期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection
1
作者 chengsheng yuan Baojie Cui +2 位作者 Zhili Zhou Xinting Li Qingming Jonathan Wu 《Computers, Materials & Continua》 SCIE EI 2024年第1期899-914,共16页
In recent years,deep learning has been the mainstream technology for fingerprint liveness detection(FLD)tasks because of its remarkable performance.However,recent studies have shown that these deep fake fingerprint de... In recent years,deep learning has been the mainstream technology for fingerprint liveness detection(FLD)tasks because of its remarkable performance.However,recent studies have shown that these deep fake fingerprint detection(DFFD)models are not resistant to attacks by adversarial examples,which are generated by the introduction of subtle perturbations in the fingerprint image,allowing the model to make fake judgments.Most of the existing adversarial example generation methods are based on gradient optimization,which is easy to fall into local optimal,resulting in poor transferability of adversarial attacks.In addition,the perturbation added to the blank area of the fingerprint image is easily perceived by the human eye,leading to poor visual quality.In response to the above challenges,this paper proposes a novel adversarial attack method based on local adaptive gradient variance for DFFD.The ridge texture area within the fingerprint image has been identified and designated as the region for perturbation generation.Subsequently,the images are fed into the targeted white-box model,and the gradient direction is optimized to compute gradient variance.Additionally,an adaptive parameter search method is proposed using stochastic gradient ascent to explore the parameter values during adversarial example generation,aiming to maximize adversarial attack performance.Experimental results on two publicly available fingerprint datasets show that ourmethod achieves higher attack transferability and robustness than existing methods,and the perturbation is harder to perceive. 展开更多
关键词 FLD adversarial attacks adversarial examples gradient optimization transferability
下载PDF
Fingerprint Liveness Detection from Different Fingerprint Materials Using Convolutional Neural Network and Principal Component Analysis 被引量:3
2
作者 chengsheng yuan Xinting Li +2 位作者 Q.M.Jonathan Wu Jin Li Xingming Sun 《Computers, Materials & Continua》 SCIE EI 2017年第4期357-372,共16页
Fingerprint-spoofing attack often occurs when imposters gain access illegally by using artificial fingerprints,which are made of common fingerprint materials,such as silicon,latex,etc.Thus,to protect our privacy,many ... Fingerprint-spoofing attack often occurs when imposters gain access illegally by using artificial fingerprints,which are made of common fingerprint materials,such as silicon,latex,etc.Thus,to protect our privacy,many fingerprint liveness detection methods are put forward to discriminate fake or true fingerprint.Current work on liveness detection for fingerprint images is focused on the construction of complex handcrafted features,but these methods normally destroy or lose spatial information between pixels.Different from existing methods,convolutional neural network(CNN)can generate high-level semantic representations by learning and concatenating low-level edge and shape features from a large amount of labeled data.Thus,CNN is explored to solve the above problem and discriminate true fingerprints from fake ones in this paper.To reduce the redundant information and extract the most distinct features,ROI and PCA operations are performed for learned features of convolutional layer or pooling layer.After that,the extracted features are fed into SVM classifier.Experimental results based on the LivDet(2013)and the LivDet(2011)datasets,which are captured by using different fingerprint materials,indicate that the classification performance of our proposed method is both efficient and convenient compared with the other previous methods. 展开更多
关键词 Fingerprint liveness detection CNNS PCA SVM ROI LivDet 2013 LivDet 2011
下载PDF
Fingerprint Liveness Detection Based on Multi-Scale LPQ and PCA 被引量:13
3
作者 chengsheng yuan Xingming Sun Rui Lv 《China Communications》 SCIE CSCD 2016年第7期60-65,共6页
Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artifici... Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artificial fingerprints can trick the fingerprint authentication system and access information using real users' identification.Therefore,a fingerprint liveness detection algorithm needs to be designed to prevent illegal users from accessing privacy information.In this paper,a new software-based liveness detection approach using multi-scale local phase quantity(LPQ) and principal component analysis(PCA) is proposed.The feature vectors of a fingerprint are constructed through multi-scale LPQ.PCA technology is also introduced to reduce the dimensionality of the feature vectors and gain more effective features.Finally,a training model is gained using support vector machine classifier,and the liveness of a fingerprint is detected on the basis of the training model.Experimental results demonstrate that our proposed method can detect the liveness of users' fingerprints and achieve high recognition accuracy.This study also confirms that multi-resolution analysis is a useful method for texture feature extraction during fingerprint liveness detection. 展开更多
关键词 fingerprint liveness detection wavelet transform local phase quantity principal component analysis support vector machine
下载PDF
A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography 被引量:5
4
作者 Ruohan Meng Zhili Zhou +2 位作者 Qi Cui Xingming Sun chengsheng yuan 《Journal of Information Hiding and Privacy Protection》 2019年第1期43-48,共6页
At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity ... At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity of coverless information hiding.At the same time,the steganography algorithm based on object detection only hides secret information in foreground objects,which contribute to the steganography capacity is reduced.Since object recognition contains multiple objects and location,secret information can be mapped to object categories,the relationship of location and so on.Therefore,this paper proposes a new steganography algorithm based on object detection and relationship mapping,which integrates coverless information hiding and steganography.In this method,the coverless information hiding is realized by mapping the object type,color and secret information in object detection method.At the same time,the object detection method is used to find the safe area to hide secret messages.The proposed algorithm can not only improve the steganographic capacity of the two information hiding methods but also make the coverless information hiding more secure and robust. 展开更多
关键词 STEGANOGRAPHY faster R-CNN coverless information hiding
下载PDF
A Novel Steganography Algorithm Based on Instance Segmentation 被引量:1
5
作者 Ruohan Meng Qi Cui +2 位作者 Zhili Zhou chengsheng yuan Xingming Sun 《Computers, Materials & Continua》 SCIE EI 2020年第4期183-196,共14页
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and aro... Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and arousing suspicion.We take advantage of the complexity of the object texture and consider that under certain circumstances,the object texture is more complex than the background of the image,so the foreground object is more suitable for steganography than the background.On the basis of instance segmentation,such as Mask R-CNN,the proposed method hides secret information into each object's region by using the masks of instance segmentation,thus realizing the information hiding of the foreground object without background.This method not only makes it more efficient for the receiver to extract information,but also proves to be more secure and robust by experiments. 展开更多
关键词 STEGANOGRAPHY object detection mask R-CNN irregular region
下载PDF
A Rasterized Lightning Disaster Risk Method for Imbalanced Sets Using Neural 被引量:1
6
作者 Yan Zhang Jin Han +3 位作者 chengsheng yuan Shuo Yang Chuanlong Li Xingming Sun 《Computers, Materials & Continua》 SCIE EI 2021年第1期563-574,共12页
Over the past 10 years,lightning disaster has caused a large number of casualties and considerable economic loss worldwide.Lightning poses a huge threat to various industries.In an attempt to reduce the risk of lightn... Over the past 10 years,lightning disaster has caused a large number of casualties and considerable economic loss worldwide.Lightning poses a huge threat to various industries.In an attempt to reduce the risk of lightning-caused disaster,many scholars have carried out in-depth research on lightning.However,these studies focus primarily on the lightning itself and other meteorological elements are ignored.In addition,the methods for assessing the risk of lightning disaster fail to give detailed attention to regional features(lightning disaster risk).This paper proposes a grid-based risk assessment method based on data from multiple sources.First,this paper considers the impact of lightning,the population density,the economy,and geographical environment data on the occurrence of lightning disasters;Second,this paper solves the problem of imbalanced lightning disaster data in geographic grid samples based on the K-means clustering algorithm;Third,the method calculates the feature of lightning disaster in each small field with the help of neural network structure,and the calculation results are then visually reflected in a zoning map by the Jenks natural breaks algorithm.The experimental results show that our method can solve the problem of imbalanced lightning disaster data,and offer 81%accuracy in lightning disaster risk assessment. 展开更多
关键词 Lightning disaster neural network imbalanced data
下载PDF
A Survey of Image Information Hiding Algorithms Based on Deep Learning
7
作者 Ruohan Meng Qi Cui chengsheng yuan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2018年第12期425-454,共30页
With the development of data science and technology,information security has been further concerned.In order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hi... With the development of data science and technology,information security has been further concerned.In order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hiding algorithms has been developed.Image information hiding is to make use of the redundancy of the cover image to hide secret information in it.Ensuring that the stego image cannot be distinguished from the cover image,and sending secret information to receiver through the transmission of the stego image.At present,the model based on deep learning is also widely applied to the field of information hiding.This paper makes an overall conclusion on image information hiding based on deep learning.It is divided into four parts of steganography algorithms,watermarking embedding algorithms,coverless information hiding algorithms and steganalysis algorithms based on deep learning.From these four aspects,the state-of-the-art information hiding technologies based on deep learning are illustrated and analyzed. 展开更多
关键词 STEGANOGRAPHY DEEP learning STEGANALYSIS WATERMARKING coverless information hiding.
下载PDF
A Lightweight Convolutional Neural Network with Representation Self-challenge for Fingerprint Liveness Detection
8
作者 Jie Chen chengsheng yuan +3 位作者 Chen Cui Zhihua Xia Xingming Sun Thangarajah Akilan 《Computers, Materials & Continua》 SCIE EI 2022年第10期719-733,共15页
Fingerprint identification systems have been widely deployed in many occasions of our daily life.However,together with many advantages,they are still vulnerable to the presentation attack(PA)by some counterfeit finger... Fingerprint identification systems have been widely deployed in many occasions of our daily life.However,together with many advantages,they are still vulnerable to the presentation attack(PA)by some counterfeit fingerprints.To address challenges from PA,fingerprint liveness detection(FLD)technology has been proposed and gradually attracted people’s attention.The vast majority of the FLD methods directly employ convolutional neural network(CNN),and rarely pay attention to the problem of overparameterization and over-fitting of models,resulting in large calculation force of model deployment and poor model generalization.Aiming at filling this gap,this paper designs a lightweight multi-scale convolutional neural network method,and further proposes a novel hybrid spatial pyramid pooling block to extract abundant features,so that the number of model parameters is greatly reduced,and support multi-scale true/fake fingerprint detection.Next,the representation self-challenge(RSC)method is used to train the model,and the attention mechanism is also adopted for optimization during execution,which alleviates the problem of model over-fitting and enhances generalization of detection model.Finally,experimental results on two publicly benchmarks:LivDet2011 and LivDet2013 sets,show that our method achieves outstanding detection results for blind materials and cross-sensor.The size of the model parameters is only 548 KB,and the average detection error of cross-sensors and cross-materials are 15.22 and 1 respectively,reaching the highest level currently available. 展开更多
关键词 FLD LIGHTWEIGHT MULTI-SCALE RSC blind materials
下载PDF
OPPR:An Outsourcing Privacy-Preserving JPEG Image Retrieval Scheme with Local Histograms in Cloud Environment
9
作者 Jian Tang Zhihua Xia +2 位作者 Lan Wang chengsheng yuan Xueli Zhao 《Journal on Big Data》 2021年第1期21-33,共13页
As the wide application of imaging technology,the number of big image data which may containing private information is growing fast.Due to insufficient computing power and storage space for local server device,many pe... As the wide application of imaging technology,the number of big image data which may containing private information is growing fast.Due to insufficient computing power and storage space for local server device,many people hand over these images to cloud servers for management.But actually,it is unsafe to store the images to the cloud,so encryption becomes a necessary step before uploading to reduce the risk of privacy leakage.However,it is not conducive to the efficient application of image,especially in the Content-Based Image Retrieval(CBIR)scheme.This paper proposes an outsourcing privacy-preserving JPEG CBIR scheme.We design a set of JPEG format-compatible encryption method,making no file expansion to JPEG files.We firstly combine multiple adjacent 8×8 DCT coefficient blocks into big-blocks.Then,random scrambling and stream encryption are used on the binary code of DCT coefficients to protect the JPEG image privacy.The task of extracting features from encrypted images and retrieving similar images are done by the cloud server.The group index histograms of DCT coefficients are extracted from the encrypted big-blocks,then the global vector is produced to represent the JPEG image with the aid of bag-of-words(BOW)model.The security analysis and experimental results show that our proposed scheme has strong security and good retrieval performance. 展开更多
关键词 JPEG image retrieval DCT coefficients BOW format-compatible
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部