期刊文献+
共找到6,219篇文章
< 1 2 250 >
每页显示 20 50 100
Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence
1
作者 Xiong Zhang Minqing Zhang +3 位作者 Xu AnWang Wen Jiang Chao Jiang Pan Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期1925-1938,共14页
This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designe... This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information. 展开更多
关键词 information hiding neural style transfer ROBUSTNESS
下载PDF
Cross-Modal Consistency with Aesthetic Similarity for Multimodal False Information Detection
2
作者 Weijian Fan Ziwei Shi 《Computers, Materials & Continua》 SCIE EI 2024年第5期2723-2741,共19页
With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to mult... With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to multimodalinformation exchange and fusion, with many methods attempting to integrate unimodal features to generatemultimodal news representations. However, they still need to fully explore the hierarchical and complex semanticcorrelations between different modal contents, severely limiting their performance detecting multimodal falseinformation. This work proposes a two-stage detection framework for multimodal false information detection,called ASMFD, which is based on image aesthetic similarity to segment and explores the consistency andinconsistency features of images and texts. Specifically, we first use the Contrastive Language-Image Pre-training(CLIP) model to learn the relationship between text and images through label awareness and train an imageaesthetic attribute scorer using an aesthetic attribute dataset. Then, we calculate the aesthetic similarity betweenthe image and related images and use this similarity as a threshold to divide the multimodal correlation matrixinto consistency and inconsistencymatrices. Finally, the fusionmodule is designed to identify essential features fordetectingmultimodal false information. In extensive experiments on four datasets, the performance of the ASMFDis superior to state-of-the-art baseline methods. 展开更多
关键词 Social media false information detection image aesthetic assessment cross-modal consistency
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
3
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Method of visional detecting MAG weld pool information 被引量:2
4
作者 王克鸿 汤新臣 +2 位作者 虞剑 游秋榕 沈莹吉 《中国有色金属学会会刊:英文版》 CSCD 2005年第S3期369-374,共6页
A theoretical analysis of the visional detecting weld pool information and image-getting mechanisms were presented. Four kinds of composite narrow-band filters based on three kinds of mechanism were adopted in conside... A theoretical analysis of the visional detecting weld pool information and image-getting mechanisms were presented. Four kinds of composite narrow-band filters based on three kinds of mechanism were adopted in consideration of short-circuiting transfer and spray transfer. After studying the ways for sensing the visional signals of the weld pool, the best filter window was obtained. From the window images with distinct weld pool area were acquired. In addition, image-getting mechanisms for passive light source to detect visional information of weld pool were explored, and then the characters of weld pool of MAG were analyzed. 展开更多
关键词 MAG welding WELD POOL information VISION detection VISION ACQUISITION
下载PDF
Structural damage detection method based on information fusion technique 被引量:1
5
作者 刘涛 李爱群 +1 位作者 丁幼亮 费庆国 《Journal of Southeast University(English Edition)》 EI CAS 2008年第2期201-205,共5页
Multi-source information fusion (MSIF) is imported into structural damage diagnosis methods to improve the validity of damage detection. After the introduction of the basic theory, the function model, classification... Multi-source information fusion (MSIF) is imported into structural damage diagnosis methods to improve the validity of damage detection. After the introduction of the basic theory, the function model, classifications and mathematical methods of MSIF, a structural damage detection method based on MSIF is presented, which is to fuse two or more damage character vectors from different structural damage diagnosis methods on the character-level. In an experiment of concrete plates, modal information is measured and analyzed. The structural damage detection method based on MSIF is taken to localize cracks of concrete plates and it is proved to be effective. Results of damage detection by the method based on MSIF are compared with those from the modal strain energy method and the flexibility method. Damage, which can hardly be detected by using the single damage identification method, can be diagnosed by the damage detection method based on the character-level MSIF technique. Meanwhile multi-location damage can be identified by the method based on MSIF. This method is sensitive to structural damage and different mathematical methods for MSIF have different preconditions and applicabilities for diversified structures. How to choose mathematical methods for MSIF should be discussed in detail in health monitoring systems of actual structures. 展开更多
关键词 multi-source information fusion structural damage detection Bayes method D-S evidence theory
下载PDF
Vehicle detection based on information fusion of vehicle symmetrical contour and license plate position 被引量:1
6
作者 连捷 赵池航 +2 位作者 张百灵 何杰 党倩 《Journal of Southeast University(English Edition)》 EI CAS 2012年第2期240-244,共5页
An efficient vehicle detection approach is proposed for traffic surveillance images, which is based on information fusion of vehicle symmetrical contour and license plate position. The vertical symmetry axis of the ve... An efficient vehicle detection approach is proposed for traffic surveillance images, which is based on information fusion of vehicle symmetrical contour and license plate position. The vertical symmetry axis of the vehicle contour in an image is. first detected, and then the vertical and the horizontal symmetry axes of the license plate are detected using the symmetry axis of the vehicle contour as a reference. The vehicle location in an image is determined using license plate symmetry axes and the vertical and the horizontal projection maps of the vehicle edge image. A dataset consisting of 450 images (15 classes of vehicles) is used to test the proposed method. The experimental results indicate that compared with the vehicle contour-based, the license plate location-based, the vehicle texture-based and the Gabor feature-based methods, the proposed method is the best with a detection accuracy of 90.7% and an elapsed time of 125 ms. 展开更多
关键词 vehicle detection symmetrical contour license plate position information fusion
下载PDF
Flight parameter calculation method of multi-projectiles using temporal and spatial information constraint 被引量:1
7
作者 Han-shan Li Xiao-qian Zhang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第1期63-75,共13页
The dynamic parameters of multiple projectiles that are fired using multi-barrel weapons in highfrequency continuous firing modes are important indicators to measure the performance of these weapons.The characteristic... The dynamic parameters of multiple projectiles that are fired using multi-barrel weapons in highfrequency continuous firing modes are important indicators to measure the performance of these weapons.The characteristics of multiple projectiles are high randomness and large numbers launched in a short period of time,making it very difficult to obtain the real dispersion parameters of the projectiles due to the occlusion or coincidence of multiple projectiles.Using six intersecting-screen testing system,in this paper,we propose an association recognition and matching algorithm of multiple projectiles using a temporal and spatial information constraint mechanism.We extract the output signal from each detection screen and then use the wavelet transform to process the output signal.We present a method to identify and extract the time values on which the projectiles pass through the detection screens using the wavelet transform modulus maximum theory.We then use the correlation of the output signals of three parallel detection screens to establish a correlation coefficient recognition constraint function for the multiple projectiles.Based on the premise of linear projectile motion,we establish a temporal and spatial constraint matching model using the projectile’s position coordinates in each detection screen and the projectile’s time constraints within the multiple intersecting-screen geometry.We then determine the time values of the multiple projectiles in each detection screen using an iterative search cycle registration,and finally obtain the flight parameters for the multiple projectiles in the presence of uncertainty.The proposed method and algorithm were verified experimentally and can solve the problem of uncertainty in projectiles flight parameter under different multiple projectile firing states. 展开更多
关键词 Six detection screen array Multi-projectile Recognition and matching Temporal and spatial information constraint Wavelet transform
下载PDF
Novel detection method for infrared small targets using weighted information entropy 被引量:13
8
作者 Xiujie Qu He Chen Guihua Peng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第6期838-842,共5页
This paper presents a method for detecting the small infrared target under complex background. An algorithm, named local mutation weighted information entropy (LMWIE), is proposed to suppress background. Then, the g... This paper presents a method for detecting the small infrared target under complex background. An algorithm, named local mutation weighted information entropy (LMWIE), is proposed to suppress background. Then, the grey value of targets is enhanced by calculating the local energy. Image segmentation based on the adaptive threshold is used to solve the problems that the grey value of noise is enhanced with the grey value improvement of targets. Experimental results show that compared with the adaptive Butterworth high-pass filter method, the proposed algorithm is more effective and faster for the infrared small target detection. 展开更多
关键词 infrared small target detection local mutation weight-ed information entropy (LMWIE) grey value of target adaptivethreshold.
下载PDF
Multi-sources information fusion algorithm in airborne detection systems 被引量:18
9
作者 Yang Yan Jing Zhanrong Gao Tan Wang Huilong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期171-176,共6页
To aim at the multimode character of the data from the airplane detecting system, the paper combines Dempster- Shafer evidence theory and subjective Bayesian algorithm and makes to propose a mixed structure multimode ... To aim at the multimode character of the data from the airplane detecting system, the paper combines Dempster- Shafer evidence theory and subjective Bayesian algorithm and makes to propose a mixed structure multimode data fusion algorithm. The algorithm adopts a prorated algorithm relate to the incertitude evaluation to convert the probability evaluation into the precognition probability in an identity frame, and ensures the adaptability of different data from different source to the mixed system. To guarantee real time fusion, a combination of time domain fusion and space domain fusion is established, this not only assure the fusion of data chain in different time of the same sensor, but also the data fusion from different sensors distributed in different platforms and the data fusion among different modes. The feasibility and practicability are approved through computer simulation. 展开更多
关键词 information fusion Dempster-Shafer evidence theory Subjective Bayesian algorithm Airplane detecting system
下载PDF
The prediction formula and a risk-based sensor scheduling method in target detection with guiding information 被引量:5
10
作者 Ce Pang Gan-lin Shan 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2020年第2期447-452,共6页
Sensor scheduling is used to improve the sensing performance in the estimation of targets’states.However,few papers are on the sensor scheduling for target detection with guiding information.This letter can remedy th... Sensor scheduling is used to improve the sensing performance in the estimation of targets’states.However,few papers are on the sensor scheduling for target detection with guiding information.This letter can remedy this deficiency.A risk-based target detection method with guiding information is provided firstly,based on which,the sensor scheduling approach is aiming at reducing the risk and uncertainty in target detection,namely risk-based sensor scheduling method.What should be stressed is that the Prediction Formula in sensor scheduling is proposed.Lastly,some examples are conducted to stress the effectiveness of this proposed method. 展开更多
关键词 SENSOR scheduling Target detection OPERATIONAL RISK information GUIDING
下载PDF
Coverless Information Hiding Based on the Molecular Structure Images of Material 被引量:10
11
作者 Yi Cao Zhili Zhou +1 位作者 Xingming Sun Chongzhi Gao 《Computers, Materials & Continua》 SCIE EI 2018年第2期197-207,共11页
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steg... The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steganalysis algorithm.To address this problem,the concept of coverless information hiding was proposed.Coverless information hiding can effectively resist steganalysis algorithm,since it uses unmodified natural stego-carriers to represent and convey confidential information.However,the state-of-the-arts method has a low hidden capacity,which makes it less appealing.Because the pixel values of different regions of the molecular structure images of material(MSIM)are usually different,this paper proposes a novel coverless information hiding method based on MSIM,which utilizes the average value of sub-image’s pixels to represent the secret information,according to the mapping between pixel value intervals and secret information.In addition,we employ a pseudo-random label sequence that is used to determine the position of sub-images to improve the security of the method.And the histogram of the Bag of words model(BOW)is used to determine the number of subimages in the image that convey secret information.Moreover,to improve the retrieval efficiency,we built a multi-level inverted index structure.Furthermore,the proposed method can also be used for other natural images.Compared with the state-of-the-arts,experimental results and analysis manifest that our method has better performance in anti-steganalysis,security and capacity. 展开更多
关键词 Coverless information hiding molecular structure images of material pixel value inverted index image retrieval bag of words model
下载PDF
Information hiding with adaptive steganography based on novel fuzzy edge identification 被引量:2
12
作者 Sanjeev Kumar Amarpal Singh Manoj Kumar 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2019年第2期162-169,共8页
The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information ... The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain. 展开更多
关键词 information security ADAPTIVE STEGANOGRAPHY FUZZY EDGE detection PATTERN RECOGNITION
下载PDF
An Information Hiding Algorithm Based on Bitmap Resource of Portable Executable File 被引量:2
13
作者 Jie Xu Li-Jun Feng Ya-Lan Ye Yue Wu 《Journal of Electronic Science and Technology》 CAS 2012年第2期181-184,共4页
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some trad... An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments. 展开更多
关键词 Bitmap resources data embedding information hiding portable executable file.
下载PDF
Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images 被引量:4
14
作者 Yanping Zhang Juan Jiang +2 位作者 Yongliang Zha Heng Zhang Shu Zhao 《International Journal of Intelligence Science》 2013年第2期77-85,共9页
Generally speaking, being an efficient information hiding scheme, what we want to achieve is high embedding capacity of the cover image and high visual quality of the stego image, high visual quality is also called em... Generally speaking, being an efficient information hiding scheme, what we want to achieve is high embedding capacity of the cover image and high visual quality of the stego image, high visual quality is also called embedding efficiency. This paper mainly studies on the information hiding technology based on gray-scale digital images and especially considers the improvement of embedding capacity and embedding efficiency. For the purpose of that, two algorithms for information hiding were proposed, one is called high capacity of information hiding algorithm (HCIH for short), which achieves high embedding rate, and the other is called high quality of information hiding algorithm (HQIH for short), which realizes high embedding efficiency. The simulation experiments show that our proposed algorithms achieve better performance. 展开更多
关键词 information hiding EMBEDDING Capacity EMBEDDING EFFICIENCY Security Peak-Signal-to-Noise-Rate(PSNR)
下载PDF
SSD Real-Time Illegal Parking Detection Based on Contextual Information Transmission 被引量:5
15
作者 Huanrong Tang Aoming Peng +2 位作者 Dongming Zhang Tianming Liu Jianquan Ouyang 《Computers, Materials & Continua》 SCIE EI 2020年第1期293-307,共15页
With the improvement of the national economic level,the number of vehicles is still increasing year by year.According to the statistics of National Bureau of Statics,the number is approximately up to 327 million in Ch... With the improvement of the national economic level,the number of vehicles is still increasing year by year.According to the statistics of National Bureau of Statics,the number is approximately up to 327 million in China by the end of 2018,which makes urban traffic pressure continues to rise so that the negative impact of urban traffic order is growing.Illegal parking-the common problem in the field of transportation security is urgent to be solved and traditional methods to address it are mainly based on ground loop and manual supervision,which may miss detection and cost much manpower.Due to the rapidly developing deep learning sweeping the world in recent years,object detection methods relying on background segmentation cannot meet the requirements of complex and various scenes on speed and precision.Thus,an improved Single Shot MultiBox Detector(SSD)based on deep learning is proposed in our study,we introduce attention mechanism by spatial transformer module which gives neural networks the ability to actively spatially transform feature maps and add contextual information transmission in specified layer.Finally,we found out the best connection layer in the detection model by repeated experiments especially for small objects and increased the precision by 1.5%than the baseline SSD without extra training cost.Meanwhile,we designed an illegal parking vehicle detection method by the improved SSD,reaching a high precision up to 97.3%and achieving a speed of 40FPS,superior to most of vehicle detection methods,will make contributions to relieving the negative impact of illegal parking. 展开更多
关键词 Contextual information transmission illegal parking detection spatial attention mechanism deep learning
下载PDF
An Analysis Model of Learners’ Online Learning Status Based on Deep Neural Network and Multi-Dimensional Information Fusion
16
作者 Mingyong Li Lirong Tang +3 位作者 Longfei Ma Honggang Zhao Jinyu Hu Yan Wei 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2349-2371,共23页
The learning status of learners directly affects the quality of learning.Compared with offline teachers,it is difficult for online teachers to capture the learning status of students in the whole class,and it is even ... The learning status of learners directly affects the quality of learning.Compared with offline teachers,it is difficult for online teachers to capture the learning status of students in the whole class,and it is even more difficult to continue to pay attention to studentswhile teaching.Therefore,this paper proposes an online learning state analysis model based on a convolutional neural network and multi-dimensional information fusion.Specifically,a facial expression recognition model and an eye state recognition model are constructed to detect students’emotions and fatigue,respectively.By integrating the detected data with the homework test score data after online learning,an analysis model of students’online learning status is constructed.According to the PAD model,the learning state is expressed as three dimensions of students’understanding,engagement and interest,and then analyzed from multiple perspectives.Finally,the proposed model is applied to actual teaching,and procedural analysis of 5 different types of online classroom learners is carried out,and the validity of the model is verified by comparing with the results of the manual analysis. 展开更多
关键词 Deep learning fatigue detection facial expression recognition sentiment analysis information fusion
下载PDF
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states 被引量:1
17
作者 徐淑奖 陈秀波 +2 位作者 王连海 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期231-238,共8页
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an... Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. 展开更多
关键词 quantum information hiding quantum covert'channel entanglement swapping high-level Bell states
下载PDF
An Efficient Information Hiding Scheme Based on Closest Paired Tree Structure Vector Quantization 被引量:1
18
作者 Zhi-Hui Wang Chin-Chen Chang Ting-Yu Lin 《Journal of Electronic Science and Technology》 CAS 2013年第1期15-19,共5页
Information hiding schemes based on vector quantization (VQ) usually require lengthy VQ encoding and decoding processes. In this paper, we propose an efficient information hiding method based on closest paired tree ... Information hiding schemes based on vector quantization (VQ) usually require lengthy VQ encoding and decoding processes. In this paper, we propose an efficient information hiding method based on closest paired tree structure vector quantization (CPTSVQ). The simulation result shows that the execution time of the proposed scheme is much shorter than that attained by previous approaches. 展开更多
关键词 Digital image information hiding tree structure vector quantization vector quantization.
下载PDF
A Heuristic Clustering Algorithm forIntrusion Detection Based on Information Entropy 被引量:1
19
作者 XIONG Jiajun LI Qinghua TU Jing 《Wuhan University Journal of Natural Sciences》 CAS 2006年第2期355-359,共5页
This paper studied on the clustering problem for intrusion detection with the theory of information entropy, it was put forward that the clustering problem for exact intrusion detection based on information entropy is... This paper studied on the clustering problem for intrusion detection with the theory of information entropy, it was put forward that the clustering problem for exact intrusion detection based on information entropy is NP complete, therefore, the heuristic algorithm to solve the clustering problem for intrusion detection was designed, this algorithm has the characteristic of incremental development, it can deal with the database with large connection records from the internet. 展开更多
关键词 intrusion detection data mining CLUSTERING information entropy
下载PDF
A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography 被引量:4
20
作者 Ruohan Meng Zhili Zhou +2 位作者 Qi Cui Xingming Sun Chengsheng Yuan 《Journal of Information Hiding and Privacy Protection》 2019年第1期43-48,共6页
At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity ... At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity of coverless information hiding.At the same time,the steganography algorithm based on object detection only hides secret information in foreground objects,which contribute to the steganography capacity is reduced.Since object recognition contains multiple objects and location,secret information can be mapped to object categories,the relationship of location and so on.Therefore,this paper proposes a new steganography algorithm based on object detection and relationship mapping,which integrates coverless information hiding and steganography.In this method,the coverless information hiding is realized by mapping the object type,color and secret information in object detection method.At the same time,the object detection method is used to find the safe area to hide secret messages.The proposed algorithm can not only improve the steganographic capacity of the two information hiding methods but also make the coverless information hiding more secure and robust. 展开更多
关键词 STEGANOGRAPHY faster R-CNN coverless information hiding
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部