And we expect the encrypted medical image can be retrieved automatically in cloud computing platform, but traditional medical image retrieval is based on the visual feature, which is difficult to ide...
Conference Paper
Cloud computing platform is not a fully trusted third party, which may leak the patient’s personal information when we store medical image, so we need to encrypt medical image. Meanwhile, in order to help doctors who can find out historical cases from the medical image database which are similar to the current diagnostic image to make more accurate...
Conference Paper
Most of the existing robust watermarking schemes were designed to embed the watermark information into the plaintext images, which leads to a latent risk of exposing information and are vulnerable to unauthorized access. In addition, the robustness of watermarking in the encrypted domain is another issue that should be taken into account. Based on...
Article
Full-text available
Medical volume data containing patient information is often faced with various attacks in the transmission process. In order to enhance the medical information system security, and effectively solve the problem of medical volume data protection, a new zero-watermarking algorithm is proposed in the paper. The new zero-watermarking algorithm takes ad...
Conference Paper
In order to protect personal information, numerous works has been done in watermarking field. However, there still leaves some problems to be solved: (1) most of the watermarking methods were processed in the plaintext domains, which leave latent risk of exposing host image information, thus it is needed to encrypt the host image and process the wa...
Article
Digital watermarking can be applied to protection of medical images privacy, hiding of patient's diagnosis information and so on. In order to improve the ability of resisting geometric attacks, a new watermarking algorithm for medical volume data in sub-block three-dimensional discrete cosine transform domain is presented. The original watermarking...
Article
Over Design (OD) and Under Design (UD) are two common concepts which are used to express negative construction of functionality, quality and even value. Software requirement satisfaction can be decomposed a routine of constant steps of minimizing UD and O D. How-ever currently they don’t have formal semantics from existing literature. The situation...
Article
Digital watermarking is a research hotspot in the field of image security, which is protected digital image copyright. In order to ensure medical image information security, a novel medical image digital watermarking algorithm in three-dimensional Fourier compressed domain is proposed. The novel medical image digital watermarking algorithm takes ad...
Article
Full-text available
In order to protect the copyright of medical volume data, a new zero-watermarking algorithm for medical volume data is presented based on Legendre chaotic neural network and difference hashing in three-dimensional discrete cosine transform domain. It organically combines the Legendre chaotic neural network, three-dimensional discrete cosine transfo...
Article
Full-text available
Applying digital watermarking technique for the security protection of medical information systems is a hotspot of research in recent years. In this paper, we present a robust watermarking algorithm for medical volume data using 3D DWT-DCT and Logistic Map. After applying Logistic Map to enhance the security of watermarking, the visual feature vect...
Article
Aiming at medical image information security problem, this paper proposes a new robust zero-watermarking algorithm for medical volume data based on three-dimensional discrete wavelet transform, three-dimensional Fourier transform and hermite chaotic neural network . Firstly, it employs a novel hermite chaotic neural network to generate the pseudo-r...