Results 241 to 250 of about 167,829 (332)

Localization With Approximate Nearest Neighbour Search

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
Localization and place recognition are crucial in fields like autonomous driving and robotics, but real‐time performance is challenging with exact nearest neighbour search methods in large‐scale scenarios. The authors propose using an approximate nearest neighbour search method, specifically the hierarchical navigable small world (HNSW) structure ...
Roland Kotroczó   +4 more
wiley   +1 more source

A Robust Reversible Watermarking Algorithm Resistant to Geometric Attacks Based on Tchebichef Moments

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
This paper presents a robust reversible watermarking algorithm based on Chebyshev moments, employing a two‐stage embedding mechanism. The proposed method leverages image block partitioning to embed the copyright watermark and the reversible watermark into non‐overlapping regions located inside and outside the inscribed circle of the image, respectively.
Wenjing Sun, Ling Zhang, Hongjun Zhang
wiley   +1 more source

Hyperchaos‐Driven 3D RGB Image Scrambling and Encryption for Multi‐Image Security

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
The proposed encryption scheme scrambles N colour images by stacking them into a three‐dimensional red, green, blue image, generating a secure 256‐bit key using SHA‐256 and a user‐provided salt, and applying a five‐dimensional multi‐wing hyperchaotic system to produce random key streams.
Muhammad Hanif   +6 more
wiley   +1 more source

Revisiting the Security of the Lightweight Stream Cipher Draco: New Observation and TMDTO Attacks

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Draco is a lightweight small‐state stream cipher proposed in 2022. It is designed to provide a 128‐bit security level and be provably secure against time‐memory‐data trade‐off (TMDTO) attacks. In this paper, we revisit the security of Draco against TMDTO attacks.
Ziyu Guan   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy