期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Reversible Data Embedding Scheme Using Relationships between Pixel-Values and Their Neighbors
1
作者 Chia-Chen Lin Chin-Chen Chang Yi-Hui Chen 《Journal of Electronic Science and Technology》 CAS 2012年第3期238-249,共12页
Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Base... Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Based on the relationships between pixels and their neighbors, we propose a reversible data embedding scheme to embed hidden messages into an original image. In our proposed scheme, a two-layer data embedding approach is used for our proposed data embedding phase. Layer-1 embedding is used to hide secret data. Layer-2 embedding, which is an embedding variant of the proposed layer-1 embedding, is used to hide side information, such as the parameters required to restore the marked image. In our layer-1 embedding, the value of an embedded pixel is determined according to a predetermined threshold and the relationship between the pixel and its neighbors. In our layer-2 embedding, the similar data embedding concept is expanded to the block-based. Experimental results provide supportive data to show that the proposed scheme can provide greater hiding capacity while preserving the image quality of a marked image in comparison with previous work. 展开更多
关键词 Cover image marked image reversible data embedding watermarking.
下载PDF
Embedded Data Acquisition in Vehicle Electronic System 被引量:3
2
作者 王建群 陈铁 《Journal of Beijing Institute of Technology》 EI CAS 2000年第4期403-407,共5页
The embedded data acquistition technology in vehicle electronic system was discussed. This technology adopts the parallel working mode, gets vehicle electronic system data by communication. This technology can provide... The embedded data acquistition technology in vehicle electronic system was discussed. This technology adopts the parallel working mode, gets vehicle electronic system data by communication. This technology can provide us a lot of information on the electronic control unit, is very useful for the development of the vehicle electronic system, and can be used in diagnosis. The key points to this technology are the timer interrupt, A/D interrupt, communication interrupt and real time operation. This technology has been validated by the application in the electronic control mechanism transmission shifting system of the tank. 展开更多
关键词 embedded data acquisition INTERRUPT COMMUNICATION VEHICLE
下载PDF
A Review on the Recent Trends of Image Steganography for VANET Applications
3
作者 Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第3期2865-2892,共28页
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w... Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods. 展开更多
关键词 STEGANOGRAPHY image steganography image steganography techniques information exchange data embedding and extracting vehicular ad hoc network(VANET) transportation system
下载PDF
Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map
4
作者 Li-Chin Huang Min-Shiang Hwang Lin-Yu Tseng 《Journal of Electronic Science and Technology》 CAS 2013年第2期230-236,共7页
Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In... Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images. 展开更多
关键词 Cloud computing environments ENCRYPTION Haar digital wavelet transformation Henonmap reversible data embedding.
下载PDF
Data embedding based on pixel value differencing and modulus function using indeterminate equation 被引量:2
5
作者 Wang Zhao Zhang Jie +1 位作者 Liao Xin Wen Qiaoyan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第1期95-100,共6页
An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the rem... An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the remainder of two pixels for data embedding and extraction. In the proposed method, a new remainder function in a more general form is defined by selecting proper parameters, in which an indeterminate equation is constructed and an optimal solution is applied to revise the pixels. This strategy leads to a significant image distortion reduction compared with the original method. The experiment reveals that, by preserving the original embedding capacity, the method provides better embedding efficiency than both MF-PVD and PVD methods. 展开更多
关键词 pixel value differencing modulus function indeterminate equation data embedding
原文传递
An Information Hiding Algorithm Based on Bitmap Resource of Portable Executable File 被引量:2
6
作者 Jie Xu Li-Jun Feng Ya-Lan Ye Yue Wu 《Journal of Electronic Science and Technology》 CAS 2012年第2期181-184,共4页
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some trad... An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments. 展开更多
关键词 Bitmap resources data embedding information hiding portable executable file.
下载PDF
A Steganography-Based Optical Image Encryption System Using RGB Channel Integration 被引量:1
7
作者 Cheng-Hung Chuang 《Journal of Electronic Science and Technology》 CAS 2013年第1期3-8,共6页
An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm t... An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm to encrypt and decrypt color images. The RGB channel in a color image is first integrated into a large grayscale image. Then the integrated image is encrypted by two random phase masks. The secret data is then embedded into the encrypted image with a specific hiding sequence generated by the zero-LSB (least significant bits) sorting technique which is a content-dependent and low distortion data embedding method. Experimental results show that the proposed, method has a good performance in both hiding capacity and decrypted image quality. 展开更多
关键词 data hiding data embedding information security image steganography image cryptosystem optical security.
下载PDF
A Novel Data Embedding Method for H.264 Stereo Video Codec with Joint Prediction Scheme
8
作者 GAO Minfang,JI Xiaoyong,WANG Yuanqing Department of Electronic Science and Engineering,Nanjing University,Nanjing 210093,Jiangsu,China 《Wuhan University Journal of Natural Sciences》 CAS 2010年第1期51-56,共6页
It is important to reduce data redundancy of stereo video in practical applications. In this paper,first,a data embedding method for stereo video(DEMSV) is investigated by embedding the encoding data into the refere... It is important to reduce data redundancy of stereo video in practical applications. In this paper,first,a data embedding method for stereo video(DEMSV) is investigated by embedding the encoding data into the reference frame to encode stereo video. It can use only one channel to transfer all the video data and the receiver can choose a monocular video decoder or stereo video decoder adaptively. Then,introducing the joint prediction scheme in the coding process of DEMSV,we propose a novel data embedding method for H.264 stereo video codec with joint prediction scheme(DEMSV-JPS) to achieve high coding efficiency. Experimental results show that the proposed method can obtain high peak signal-to-noise ratio(PSNR) and compression ratio(at least 33 dB for the test sequence) . Comparing the testing methods using JPS and without using JPS,we prove that JPS can further improve the objective and visual quality. DEMSV-JPS shows such advantages and will be suitable to applications in real-time environments of stereo-video transmission. 展开更多
关键词 data embedding method H.264 stereo image stereo video joint prediction scheme (JPS)
原文传递
Big data technology in infectious diseases modeling,simulation,and prediction after the COVID-19 outbreak
9
作者 Honghao Shi Jingyuan Wang +6 位作者 Jiawei Cheng Xiaopeng Qi Hanran Ji Claudio J Struchiner Daniel AM Villela Eduard V Karamov Ali S Turgiev 《Intelligent Medicine》 CSCD 2023年第2期85-96,共12页
After the outbreak of COVID-19,the interaction of infectious disease systems and social systems has challenged traditional infectious disease modeling methods.Starting from the research purpose and data,researchers im... After the outbreak of COVID-19,the interaction of infectious disease systems and social systems has challenged traditional infectious disease modeling methods.Starting from the research purpose and data,researchers im-proved the structure and data of the compartment model or used agents and artificial intelligence based models to solve epidemiological problems.In terms of modeling methods,the researchers use compartment subdivi-sion,dynamic parameters,agent-based model methods,and artificial intelligence related methods.In terms of factors studied,the researchers studied 6 categories:human mobility,nonpharmaceutical interventions(NPIs),ages,medical resources,human response,and vaccine.The researchers completed the study of factors through modeling methods to quantitatively analyze the impact of social systems and put forward their suggestions for the future transmission status of infectious diseases and prevention and control strategies.This review started with a research structure of research purpose,factor,data,model,and conclusion.Focusing on the post-COVID-19 infectious disease prediction simulation research,this study summarized various improvement methods and analyzes matching improvements for various specific research purposes. 展开更多
关键词 Infectious disease model data embedding Social system DYNAMIC Modeling the social systems
原文传递
A Private User Data Protection Mechanism in TrustZone Architecture Based on Identity Authentication 被引量:3
10
作者 Bo Zhao Yu Xiao +1 位作者 Yuqing Huang Xiaoyu Cui 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期218-225,共8页
In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leaka... In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leakage risk. This paper proposes a private user data protection mechanism in Trust Zone to avoid such risks. We add corresponding modules to both the secure world and the normal world and authenticate the identity of CA to prevent illegal access to private user data. Then we analyze the system security, and perform validity and performance tests.The results show that this method can perform effective identity recognition and control of CA to protect the security of private user data. After adding authentication modules, the data operation time of system increases by about0.16 s, an acceptable price to pay for the improved security. 展开更多
关键词 embedded system TrustZone Trusted Application(TA) identity authentication private data protection
原文传递
Improved phase retrieval in holographic data storage based on a designed iterative embedded data
11
作者 Changyu YU Suping WANG +10 位作者 Ruixian CHEN Jianying HAO Qijing ZHENG Jinyu WANG Xianying QIU Kun WANG Dakui LIN Yi YANG Hui LI Xiao LIN Xiaodi TAN 《Frontiers of Optoelectronics》 EI CSCD 2021年第4期529-539,共11页
Embedded data are used to retrieve phases quicker with high accuracy in phase-modulated holographic data storage(HDS).We propose a method to design an embedded data distribution using iterations to enhance the intensi... Embedded data are used to retrieve phases quicker with high accuracy in phase-modulated holographic data storage(HDS).We propose a method to design an embedded data distribution using iterations to enhance the intensity of the high-frequency signal in the Fourier spectrum.The proposed method increases the antinoise performance and signal-to-noise ratio(SNR)of the Fourier spectrum distribution,realizing a more efficient phase retrieval.Experiments indicate that the bit error rate(BER)of this method can be reduced by a factor of one after 10 iterations. 展开更多
关键词 holographic data storage(HDS) phase retrieval embedded data high frequency
原文传递
A Partition Checkpoint Strategy Based on Data Segment Priority
12
作者 LIANG Ping LIU Yunsheng 《Wuhan University Journal of Natural Sciences》 CAS 2012年第2期109-113,共5页
A partition checkpoint strategy based on data segment priority is presented to meet the timing constraints of the data and the transaction in embedded real-time main memory database systems(ERTMMDBS) as well as to r... A partition checkpoint strategy based on data segment priority is presented to meet the timing constraints of the data and the transaction in embedded real-time main memory database systems(ERTMMDBS) as well as to reduce the number of the transactions missing their deadlines and the recovery time.The partition checkpoint strategy takes into account the characteristics of the data and the transactions associated with it;moreover,it partitions the database according to the data segment priority and sets the corresponding checkpoint frequency to each partition for independent checkpoint operation.The simulation results show that the partition checkpoint strategy decreases the ratio of trans-actions missing their deadlines. 展开更多
关键词 embedded real-time main memory database systems database recovery partition checkpoint data segment priority
原文传递
Operational effects of the UNOT gate on classical and quantum correlations 被引量:1
13
作者 Kuan Zhang Jiajun Ma +4 位作者 Xiang Zhang Jayne Thompson Vlatko Vedral Kihwan Kim Mile Gu 《Science Bulletin》 SCIE EI CSCD 2018年第12期765-770,共6页
The NOT gate that flips a classical bit is ubiquitous in classical information processing.However its quantum analogue,the universal NOT(UNOT) gate that flips a quantum spin in any alignment into its antipodal counter... The NOT gate that flips a classical bit is ubiquitous in classical information processing.However its quantum analogue,the universal NOT(UNOT) gate that flips a quantum spin in any alignment into its antipodal counterpart is strictly forbidden.Here we explore the connection between this discrepancy and how UNOT gates affect classical and quantum correlations.We show that while a UNOT gate always preserves classical correlations between two spins,it can non-locally increase or decrease their shared discord in ways that allow violation of the data processing inequality.We experimentally illustrate this using a multi-level trapped ^(171)Yb^+ ion that allows simulation of anti-unitary operations. 展开更多
关键词 Quantum information Universal NOT gate Quantum correlations Quantum discord data processing inequality embedding quantum simulation Ion trap
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部