Open Access
ARTICLE
Junjia Chen1, Wei Lu1,2,*, Yuileong Yeung1, Yingjie Xue1, Xianjin Liu1, Cong Lin1,3, Yue Zhang4
CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 201-211, 2018, DOI:10.3970/cmc.2018.01781
Abstract In recent years, binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information security. In most state-of-the-art binary image steganographic schemes, they always find out the flippable pixels to minimize the embedding distortions. For this reason, the stego images generated by the previous schemes maintain visual quality and it is hard for steganalyzer to capture the embedding trace in spacial domain. However, the distortion maps can be calculated for cover and stego images and the difference between them is significant. In this paper, a novel binary image steganalytic scheme is proposed,… More >
Open Access
ARTICLE
Zeyu Xiong1,*, Qiangqiang Shen1, Yijie Wang1, Chenyang Zhu2
CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 213-227, 2018, DOI:10.3970/cmc.2018.01762
Abstract Document processing in natural language includes retrieval, sentiment analysis, theme extraction, etc. Classical methods for handling these tasks are based on models of probability, semantics and networks for machine learning. The probability model is loss of semantic information in essential, and it influences the processing accuracy. Machine learning approaches include supervised, unsupervised, and semi-supervised approaches, labeled corpora is necessary for semantics model and supervised learning. The method for achieving a reliably labeled corpus is done manually, it is costly and time-consuming because people have to read each document and annotate the label of each document. Recently, the continuous CBOW model… More >
Open Access
ARTICLE
Qi Cui1,2,*, Suzanne McIntosh3, Huiyu Sun3
CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 229-241, 2018, DOI:10.3970/cmc.2018.01693
Abstract Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems. The aim of this work is to use a deep neural network to detect photographic images (PI) versus computer generated graphics (CG). In existing approaches, image feature classification is computationally intensive and fails to achieve real-time analysis. This paper presents an effective approach to automatically identify PI and CG based on deep convolutional neural networks (DCNNs). Compared with some existing methods, the proposed method achieves real-time forensic tasks by deepening the network structure. Experimental results… More >
Open Access
ARTICLE
Ya Tu1, Yun Lin1, Jin Wang2,3,*, Jeong-Uk Kim4
CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 243-254, 2018, DOI:10.3970/cmc.2018.01755
Abstract Deep Learning (DL) is such a powerful tool that we have seen tremendous success in areas such as Computer Vision, Speech Recognition, and Natural Language Pro-cessing. Since Automated Modulation Classification (AMC) is an important part in Cognitive Radio Networks, we try to explore its potential in solving signal modula-tion recognition problem. It cannot be overlooked that DL model is a complex mod-el, thus making them prone to over-fitting. DL model requires many training data to combat with over-fitting, but adding high quality labels to training data manually is not always cheap and accessible, especially in real-time system, which may counter… More >
Open Access
ARTICLE
Yangyang Wang1, Rongrong Ni1,*, Yao Zhao1, Min Xian2
CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 255-265, 2018, DOI:10.3970/cmc.2018.01732
Abstract In this paper, two methods are proposed to embed visual watermark into direct binary search (DBS) halftone images, which are called Adjusted Direct Binary Search (ADBS) and Dual Adjusted Direct Binary Search (DADBS). DADBS is an improved version of ADBS. By using the proposed methods, the visual watermark will be embedded into two halftone images separately, thus, the watermark can be revealed when these two halftone images are overlaid. Experimental results show that both methods can achieve excellent image visual quality and decoded visual patterns. More >
Open Access
ARTICLE
Xian Tang1,*, Ziyang Chen2, Haiyan Zhang3, Xiang Liu1, Yunyu Shi1, Asad Shahzadi4
CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 267-283, 2018, DOI:10.3970/cmc.2018.01839
Abstract Answering reachability queries is one of the fundamental graph operations. Existing approaches either accelerate index construction by constructing an index that covers only partial reachability relationship, which may result in performing cost traversing operation when answering a query; or accelerate query answering by constructing an index covering the complete reachability relationship, which may be inefficient due to comparing the complete node labels. We propose a novel labeling scheme, which covers the complete reachability relationship, to accelerate reachability queries processing. The idea is to decompose the given directed acyclic graph (DAG) G into two subgraphs, G1 and G2. For G1, we… More >
Open Access
ARTICLE
Wenjia Xu1, Shijun Xiang1,*, Vasily Sachnev2
CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 285-295, 2018, DOI:10.3970/cmc.2018.01719
Abstract With the rapid development of information network, the computing resources and storage capacity of ordinary users cannot meet their needs of data processing. The emergence of cloud computing solves this problem but brings data security problems. How to manage and retrieve ciphertext data effectively becomes a challenging problem. To these problems, a new image retrieval method in ciphertext domain by block image encrypting based on Paillier homomophic cryptosystem is proposed in this paper. This can be described as follows: According to the Paillier encryption technology, the image owner encrypts the original image in blocks, obtains the image in ciphertext domain,… More >
Open Access
ARTICLE
Xiaorui Zhang1,2,3,*, Pengpai Wang1, Wei Sun2, Norman I. Badler3
CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 297-319, 2018, DOI:10.3970/cmc.2018.01764
Abstract Real-time performance and accuracy are two most challenging requirements in virtual surgery training. These difficulties limit the promotion of advanced models in virtual surgery, including many geometric and physical models. This paper proposes a physical model of virtual soft tissue, which is a twist model based on the Kriging interpolation and membrane analogy. The proposed model can quickly locate spatial position through Kriging interpolation method and accurately compute the force change on the soft tissue through membrane analogy method. The virtual surgery simulation system is built with a PHANTOM OMNI haptic interaction device to simulate the torsion of virtual stomach… More >
Open Access
ARTICLE
Mingming Wang1,2,*, Chen Yang1, Reza Mousoli3
CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 321-329, 2018, DOI:10.3970/cmc.2018.02064
Abstract Quantum secure communications could securely transmit quantum information by using quantum resource. Recently, novel applications such as bidirectional and asymmetric quantum protocols have been developed. In this paper, we propose a new method for generating entanglement which is highly useful for multiparty quantum communications such as teleportation and Remote State Preparation (RSP). As one of its applications, we propose a new type of quantum secure communications, i.e. cyclic RSP protocols. Starting from a four-party controlled cyclic RSP protocol of one-qubit states, we show that this cyclic protocol can be generalized to a multiparty controlled cyclic RSP protocol for preparation of… More >
Open Access
ARTICLE
Zhenjun Tang1,*, Man Ling1, Heng Yao1, Zhenxing Qian2, Xianquan Zhang1, Jilian Zhang3, Shijie Xu1
CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 331-344, 2018, DOI:10.3970/cmc.2018.02222
Abstract Image hashing is a useful multimedia technology for many applications, such as image authentication, image retrieval, image copy detection and image forensics. In this paper, we propose a robust image hashing based on random Gabor filtering and discrete wavelet transform (DWT). Specifically, robust and secure image features are first extracted from the normalized image by Gabor filtering and a chaotic map called Skew tent map, and then are compressed via a single-level 2-D DWT. Image hash is finally obtained by concatenating DWT coefficients in the LL sub-band. Many experiments with open image datasets are carried out and the results illustrate… More >