2018
DOI: 10.1186/s13640-018-0336-0
|View full text |Cite
|
Sign up to set email alerts
|

Iterative learning control for image feature extraction with multiple-image blends

Abstract: In this paper, a novel method of image extraction is proposed. Firstly, the image information is embedded into the parameters of the chaotic system, and then the image is overlapped and embedded to complete the image hiding. This process is equivalent to a dynamic system with unknown time-varying parameters. Secondly, the D-type iterative learning control algorithm is used to extract the information hidden in the image, because iterative learning can be used to estimate the time-varying parameter system comple… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…Due to the characteristics and importance of digital image and to avoid attacks from any unauthorized people/company/system and so on, many different preventive techniques and approaches have been developed to make data over a network confidential and durable and also storing data in secret [13]. These techniques are based on chaos [14,15], DCT [16,17], GA [18,19], XOR operations [20,21] and Neural Networks (NN) [22,23].…”
Section: Image Encryptionmentioning
confidence: 99%
“…Due to the characteristics and importance of digital image and to avoid attacks from any unauthorized people/company/system and so on, many different preventive techniques and approaches have been developed to make data over a network confidential and durable and also storing data in secret [13]. These techniques are based on chaos [14,15], DCT [16,17], GA [18,19], XOR operations [20,21] and Neural Networks (NN) [22,23].…”
Section: Image Encryptionmentioning
confidence: 99%
“…The work of Zhang et al [14] have used an iterative learning scheme for extracting hidden information in the form of feature.…”
Section: Related Studiesmentioning
confidence: 99%
“…The comparison algorithms of feature extraction methods are: single dense sampling (baseline), dense sampling + Trajectory Correction (baseline + TC), dense sampling + Concept Dictionary (baseline + CD), Cluster, 26 and MVAD 27 . The comparison algorithm of feature selection adopts SIFT, 28 SURF, 29 LBP, 30 Cluster, and MVAD.…”
Section: Performance Evaluationmentioning
confidence: 99%