This paper examines automatic recognition and extraction of tables from a large collection of het-erogeneous documents. The heterogeneous documents are initially pre-processed and converted to HTML codes, after which ...This paper examines automatic recognition and extraction of tables from a large collection of het-erogeneous documents. The heterogeneous documents are initially pre-processed and converted to HTML codes, after which an algorithm recognises the table portion of the documents. Hidden Markov Model (HMM) is then applied to the HTML code in order to extract the tables. The model was trained and tested with five hundred and twenty six self-generated tables (three hundred and twenty-one (321) tables for training and two hundred and five (205) tables for testing). Viterbi algorithm was implemented for the testing part. The system was evaluated in terms of accuracy, precision, recall and f-measure. The overall evaluation results show 88.8% accuracy, 96.8% precision, 91.7% recall and 88.8% F-measure revealing that the method is good at solving the problem of table extraction.展开更多
During the four and half months of my staying at the Albright Institute of Archaeological Research in Jerusalem and in the Hebrew University(01.12.2013–13.04.2014),I had the chance to read and study some unpublished ...During the four and half months of my staying at the Albright Institute of Archaeological Research in Jerusalem and in the Hebrew University(01.12.2013–13.04.2014),I had the chance to read and study some unpublished cuneiform tablets.Here,I would like to make a small contribution to the work of publishing the precious information hidden in the cuneiform tablets from ancient Mesopotamia,and hope that some colleagues can give some improved reading展开更多
Steganography is a technique hiding secret information within innocent-looking information (e.g., text, audio, image, video, and so on). In this paper, we propose a quantum steganography protocol using plain text as i...Steganography is a technique hiding secret information within innocent-looking information (e.g., text, audio, image, video, and so on). In this paper, we propose a quantum steganography protocol using plain text as innocent-looking information called cover data. Our steganograpy protocol has three features. First, we can use any plain text that is inde-pendent of any secret message sent between parties. When we make stego data, we do not need to change the content of plain text at all. Second, embedded messages are not included in opened information (innocent-looking messages), but are included as phases of the entangled states. Finally, in quantum states shared between parties in advance, i.e., as quantum keys used when the parties recover secret messages from stego data, neither innocent-looking information nor the information of any secret message is included.展开更多
A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a h...A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a hidden channel to transmit secret messages using entanglement swapping between one GHZ state and one Bell state in cavity QED together with the Hadamard operation. The quantum steganography protocol is insensitive to cavity decay and the thermal field. The capacity, imperceptibility and security against eavesdropping are analyzed in detail in the protocol. It turns out that the protocol not only has good imperceptibility but also possesses good security against eavesdropping. In addition, its capacity for a hidden channel achieves five bits, larger than most of the previous quantum steganography protocols.展开更多
For the traditional steganographic method of Jsteg, the emmbedment of secret message is completed by dividing cover-image into nonoverlapping blocks of 8×8 pixels, discrete cosine transform (DCT) transforming, ...For the traditional steganographic method of Jsteg, the emmbedment of secret message is completed by dividing cover-image into nonoverlapping blocks of 8×8 pixels, discrete cosine transform (DCT) transforming, and using the standard 8×8 quantization table to quantize. In this paper, a novel steganographic method based on the JPEG quantization table modification is presented. Instead of dividing cover-image into 8×8 blocks, nonoverlapping blocks of 16×16 pixels is used. Both theoretical anlysis and experiment results show that the new methods has larger steganography capacity and better stego-image quality, compared with the method of Jsteg and Chang's展开更多
文摘This paper examines automatic recognition and extraction of tables from a large collection of het-erogeneous documents. The heterogeneous documents are initially pre-processed and converted to HTML codes, after which an algorithm recognises the table portion of the documents. Hidden Markov Model (HMM) is then applied to the HTML code in order to extract the tables. The model was trained and tested with five hundred and twenty six self-generated tables (three hundred and twenty-one (321) tables for training and two hundred and five (205) tables for testing). Viterbi algorithm was implemented for the testing part. The system was evaluated in terms of accuracy, precision, recall and f-measure. The overall evaluation results show 88.8% accuracy, 96.8% precision, 91.7% recall and 88.8% F-measure revealing that the method is good at solving the problem of table extraction.
基金the result of the Project for the Ur III Archives from DrehemNational Fund 10BSS005 and Project for the Public Values in History of NENU~~
文摘During the four and half months of my staying at the Albright Institute of Archaeological Research in Jerusalem and in the Hebrew University(01.12.2013–13.04.2014),I had the chance to read and study some unpublished cuneiform tablets.Here,I would like to make a small contribution to the work of publishing the precious information hidden in the cuneiform tablets from ancient Mesopotamia,and hope that some colleagues can give some improved reading
文摘Steganography is a technique hiding secret information within innocent-looking information (e.g., text, audio, image, video, and so on). In this paper, we propose a quantum steganography protocol using plain text as innocent-looking information called cover data. Our steganograpy protocol has three features. First, we can use any plain text that is inde-pendent of any secret message sent between parties. When we make stego data, we do not need to change the content of plain text at all. Second, embedded messages are not included in opened information (innocent-looking messages), but are included as phases of the entangled states. Finally, in quantum states shared between parties in advance, i.e., as quantum keys used when the parties recover secret messages from stego data, neither innocent-looking information nor the information of any secret message is included.
基金Project supported by the National Natural Science Foundation of China (Grant No. 60972071)the Natural Science Foundation of Zhejiang Province, China(Grant Nos. LQ12F02012 and Y6100421)
文摘A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a hidden channel to transmit secret messages using entanglement swapping between one GHZ state and one Bell state in cavity QED together with the Hadamard operation. The quantum steganography protocol is insensitive to cavity decay and the thermal field. The capacity, imperceptibility and security against eavesdropping are analyzed in detail in the protocol. It turns out that the protocol not only has good imperceptibility but also possesses good security against eavesdropping. In addition, its capacity for a hidden channel achieves five bits, larger than most of the previous quantum steganography protocols.
基金Supported by the National Natural Science Foundation of China(50803016)the Fundamental Research Funds for the Central Universities
文摘For the traditional steganographic method of Jsteg, the emmbedment of secret message is completed by dividing cover-image into nonoverlapping blocks of 8×8 pixels, discrete cosine transform (DCT) transforming, and using the standard 8×8 quantization table to quantize. In this paper, a novel steganographic method based on the JPEG quantization table modification is presented. Instead of dividing cover-image into 8×8 blocks, nonoverlapping blocks of 16×16 pixels is used. Both theoretical anlysis and experiment results show that the new methods has larger steganography capacity and better stego-image quality, compared with the method of Jsteg and Chang's