Zobrazeno 1 - 10
of 135
pro vyhledávání: '"Zichi WANG"'
Autor:
Xinran Li, Zichi Wang
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-13 (2024)
Abstract Digital image steganography serves as a technology facilitating covert communication through digital images by subtly incorporating secret data into a cover image. This practice poses a potential threat, as criminals exploit steganography to
Externí odkaz:
https://doaj.org/article/980816d2baa6444cbac7ae37d4c578d7
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 8, Pp 101708- (2023)
The advancement of internet has greatly facilitated development of healthcare technology, particularly in the field of remote diagnosis. However, during the transmission of medical images and electronic medical records through internet, there are ris
Externí odkaz:
https://doaj.org/article/722fa95c3dc74a019ff051e0232ace39
Autor:
Zichi WANG, Guorui FENG,Xinpeng ZHANG
Publikováno v:
网络与信息安全学报, Vol 8, Iss 3, Pp 18-28 (2022)
The images with non-fungible token (NFT) are employed as the digital artistic works in metaverse for creation, transaction, sharing, and collection.Being different from natural images, the content of NFT images is defined by user and distributed in t
Externí odkaz:
https://doaj.org/article/d14aa410135b42e683adf38f36bd66c0
Publikováno v:
Symmetry, Vol 15, Iss 6, p 1287 (2023)
Natural language generation (NLG) models combined with increasingly mature and powerful deep learning techniques have been widely used in recent years. Deployed NLG models in practical applications may be stolen or used illegally, and watermarking ha
Externí odkaz:
https://doaj.org/article/6f8192b73c2e4c478235c32a310c428d
Publikováno v:
Symmetry, Vol 15, Iss 5, p 1079 (2023)
Deep neural networks have achieved remarkable success in various fields of artificial intelligence. However, these models, which contain a large number of parameters, are widely distributed and disseminated by researchers, engineers, and even unautho
Externí odkaz:
https://doaj.org/article/941c7aef149743fe8db24d54d40c834e
Publikováno v:
Journal of Hebei University of Science and Technology, Vol 41, Iss 2, Pp 191-200 (2020)
In order to seek the coordination of energy supply system in economy, security, environmental protection and energy conservation, relying on the "Internet plus", a distributed cooling, heating and power system integrated with power generation unit (P
Externí odkaz:
https://doaj.org/article/e188ce9be72747e89289eff419977e87
Publikováno v:
Neurocomputing. 537:49-60
Publikováno v:
Mathematical Biosciences and Engineering, Vol 16, Iss 4, Pp 2322-2333 (2019)
Existing distortion functions in steganography which achieved high undetectability are designed for unprocessed natural image. Nowadays, a large number of images are filtered before transmitting for the sake of beautification. In this situation, exis
Externí odkaz:
https://doaj.org/article/88d436178e8b4156b9056fbd315634f6
Autor:
Zichi Wang, Xinpeng Zhang
Publikováno v:
IEEE Access, Vol 7, Pp 57857-57867 (2019)
Existing cover selection methods for steganography cannot resist pooled steganalysis. This paper proposes a secure cover selection method which is able to resist pooled steganalysis and single object steganalysis meanwhile. To resist pooled steganaly
Externí odkaz:
https://doaj.org/article/f10ad2425cc34bec887c044b8beaf843
Publikováno v:
IEEE Access, Vol 7, Pp 168914-168921 (2019)
This paper proposes an improved steganalytic method when cover selection is used in steganography. We observed that the covers selected by existing cover selection methods normally have different characteristics from normal ones, and propose a stegan
Externí odkaz:
https://doaj.org/article/729c1c24b01a439ea1a3d791422af00b