期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism
1
作者 Nannan Wu xianyi chen +1 位作者 James Msughter Adeke Junjie Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第3期3001-3019,共19页
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks s... Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks self-adaptability,information leakage,or weak concealment.To address these issues,this study proposes a universal and adaptable image-hiding method.First,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image domain.Second,to improve perceived human similarity,perceptual loss is incorporated into the training process.The experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality output.Furthermore,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at 0.0001.Moreover,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks. 展开更多
关键词 Deep image hiding attention mechanism privacy protection data security visual quality
下载PDF
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
2
作者 Bin Wu xianyi chen +5 位作者 Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei 《Computers, Materials & Continua》 SCIE EI 2024年第3期3177-3194,共18页
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so on.Data owners and users can save costs and improve efficiency by storing large amounts of graph data on... In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so on.Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers.Servers on cloud platforms usually have some subjective or objective attacks,which make the outsourced graph data in an insecure state.The issue of privacy data protection has become an important obstacle to data sharing and usage.How to query outsourcing graph data safely and effectively has become the focus of research.Adjacency query is a basic and frequently used operation in graph,and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same time.This work proposes to protect the privacy information of outsourcing graph data by encryption,mainly studies the problem of multi-keyword fuzzy adjacency query,and puts forward a solution.In our scheme,we use the Bloom filter and encryption mechanism to build a secure index and query token,and adjacency queries are implemented through indexes and query tokens on the cloud server.Our proposed scheme is proved by formal analysis,and the performance and effectiveness of the scheme are illustrated by experimental analysis.The research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology. 展开更多
关键词 PRIVACY-PRESERVING adjacency query multi-keyword fuzzy search encrypted graph
下载PDF
Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform
3
作者 Xiangmin Guo Guangjun Liang +1 位作者 Jiayin Liu xianyi chen 《Computers, Materials & Continua》 SCIE EI 2023年第12期3305-3323,共19页
Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and security.However,information shoplifting poses significant threats,potentially leading... Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and security.However,information shoplifting poses significant threats,potentially leading to poor performance and privacy breaches.Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms,ensuring businesses can focus on business development.To ensure data security in cloud platforms,this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing(HD2C)model.However,the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of Things(IoT)in the cloud.HD2C is developed by combining Federated Learning(FL)with a Blockchain consensus algorithm to connect smart contracts with Proof of Authority.The“Data Island”problem can be solved by FL’s emphasis on privacy and lightning-fast processing,while Blockchain provides a decentralized incentive structure that is impervious to poisoning.FL with Blockchain allows quick consensus through smart member selection and verification.The HD2C paradigm significantly improves the computational processing efficiency of intelligent manufacturing.Extensive analysis results derived from IIoT datasets confirm HD2C superiority.When compared to other consensus algorithms,the Blockchain PoA’s foundational cost is significant.The accuracy and memory utilization evaluation results predict the total benefits of the system.In comparison to the values 0.004 and 0.04,the value of 0.4 achieves good accuracy.According to the experiment results,the number of transactions per second has minimal impact on memory requirements.The findings of this study resulted in the development of a brand-new IIoT framework based on blockchain technology. 展开更多
关键词 Blockchain Internet of Things(IoT) blockchain based cognitive computing Hybridized Data Driven Cognitive Computing(HD2C) Federated Learning(FL) Proof of Authority(PoA)
下载PDF
A Dual Model Watermarking Framework for Copyright Protection in Image Processing Networks
4
作者 Yuhang Meng xianyi chen +2 位作者 Xingming Sun Yu Liu Guo Wei 《Computers, Materials & Continua》 SCIE EI 2023年第4期831-844,共14页
Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely used... Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely usedin model copyright protection, but there are two challenges: (1) designinguniversal trigger sample watermarking for different network models is stilla challenge;(2) existing methods of copyright protection based on trigger swatermarking are difficult to resist forgery attacks. In this work, we propose adual model watermarking framework for copyright protection in image processingnetworks. The trigger sample watermark is embedded in the trainingprocess of the model, which can effectively verify the model copyright. And wedesign a common method for generating trigger sample watermarks based ongenerative adversarial networks, adaptively generating trigger sample watermarksaccording to different models. The spatial watermark is embedded intothe model output. When an attacker steals model copyright using a forgedtrigger sample watermark, which can be correctly extracted to distinguishbetween the piratical and the protected model. The experiments show that theproposed framework has good performance in different image segmentationnetworks of UNET, UNET++, and FCN (fully convolutional network), andeffectively resists forgery attacks. 展开更多
关键词 Image processing networks copyright protection model watermark
下载PDF
A GLCM-Feature-Based Approach for Reversible Image Transformation 被引量:2
5
作者 xianyi chen Haidong Zhong Zhifeng Bao 《Computers, Materials & Continua》 SCIE EI 2019年第4期239-255,共17页
Recently,a reversible image transformation(RIT)technology that transforms a secret image to a freely-selected target image is proposed.It not only can generate a stego-image that looks similar to the target image,but ... Recently,a reversible image transformation(RIT)technology that transforms a secret image to a freely-selected target image is proposed.It not only can generate a stego-image that looks similar to the target image,but also can recover the secret image without any loss.It also has been proved to be very useful in image content protection and reversible data hiding in encrypted images.However,the standard deviation(SD)is selected as the only feature during the matching of the secret and target image blocks in RIT methods,the matching result is not so good and needs to be further improved since the distributions of SDs of the two images may be not very similar.Therefore,this paper proposes a Gray level co-occurrence matrix(GLCM)based approach for reversible image transformation,in which,an effective feature extraction algorithm is utilized to increase the accuracy of blocks matching for improving the visual quality of transformed image,while the auxiliary information,which is utilized to record the transformation parameters,is not increased.Thus,the visual quality of the stego-image should be improved.Experimental results also show that the root mean square of stego-image can be reduced by 4.24%compared with the previous method. 展开更多
关键词 Image encryption feature extraction reversible image transformation GLCM
下载PDF
Steganalysis of LSB Matching Using Characteristic Function Moment of Pixel Differences 被引量:1
6
作者 xianyi chen Guangyong Gao +1 位作者 Dandan Liu Zhihua Xia 《China Communications》 SCIE CSCD 2016年第7期66-73,共8页
Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public networks.This paper concentrates on steganalysis against spatial least significant bit(LSB) ma... Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public networks.This paper concentrates on steganalysis against spatial least significant bit(LSB) matching,which is the prototype of many advanced information hiding methods.Many existing algorithms deal with steganalysis problems by using the dependencies between adjacent pixels.From another aspect,this paper calculates the differences among pixel pairs and proves that the histogram of difference values will be smoothed by stego noises.We calculate the difference histogram characteristic function(DHCF) and deduce that the moment of DHCFs(DHCFM) will be diminished after stego bits are hidden in the image.Accordingly,we compute the DHCFMs as the discriminative features.We calibrate the features by decreasing the influence of image content on them and train support vector machine classifiers based on the calibrated features.Experimental results demonstrate that the DHCFMs calculated with nonadjacent pixels are helpful to detect stego messages hidden by LSB matching. 展开更多
关键词 特征函数 相邻像素 矩匹配 LSB 差异分析 支持向量机分类器 应用 秘密信息
下载PDF
A Meaningful Image Encryption Algorithm Based on Prediction Error and Wavelet Transform 被引量:1
7
作者 Mengling Zou Zhengxuan Liu xianyi chen 《Journal on Big Data》 2019年第3期151-158,共8页
Image encryption(IE)is a very useful and popular technology to protect the privacy of users.Most algorithms usually encrypt the original image into an image similar to texture or noise,but texture and noise are an obv... Image encryption(IE)is a very useful and popular technology to protect the privacy of users.Most algorithms usually encrypt the original image into an image similar to texture or noise,but texture and noise are an obvious visual indication that the image has been encrypted,which is more likely to cause the attacks of enemy.To overcome this shortcoming,many image encryption systems,which convert the original image into a carrier image with visual significance have been proposed.However,the generated cryptographic image still has texture features.In line with the idea of improving the visual quality of the final password images,we proposed a meaningful image hiding algorithm based on prediction error and discrete wavelet transform.Lots of experimental results and safety analysis show that the proposed algorithm can achieve high visual quality and ensure the security at the same time. 展开更多
关键词 Image encryption meaningful prediction error wavelet transform
下载PDF
A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment
8
作者 Zhihua Xia Lihua Lu +3 位作者 Tong Qiu H.J.Shim xianyi chen Byeungwoo Jeon 《Computers, Materials & Continua》 SCIE EI 2019年第1期27-43,共17页
Content based image retrieval(CBIR)techniques have been widely deployed in many applications for seeking the abundant information existed in images.Due to large amounts of storage and computational requirements of CBI... Content based image retrieval(CBIR)techniques have been widely deployed in many applications for seeking the abundant information existed in images.Due to large amounts of storage and computational requirements of CBIR,outsourcing image search work to the cloud provider becomes a very attractive option for many owners with small devices.However,owing to the private content contained in images,directly outsourcing retrieval work to the cloud provider apparently bring about privacy problem,so the images should be protected carefully before outsourcing.This paper presents a secure retrieval scheme for the encrypted images in the YUV color space.With this scheme,the discrete cosine transform(DCT)is performed on the Y component.The resulting DC coefficients are encrypted with stream cipher technology and the resulting AC coefficients as well as other two color components are encrypted with value permutation and position scrambling.Then the image owner transmits the encrypted images to the cloud server.When receiving a query trapdoor form on query user,the server extracts AC-coefficients histogram from the encrypted Y component and extracts two color histograms from the other two color components.The similarity between query trapdoor and database image is measured by calculating the Manhattan distance of their respective histograms.Finally,the encrypted images closest to the query image are returned to the query user. 展开更多
关键词 Image retrieval AC-coefficients HISTOGRAM color HISTOGRAM discrete cosine transform
下载PDF
An Online Chronic Disease Prediction System Based on Incremental Deep Neural Network
9
作者 Bin Yang Lingyun Xiang +1 位作者 xianyi chen Wenjing Jia 《Computers, Materials & Continua》 SCIE EI 2021年第4期951-964,共14页
Many chronic disease prediction methods have been proposed to predict or evaluate diabetes through artificial neural network.However,due to the complexity of the human body,there are still many challenges to face in t... Many chronic disease prediction methods have been proposed to predict or evaluate diabetes through artificial neural network.However,due to the complexity of the human body,there are still many challenges to face in that process.One of them is how to make the neural network prediction model continuously adapt and learn disease data of different patients,online.This paper presents a novel chronic disease prediction system based on an incremental deep neural network.The propensity of users suffering from chronic diseases can continuously be evaluated in an incremental manner.With time,the system can predict diabetes more and more accurately by processing the feedback information.Many diabetes prediction studies are based on a common dataset,the Pima Indians diabetes dataset,which has only eight input attributes.In order to determine the correlation between the pathological characteristics of diabetic patients and their daily living resources,we have established an in-depth cooperation with a hospital.A Chinese diabetes dataset with 575 diabetics was created.Users’data collected by different sensors were used to train the network model.We evaluated our system using a real-world diabetes dataset to confirm its effectiveness.The experimental results show that the proposed system can not only continuously monitor the users,but also give early warning of physiological data that may indicate future diabetic ailments. 展开更多
关键词 Deep learning incremental learning network architecture design chronic disease prediction
下载PDF
Adaptive Binary Coding for Scene Classification Based on Convolutional Networks
10
作者 Shuai Wang xianyi chen 《Computers, Materials & Continua》 SCIE EI 2020年第12期2065-2077,共13页
With the rapid development of computer technology,millions of images are produced everyday by different sources.How to efficiently process these images and accurately discern the scene in them becomes an important but... With the rapid development of computer technology,millions of images are produced everyday by different sources.How to efficiently process these images and accurately discern the scene in them becomes an important but tough task.In this paper,we propose a novel supervised learning framework based on proposed adaptive binary coding for scene classification.Specifically,we first extract some high-level features of images under consideration based on available models trained on public datasets.Then,we further design a binary encoding method called one-hot encoding to make the feature representation more efficient.Benefiting from the proposed adaptive binary coding,our method is free of time to train or fine-tune the deep network and can effectively handle different applications.Experimental results on three public datasets,i.e.,UIUC sports event dataset,MIT Indoor dataset,and UC Merced dataset in terms of three different classifiers,demonstrate that our method is superior to the state-of-the-art methods with large margins. 展开更多
关键词 Scene classification convolutional neural network one-hot encoding supervised feature training
下载PDF
Coverless Image Steganography Method Based on Feature Selection
11
作者 Anqi Qiu xianyi chen +2 位作者 Xingming Sun Shuai Wang Guo Wei 《Journal of Information Hiding and Privacy Protection》 2019年第2期49-60,共12页
A new information hiding technology named coverless information hiding is proposed.It uses original natural images as stego images to represent secret information.The focus of coverless image steganography method is h... A new information hiding technology named coverless information hiding is proposed.It uses original natural images as stego images to represent secret information.The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information.In this paper,we use three kinds of features which are Local Binary Pattern(LBP),the mean value of pixels and the variance value of pixels.On this basis,we realize the transmission of secret information.Firstly,the hash sequence of the original cover image is obtained according to the description of the feature,and then the sequence of the secret information and the hash sequence of the original cover image are matched one by one.If the values are not the same,the image blocks of the original cover image are replaced according to the secret information to get the stego image.This paper explores the effect of three features on the visual quality of stego image.Experimental results show that the feature LBP is the best. 展开更多
关键词 Coverless-image-steganography(CIS) FEATURE visual quality.
下载PDF
Enhanced electrocaloric effect at room temperature in Mn^(2+) doped lead-free(BaSr)TiO_(3) ceramics via a direct measurement 被引量:2
12
作者 Xiang NIU Xiaodong JIAN +6 位作者 xianyi chen Haoxuan LI Wei LIANG Yingbang YAO Tao TAO Bo LIANG Sheng-Guo LU 《Journal of Advanced Ceramics》 SCIE CAS CSCD 2021年第3期482-492,共11页
(Ba_(1-x)Sr_(x))(MnyTi1-y)O_(3)(BSMT)ceramics with x=35,40 mol%and y=0,0.1,0.2,0.3,0.4,0.5 mol%were prepared using a conventional solid-state reaction approach.The dielectric and ferroelectric properties were characte... (Ba_(1-x)Sr_(x))(MnyTi1-y)O_(3)(BSMT)ceramics with x=35,40 mol%and y=0,0.1,0.2,0.3,0.4,0.5 mol%were prepared using a conventional solid-state reaction approach.The dielectric and ferroelectric properties were characterized using impedance analysis and polarization-electric field(P-E)hysteresis loop measurements,respectively.The adiabatic temperature drop was directly measured using a thermocouple when the applied electric field was removed.The results indicate that high permittivity and low dielectric losses were obtained by doping 0.1-0.4 mol%of manganese ions in(BaSr)TiO_(3)(BST)specimens.A maximum electrocaloric effect(ECE)of 2.75 K in temperature change with electrocaloric strength of 0.55 K·(MV/m)^(-1)was directly obtained at~21℃and 50 kV/cm in Ba_(0.6)Sr_(0.4)Mn_(0.001)Ti_(0.999)O_(3) sample,offering a promising ECE material for practical refrigeration devices working at room temperature. 展开更多
关键词 barium strontium titanate ceramics PERMITTIVITY dielectric loss electrocaloric effect electrocaloric strength
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部