Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Base...Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Based on the relationships between pixels and their neighbors, we propose a reversible data embedding scheme to embed hidden messages into an original image. In our proposed scheme, a two-layer data embedding approach is used for our proposed data embedding phase. Layer-1 embedding is used to hide secret data. Layer-2 embedding, which is an embedding variant of the proposed layer-1 embedding, is used to hide side information, such as the parameters required to restore the marked image. In our layer-1 embedding, the value of an embedded pixel is determined according to a predetermined threshold and the relationship between the pixel and its neighbors. In our layer-2 embedding, the similar data embedding concept is expanded to the block-based. Experimental results provide supportive data to show that the proposed scheme can provide greater hiding capacity while preserving the image quality of a marked image in comparison with previous work.展开更多
The embedded data acquistition technology in vehicle electronic system was discussed. This technology adopts the parallel working mode, gets vehicle electronic system data by communication. This technology can provide...The embedded data acquistition technology in vehicle electronic system was discussed. This technology adopts the parallel working mode, gets vehicle electronic system data by communication. This technology can provide us a lot of information on the electronic control unit, is very useful for the development of the vehicle electronic system, and can be used in diagnosis. The key points to this technology are the timer interrupt, A/D interrupt, communication interrupt and real time operation. This technology has been validated by the application in the electronic control mechanism transmission shifting system of the tank.展开更多
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w...Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods.展开更多
Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In...Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images.展开更多
An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the rem...An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the remainder of two pixels for data embedding and extraction. In the proposed method, a new remainder function in a more general form is defined by selecting proper parameters, in which an indeterminate equation is constructed and an optimal solution is applied to revise the pixels. This strategy leads to a significant image distortion reduction compared with the original method. The experiment reveals that, by preserving the original embedding capacity, the method provides better embedding efficiency than both MF-PVD and PVD methods.展开更多
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some trad...An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments.展开更多
An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm t...An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm to encrypt and decrypt color images. The RGB channel in a color image is first integrated into a large grayscale image. Then the integrated image is encrypted by two random phase masks. The secret data is then embedded into the encrypted image with a specific hiding sequence generated by the zero-LSB (least significant bits) sorting technique which is a content-dependent and low distortion data embedding method. Experimental results show that the proposed, method has a good performance in both hiding capacity and decrypted image quality.展开更多
It is important to reduce data redundancy of stereo video in practical applications. In this paper,first,a data embedding method for stereo video(DEMSV) is investigated by embedding the encoding data into the refere...It is important to reduce data redundancy of stereo video in practical applications. In this paper,first,a data embedding method for stereo video(DEMSV) is investigated by embedding the encoding data into the reference frame to encode stereo video. It can use only one channel to transfer all the video data and the receiver can choose a monocular video decoder or stereo video decoder adaptively. Then,introducing the joint prediction scheme in the coding process of DEMSV,we propose a novel data embedding method for H.264 stereo video codec with joint prediction scheme(DEMSV-JPS) to achieve high coding efficiency. Experimental results show that the proposed method can obtain high peak signal-to-noise ratio(PSNR) and compression ratio(at least 33 dB for the test sequence) . Comparing the testing methods using JPS and without using JPS,we prove that JPS can further improve the objective and visual quality. DEMSV-JPS shows such advantages and will be suitable to applications in real-time environments of stereo-video transmission.展开更多
After the outbreak of COVID-19,the interaction of infectious disease systems and social systems has challenged traditional infectious disease modeling methods.Starting from the research purpose and data,researchers im...After the outbreak of COVID-19,the interaction of infectious disease systems and social systems has challenged traditional infectious disease modeling methods.Starting from the research purpose and data,researchers im-proved the structure and data of the compartment model or used agents and artificial intelligence based models to solve epidemiological problems.In terms of modeling methods,the researchers use compartment subdivi-sion,dynamic parameters,agent-based model methods,and artificial intelligence related methods.In terms of factors studied,the researchers studied 6 categories:human mobility,nonpharmaceutical interventions(NPIs),ages,medical resources,human response,and vaccine.The researchers completed the study of factors through modeling methods to quantitatively analyze the impact of social systems and put forward their suggestions for the future transmission status of infectious diseases and prevention and control strategies.This review started with a research structure of research purpose,factor,data,model,and conclusion.Focusing on the post-COVID-19 infectious disease prediction simulation research,this study summarized various improvement methods and analyzes matching improvements for various specific research purposes.展开更多
In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leaka...In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leakage risk. This paper proposes a private user data protection mechanism in Trust Zone to avoid such risks. We add corresponding modules to both the secure world and the normal world and authenticate the identity of CA to prevent illegal access to private user data. Then we analyze the system security, and perform validity and performance tests.The results show that this method can perform effective identity recognition and control of CA to protect the security of private user data. After adding authentication modules, the data operation time of system increases by about0.16 s, an acceptable price to pay for the improved security.展开更多
Embedded data are used to retrieve phases quicker with high accuracy in phase-modulated holographic data storage(HDS).We propose a method to design an embedded data distribution using iterations to enhance the intensi...Embedded data are used to retrieve phases quicker with high accuracy in phase-modulated holographic data storage(HDS).We propose a method to design an embedded data distribution using iterations to enhance the intensity of the high-frequency signal in the Fourier spectrum.The proposed method increases the antinoise performance and signal-to-noise ratio(SNR)of the Fourier spectrum distribution,realizing a more efficient phase retrieval.Experiments indicate that the bit error rate(BER)of this method can be reduced by a factor of one after 10 iterations.展开更多
A partition checkpoint strategy based on data segment priority is presented to meet the timing constraints of the data and the transaction in embedded real-time main memory database systems(ERTMMDBS) as well as to r...A partition checkpoint strategy based on data segment priority is presented to meet the timing constraints of the data and the transaction in embedded real-time main memory database systems(ERTMMDBS) as well as to reduce the number of the transactions missing their deadlines and the recovery time.The partition checkpoint strategy takes into account the characteristics of the data and the transactions associated with it;moreover,it partitions the database according to the data segment priority and sets the corresponding checkpoint frequency to each partition for independent checkpoint operation.The simulation results show that the partition checkpoint strategy decreases the ratio of trans-actions missing their deadlines.展开更多
The NOT gate that flips a classical bit is ubiquitous in classical information processing.However its quantum analogue,the universal NOT(UNOT) gate that flips a quantum spin in any alignment into its antipodal counter...The NOT gate that flips a classical bit is ubiquitous in classical information processing.However its quantum analogue,the universal NOT(UNOT) gate that flips a quantum spin in any alignment into its antipodal counterpart is strictly forbidden.Here we explore the connection between this discrepancy and how UNOT gates affect classical and quantum correlations.We show that while a UNOT gate always preserves classical correlations between two spins,it can non-locally increase or decrease their shared discord in ways that allow violation of the data processing inequality.We experimentally illustrate this using a multi-level trapped ^(171)Yb^+ ion that allows simulation of anti-unitary operations.展开更多
基金supported by the National Science Council Foundation under Grant No.NSC 98-2410-H-126-007-MY3
文摘Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Based on the relationships between pixels and their neighbors, we propose a reversible data embedding scheme to embed hidden messages into an original image. In our proposed scheme, a two-layer data embedding approach is used for our proposed data embedding phase. Layer-1 embedding is used to hide secret data. Layer-2 embedding, which is an embedding variant of the proposed layer-1 embedding, is used to hide side information, such as the parameters required to restore the marked image. In our layer-1 embedding, the value of an embedded pixel is determined according to a predetermined threshold and the relationship between the pixel and its neighbors. In our layer-2 embedding, the similar data embedding concept is expanded to the block-based. Experimental results provide supportive data to show that the proposed scheme can provide greater hiding capacity while preserving the image quality of a marked image in comparison with previous work.
文摘The embedded data acquistition technology in vehicle electronic system was discussed. This technology adopts the parallel working mode, gets vehicle electronic system data by communication. This technology can provide us a lot of information on the electronic control unit, is very useful for the development of the vehicle electronic system, and can be used in diagnosis. The key points to this technology are the timer interrupt, A/D interrupt, communication interrupt and real time operation. This technology has been validated by the application in the electronic control mechanism transmission shifting system of the tank.
基金Dr.Arshiya Sajid Ansari would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project No.R-2023-910.
文摘Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods.
文摘Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images.
基金supported by the National Natural Science Foundation of China (61272057)Fundamental Research Funds for the Central Universities (2012RC0612)+2 种基金Specialized Research Fund for the Doctoral Program of Higher Education (20130161120004)Hunan Provincial Natural Science Foundation of China (14JJ7024)Project funded by China Postdoctoral Science Foundation (2014M560123)
文摘An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the remainder of two pixels for data embedding and extraction. In the proposed method, a new remainder function in a more general form is defined by selecting proper parameters, in which an indeterminate equation is constructed and an optimal solution is applied to revise the pixels. This strategy leads to a significant image distortion reduction compared with the original method. The experiment reveals that, by preserving the original embedding capacity, the method provides better embedding efficiency than both MF-PVD and PVD methods.
基金supported by the Applied Basic Research Programs of Sichuan Province under Grant No. 2010JY0001the Fundamental Research Funds for the Central Universities under Grant No. ZYGX2010J068
文摘An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments.
基金supported by the National Science Council,Taiwan under Grant No.NSC 97-2221-E-468-006
文摘An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm to encrypt and decrypt color images. The RGB channel in a color image is first integrated into a large grayscale image. Then the integrated image is encrypted by two random phase masks. The secret data is then embedded into the encrypted image with a specific hiding sequence generated by the zero-LSB (least significant bits) sorting technique which is a content-dependent and low distortion data embedding method. Experimental results show that the proposed, method has a good performance in both hiding capacity and decrypted image quality.
基金Supported by the National Natural Science foundation of China (60832003)
文摘It is important to reduce data redundancy of stereo video in practical applications. In this paper,first,a data embedding method for stereo video(DEMSV) is investigated by embedding the encoding data into the reference frame to encode stereo video. It can use only one channel to transfer all the video data and the receiver can choose a monocular video decoder or stereo video decoder adaptively. Then,introducing the joint prediction scheme in the coding process of DEMSV,we propose a novel data embedding method for H.264 stereo video codec with joint prediction scheme(DEMSV-JPS) to achieve high coding efficiency. Experimental results show that the proposed method can obtain high peak signal-to-noise ratio(PSNR) and compression ratio(at least 33 dB for the test sequence) . Comparing the testing methods using JPS and without using JPS,we prove that JPS can further improve the objective and visual quality. DEMSV-JPS shows such advantages and will be suitable to applications in real-time environments of stereo-video transmission.
基金We received project support and design guidance from National Key R&D Program of China(Grant No.2021ZD0111201)The Na-tional Natural Science Foundation of China(Grant Nos.82161148011,72171013)+2 种基金Conselho Nacional de Desenvolvimento Científico e Tec-nolgico(CNPq-Refs.441057/2020-9,309569/2019-2),CJS-CNPqFundação deAmparo a Pesquisa do Estado do Rio de Janeiro(FAPERJ)The Russian Foundation for basic Research,Project number 21-51-80000.
文摘After the outbreak of COVID-19,the interaction of infectious disease systems and social systems has challenged traditional infectious disease modeling methods.Starting from the research purpose and data,researchers im-proved the structure and data of the compartment model or used agents and artificial intelligence based models to solve epidemiological problems.In terms of modeling methods,the researchers use compartment subdivi-sion,dynamic parameters,agent-based model methods,and artificial intelligence related methods.In terms of factors studied,the researchers studied 6 categories:human mobility,nonpharmaceutical interventions(NPIs),ages,medical resources,human response,and vaccine.The researchers completed the study of factors through modeling methods to quantitatively analyze the impact of social systems and put forward their suggestions for the future transmission status of infectious diseases and prevention and control strategies.This review started with a research structure of research purpose,factor,data,model,and conclusion.Focusing on the post-COVID-19 infectious disease prediction simulation research,this study summarized various improvement methods and analyzes matching improvements for various specific research purposes.
基金supported by the National HighTech Research and Development (863) Program (No. 2015AA016002)the National Key Basic Research Program of China (No. 2014CB340600)+1 种基金the National Natural Science Foundation of China (Nos. 61303024 and 61272452)the Natural Science Foundation of Jiangsu Province (Nos. BK20130372)
文摘In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leakage risk. This paper proposes a private user data protection mechanism in Trust Zone to avoid such risks. We add corresponding modules to both the secure world and the normal world and authenticate the identity of CA to prevent illegal access to private user data. Then we analyze the system security, and perform validity and performance tests.The results show that this method can perform effective identity recognition and control of CA to protect the security of private user data. After adding authentication modules, the data operation time of system increases by about0.16 s, an acceptable price to pay for the improved security.
基金the Open Project Program of Wuhan National Laboratory for Optoelectronics(No.2019WNLOKF007)the National Key R&D Program of China(No.2018YFA0701800).
文摘Embedded data are used to retrieve phases quicker with high accuracy in phase-modulated holographic data storage(HDS).We propose a method to design an embedded data distribution using iterations to enhance the intensity of the high-frequency signal in the Fourier spectrum.The proposed method increases the antinoise performance and signal-to-noise ratio(SNR)of the Fourier spectrum distribution,realizing a more efficient phase retrieval.Experiments indicate that the bit error rate(BER)of this method can be reduced by a factor of one after 10 iterations.
基金Supported by the National Natural Science Foundation of China (60673128)
文摘A partition checkpoint strategy based on data segment priority is presented to meet the timing constraints of the data and the transaction in embedded real-time main memory database systems(ERTMMDBS) as well as to reduce the number of the transactions missing their deadlines and the recovery time.The partition checkpoint strategy takes into account the characteristics of the data and the transactions associated with it;moreover,it partitions the database according to the data segment priority and sets the corresponding checkpoint frequency to each partition for independent checkpoint operation.The simulation results show that the partition checkpoint strategy decreases the ratio of trans-actions missing their deadlines.
基金supported by the National Key Research and Development Program of China(2016YFA0301901)the National Natural Science Foundation of China(11374178 and 11574002)+3 种基金the National Research Foundation of Singapore(NRF Award No.NRF-NRFF2016-02 and project NRF2017-NRFANR004 Van Qu Te)the Competitive Research Programme(CRP Award No.NRF-CRP14-2014-02)the Ministry of Education in Singapore Tier 1 RG190/17the Oxford Martin School
文摘The NOT gate that flips a classical bit is ubiquitous in classical information processing.However its quantum analogue,the universal NOT(UNOT) gate that flips a quantum spin in any alignment into its antipodal counterpart is strictly forbidden.Here we explore the connection between this discrepancy and how UNOT gates affect classical and quantum correlations.We show that while a UNOT gate always preserves classical correlations between two spins,it can non-locally increase or decrease their shared discord in ways that allow violation of the data processing inequality.We experimentally illustrate this using a multi-level trapped ^(171)Yb^+ ion that allows simulation of anti-unitary operations.