Zobrazeno 1 - 10
of 115
pro vyhledávání: '"Minqing Zhang"'
Publikováno v:
IET Image Processing, Vol 18, Iss 5, Pp 1132-1144 (2024)
Abstract Video steganography has the potential to be used to convey illegal information, and video steganalysis is a vital tool to detect the presence of this illicit act. Currently, all the motion vector (MV)‐based video steganalysis algorithms ex
Externí odkaz:
https://doaj.org/article/fd21757f3cc94701a9e56214dcc07b90
Publikováno v:
Mathematics, Vol 12, Iss 14, p 2262 (2024)
In the current distributed environment, reversible data hiding in encrypted domain (RDH-ED) cannot grant corresponding privileges according to users’ identity classes. To address this issue, this paper proposes a hierarchical authorization structur
Externí odkaz:
https://doaj.org/article/5e258a8ed1da48b49229aced60c796fc
Publikováno v:
Applied Sciences, Vol 14, Iss 14, p 6267 (2024)
Reversible data hiding in encrypted images (RDH-EI) schemes based on secret sharing have emerged as a significant area of research in privacy protection. However, existing algorithms have limitations, such as low embedding capacity and insufficient p
Externí odkaz:
https://doaj.org/article/a951873236b74c89b68e8d2668c5d2be
Publikováno v:
Applied Sciences, Vol 14, Iss 14, p 6376 (2024)
To address the vulnerability of the widely used block permutation and co-XOR (BPCX) encryption algorithm in reversible data-hiding in the encrypted domain (RDH-ED), which is susceptible to known-plaintext attacks (KPAs), and to enhance embedding capa
Externí odkaz:
https://doaj.org/article/016fc32df0e74fe8a3fb45f8724662b2
Publikováno v:
Applied Sciences, Vol 14, Iss 13, p 5574 (2024)
To solve the limitations of reversible data hiding in encrypted domains (RDH-ED) that cannot be applied to a distributed variable security environment, a novel RDH-ED scheme based on variable threshold image secret sharing (VTSIS) is proposed. Initia
Externí odkaz:
https://doaj.org/article/a7452a9dc2264cf88611d85f7e29530a
Publikováno v:
IEEE Access, Vol 8, Pp 60575-60597 (2020)
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing. Image
Externí odkaz:
https://doaj.org/article/de0c803a3a9945d2bd58b17265a2a7b4
Publikováno v:
IEEE Access, Vol 8, Pp 81412-81424 (2020)
NTRU (Number Theory Research Unit) has the characteristics of resistance to quantum computing attacks, fast encryption and decryption, and high security. It is very suitable for wireless confidential data networks and authentication systems. Combined
Externí odkaz:
https://doaj.org/article/c9b50b941c9b48028b0628b8d71521f5
Publikováno v:
IEEE Access, Vol 7, Pp 118586-118597 (2019)
In this paper, a novel data-driven information hiding scheme called “generative steganography by sampling” (GSS) is proposed. Unlike in traditional modification-based steganography, in our method the stego image is directly sampled by a powerful
Externí odkaz:
https://doaj.org/article/6dda4f672e38497f8ee8bf68d998ac6c
Publikováno v:
Applied Sciences, Vol 9, Iss 14, p 2910 (2019)
To combine homomorphic public key encryption with reversible data hiding, a reversible data hiding scheme in homomorphic encrypted image based on EC-EG is proposed. Firstly, the cover image is segmented. The square grid pixel group randomly selected
Externí odkaz:
https://doaj.org/article/e4ba19a6fd98437f93ea1fcb8847fbd9
Publikováno v:
Computers, Materials & Continua; 2024, Vol. 79 Issue 2, p1925-1938, 14p