Home / Journals / CMC / Vol.55, No.2, 2018
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Binary Image Steganalysis Based on Distortion Level Co-Occurrence Matrix

    Junjia Chen1, Wei Lu1,2,*, Yuileong Yeung1, Yingjie Xue1, Xianjin Liu1, Cong Lin1,3, Yue Zhang4
    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 201-211, 2018, DOI:10.3970/cmc.2018.01781
    Abstract In recent years, binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information security. In most state-of-the-art binary image steganographic schemes, they always find out the flippable pixels to minimize the embedding distortions. For this reason, the stego images generated by the previous schemes maintain visual quality and it is hard for steganalyzer to capture the embedding trace in spacial domain. However, the distortion maps can be calculated for cover and stego images and the difference between them is significant. In this paper, a novel binary image steganalytic scheme is proposed,… More >

  • Open AccessOpen Access

    ARTICLE

    Paragraph Vector Representation Based on Word to Vector and CNN Learning

    Zeyu Xiong1,*, Qiangqiang Shen1, Yijie Wang1, Chenyang Zhu2
    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 213-227, 2018, DOI:10.3970/cmc.2018.01762
    Abstract Document processing in natural language includes retrieval, sentiment analysis, theme extraction, etc. Classical methods for handling these tasks are based on models of probability, semantics and networks for machine learning. The probability model is loss of semantic information in essential, and it influences the processing accuracy. Machine learning approaches include supervised, unsupervised, and semi-supervised approaches, labeled corpora is necessary for semantics model and supervised learning. The method for achieving a reliably labeled corpus is done manually, it is costly and time-consuming because people have to read each document and annotate the label of each document. Recently, the continuous CBOW model… More >

  • Open AccessOpen Access

    ARTICLE

    Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs

    Qi Cui1,2,*, Suzanne McIntosh3, Huiyu Sun3
    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 229-241, 2018, DOI:10.3970/cmc.2018.01693
    Abstract Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems. The aim of this work is to use a deep neural network to detect photographic images (PI) versus computer generated graphics (CG). In existing approaches, image feature classification is computationally intensive and fails to achieve real-time analysis. This paper presents an effective approach to automatically identify PI and CG based on deep convolutional neural networks (DCNNs). Compared with some existing methods, the proposed method achieves real-time forensic tasks by deepening the network structure. Experimental results… More >

  • Open AccessOpen Access

    ARTICLE

    Semi-Supervised Learning with Generative Adversarial Networks on Digital Signal Modulation Classification

    Ya Tu1, Yun Lin1, Jin Wang2,3,*, Jeong-Uk Kim4
    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 243-254, 2018, DOI:10.3970/cmc.2018.01755
    Abstract Deep Learning (DL) is such a powerful tool that we have seen tremendous success in areas such as Computer Vision, Speech Recognition, and Natural Language Pro-cessing. Since Automated Modulation Classification (AMC) is an important part in Cognitive Radio Networks, we try to explore its potential in solving signal modula-tion recognition problem. It cannot be overlooked that DL model is a complex mod-el, thus making them prone to over-fitting. DL model requires many training data to combat with over-fitting, but adding high quality labels to training data manually is not always cheap and accessible, especially in real-time system, which may counter… More >

  • Open AccessOpen Access

    ARTICLE

    Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual Cryptography

    Yangyang Wang1, Rongrong Ni1,*, Yao Zhao1, Min Xian2
    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 255-265, 2018, DOI:10.3970/cmc.2018.01732
    Abstract In this paper, two methods are proposed to embed visual watermark into direct binary search (DBS) halftone images, which are called Adjusted Direct Binary Search (ADBS) and Dual Adjusted Direct Binary Search (DADBS). DADBS is an improved version of ADBS. By using the proposed methods, the visual watermark will be embedded into two halftone images separately, thus, the watermark can be revealed when these two halftone images are overlaid. Experimental results show that both methods can achieve excellent image visual quality and decoded visual patterns. More >

  • Open AccessOpen Access

    ARTICLE

    An Optimized Labeling Scheme for Reachability Queries

    Xian Tang1,*, Ziyang Chen2, Haiyan Zhang3, Xiang Liu1, Yunyu Shi1, Asad Shahzadi4
    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 267-283, 2018, DOI:10.3970/cmc.2018.01839
    Abstract Answering reachability queries is one of the fundamental graph operations. Existing approaches either accelerate index construction by constructing an index that covers only partial reachability relationship, which may result in performing cost traversing operation when answering a query; or accelerate query answering by constructing an index covering the complete reachability relationship, which may be inefficient due to comparing the complete node labels. We propose a novel labeling scheme, which covers the complete reachability relationship, to accelerate reachability queries processing. The idea is to decompose the given directed acyclic graph (DAG) G into two subgraphs, G1 and G2. For G1, we… More >

  • Open AccessOpen Access

    ARTICLE

    A Cryptograph Domain Image Retrieval Method Based on Paillier Homomorphic Block Encryption

    Wenjia Xu1, Shijun Xiang1,*, Vasily Sachnev2
    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 285-295, 2018, DOI:10.3970/cmc.2018.01719
    Abstract With the rapid development of information network, the computing resources and storage capacity of ordinary users cannot meet their needs of data processing. The emergence of cloud computing solves this problem but brings data security problems. How to manage and retrieve ciphertext data effectively becomes a challenging problem. To these problems, a new image retrieval method in ciphertext domain by block image encrypting based on Paillier homomophic cryptosystem is proposed in this paper. This can be described as follows: According to the Paillier encryption technology, the image owner encrypts the original image in blocks, obtains the image in ciphertext domain,… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Twist Deformation Model of Soft Tissue in Surgery Simulation

    Xiaorui Zhang1,2,3,*, Pengpai Wang1, Wei Sun2, Norman I. Badler3
    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 297-319, 2018, DOI:10.3970/cmc.2018.01764
    Abstract Real-time performance and accuracy are two most challenging requirements in virtual surgery training. These difficulties limit the promotion of advanced models in virtual surgery, including many geometric and physical models. This paper proposes a physical model of virtual soft tissue, which is a twist model based on the Kriging interpolation and membrane analogy. The proposed model can quickly locate spatial position through Kriging interpolation method and accurately compute the force change on the soft tissue through membrane analogy method. The virtual surgery simulation system is built with a PHANTOM OMNI haptic interaction device to simulate the torsion of virtual stomach… More >

  • Open AccessOpen Access

    ARTICLE

    Controlled Cyclic Remote State Preparation of Arbitrary Qubit States

    Mingming Wang1,2,*, Chen Yang1, Reza Mousoli3
    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 321-329, 2018, DOI:10.3970/cmc.2018.02064
    Abstract Quantum secure communications could securely transmit quantum information by using quantum resource. Recently, novel applications such as bidirectional and asymmetric quantum protocols have been developed. In this paper, we propose a new method for generating entanglement which is highly useful for multiparty quantum communications such as teleportation and Remote State Preparation (RSP). As one of its applications, we propose a new type of quantum secure communications, i.e. cyclic RSP protocols. Starting from a four-party controlled cyclic RSP protocol of one-qubit states, we show that this cyclic protocol can be generalized to a multiparty controlled cyclic RSP protocol for preparation of… More >

  • Open AccessOpen Access

    ARTICLE

    Robust Image Hashing via Random Gabor Filtering and DWT

    Zhenjun Tang1,*, Man Ling1, Heng Yao1, Zhenxing Qian2, Xianquan Zhang1, Jilian Zhang3, Shijie Xu1
    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 331-344, 2018, DOI:10.3970/cmc.2018.02222
    Abstract Image hashing is a useful multimedia technology for many applications, such as image authentication, image retrieval, image copy detection and image forensics. In this paper, we propose a robust image hashing based on random Gabor filtering and discrete wavelet transform (DWT). Specifically, robust and secure image features are first extracted from the normalized image by Gabor filtering and a chaotic map called Skew tent map, and then are compressed via a single-level 2-D DWT. Image hash is finally obtained by concatenating DWT coefficients in the LL sub-band. Many experiments with open image datasets are carried out and the results illustrate… More >

  • Open AccessOpen Access

    ARTICLE

    Symmetry Transformations and Exact Solutions of a Generalized Hyperelastic Rod Equation

    Ran Wang1, Xuegang Yuan1,2, Hongwu Zhang1, Jing Zhang3, Na Lv2,*
    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 345-357, 2018, DOI:10.3970/cmc.2018.00233
    Abstract In this paper, a nonlinear wave equation with variable coefficients is studied, interestingly, this equation can be used to describe the travelling waves propagating along the circular rod composed of a general compressible hyperelastic material with variable cross-sections and variable material densities. With the aid of Lou’s direct method1, the nonlinear wave equation with variable coefficients is reduced and two sets of symmetry transformations and exact solutions of the nonlinear wave equation are obtained. The corresponding numerical examples of exact solutions are presented by using different coefficients. Particularly, while the variable coefficients are taken as some special constants, the nonlinear… More >

  • Open AccessOpen Access

    ARTICLE

    The Discrete-Analytical Solution Method for Investigation Dynamics of the Sphere with Inhomogeneous Initial Stresses

    Surkay D. Akbarov1,2, Hatam H. Guliyev3, Yusif M. Sevdimaliyev4, Nazmiye Yahnioglu5,*
    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 359-380, 2018, DOI:10.3970/cmc.2018.00173
    Abstract The paper deals with a development of the discrete-analytical method for the solution of the dynamical problems of a hollow sphere with inhomogeneous initial stresses. The examinations are made with respect to the problem on the natural vibration of the hollow sphere the initial stresses in which is caused by internal and external uniformly distributed pressure. The initial stresses in the sphere are determined within the scope of the exact equations of elastostatics. It is assumed that after appearing this static initial stresses the sphere gets a dynamical excitation and mechanical behavior of the sphere caused by this excitation is… More >

Per Page:

Share Link