Home / Journals / CMC / Vol.58, No.1, 2019
Table of Content
  • Open AccessOpen Access

    ARTICLE

    High Capacity Data Hiding in Encrypted Image Based on Compressive Sensing for Nonequivalent Resources

    Di Xiao1,*, Jia Liang1, Qingqing Ma1, Yanping Xiang1, Yushu Zhang2
    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 1-13, 2019, DOI:10.32604/cmc.2019.02171
    Abstract To fulfill the requirements of data security in environments with nonequivalent resources, a high capacity data hiding scheme in encrypted image based on compressive sensing (CS) is proposed by fully utilizing the adaptability of CS to nonequivalent resources. The original image is divided into two parts: one part is encrypted with traditional stream cipher; the other part is turned to the prediction error and then encrypted based on CS to vacate room simultaneously. The collected non-image data is firstly encrypted with simple stream cipher. For data security management, the encrypted non-image data is then embedded into the encrypted image, and… More >

  • Open AccessOpen Access

    ARTICLE

    Using Imbalanced Triangle Synthetic Data for Machine Learning Anomaly Detection

    Menghua Luo1,2, Ke Wang1, Zhiping Cai1,*, Anfeng Liu3, Yangyang Li4, Chak Fong Cheang5
    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 15-26, 2019, DOI:10.32604/cmc.2019.03708
    Abstract The extreme imbalanced data problem is the core issue in anomaly detection. The amount of abnormal data is so small that we cannot get adequate information to analyze it. The mainstream methods focus on taking fully advantages of the normal data, of which the discrimination method is that the data not belonging to normal data distribution is the anomaly. From the view of data science, we concentrate on the abnormal data and generate artificial abnormal samples by machine learning method. In this kind of technologies, Synthetic Minority Over-sampling Technique and its improved algorithms are representative milestones, which generate synthetic examples… More >

  • Open AccessOpen Access

    ARTICLE

    A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment

    Zhihua Xia1,*, Lihua Lu1, Tong Qiu1, H. J. Shim1, Xianyi Chen1, Byeungwoo Jeon2
    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 27-43, 2019, DOI:10.32604/cmc.2019.02688
    Abstract Content based image retrieval (CBIR) techniques have been widely deployed in many applications for seeking the abundant information existed in images. Due to large amounts of storage and computational requirements of CBIR, outsourcing image search work to the cloud provider becomes a very attractive option for many owners with small devices. However, owing to the private content contained in images, directly outsourcing retrieval work to the cloud provider apparently bring about privacy problem, so the images should be protected carefully before outsourcing. This paper presents a secure retrieval scheme for the encrypted images in the YUV color space. With this… More >

  • Open AccessOpen Access

    ARTICLE

    A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access

    Xin Jiang1, Mingzhe Liu1,*, Chen Yang1, Yanhua Liu1, Ruili Wang2
    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 45-59, 2019, DOI:10.32604/cmc.2019.03863
    Abstract In order to deploy a secure WLAN mesh network, authentication of both users and APs is needed, and a secure authentication mechanism should be employed. However, some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system. This paper proposes a new block chain-based authentication protocol for WLAN mesh security access, to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authentication. This method takes the user’s authentication request as a transaction, considers all the authentication records in the mesh network as the public… More >

  • Open AccessOpen Access

    ARTICLE

    Differentially Private Real-Time Streaming Data Publication Based on Sliding Window Under Exponential Decay

    Lan Sun1, Chen Ge1, Xin Huang1, Yingjie Wu1,*, Yan Gao2
    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 61-78, 2019, DOI:10.32604/cmc.2019.03744
    Abstract Continuous response of range query on steaming data provides useful information for many practical applications as well as the risk of privacy disclosure. The existing research on differential privacy streaming data publication mostly pay close attention to boosting query accuracy, but pay less attention to query efficiency, and ignore the effect of timeliness on data weight. In this paper, we propose an effective algorithm of differential privacy streaming data publication under exponential decay mode. Firstly, by introducing the Fenwick tree to divide and reorganize data items in the stream, we achieve a constant time complexity for inserting a new item… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Multi-Hop Algorithm for Wireless Network with Unevenly Distributed Nodes

    Yu Liu1, Zhong Yang2, Xiaoyong Yan3, Guangchi Liu4, Bo Hu5,*
    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 79-100, 2019, DOI:10.32604/cmc.2019.03626
    Abstract Node location estimation is not only the promise of the wireless network for target recognition, monitoring, tracking and many other applications, but also one of the hot topics in wireless network research. In this paper, the localization algorithm for wireless network with unevenly distributed nodes is discussed, and a novel multi-hop localization algorithm based on Elastic Net is proposed. The proposed approach is formulated as a regression problem, which is solved by Elastic Net. Unlike other previous localization approaches, the proposed approach overcomes the shortcomings of traditional approaches assume that nodes are distributed in regular areas without holes or obstacles,… More >

  • Open AccessOpen Access

    ARTICLE

    An Entity-Association-Based Matrix Factorization Recommendation Algorithm

    Gongshen Liu1, Kui Meng1,*, Jiachen Ding1, Jan P. Nees1, Hongyi Guo1, Xuewen Zhang1
    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 101-120, 2019, DOI:10.32604/cmc.2019.03898
    Abstract Collaborative filtering is the most popular approach when building recommender systems, but the large scale and sparse data of the user-item matrix seriously affect the recommendation results. Recent research shows the user’s social relations information can improve the quality of recommendation. However, most of the current social recommendation algorithms only consider the user's direct social relations, while ignoring potential users’ interest preference and group clustering information. Moreover, project attribute is also important in item rating. We propose a recommendation algorithm which using matrix factorization technology to fuse user information and project information together. We first detect the community structure using… More >

  • Open AccessOpen Access

    ARTICLE

    Some Topological Indices Computing Results If Archimedean Lattices L(4,6,12)

    Kang Qiong1,*, Xinting Li2
    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 121-133, 2019, DOI:10.32604/cmc.2019.03723
    Abstract The introduction of graph-theoretical structure descriptors represents an important step forward in the research of predictive models in chemistry and falls within the lines of the increasing use of mathematical and computational methods in contemporary chemistry. The basis for these models is the study of the quantitative structure-property and structure-activity relationship. In this paper, we investigate Great rhom-bitrihexagonal which is a kind of dodecagon honeycomb net-work covered by quadrangle and hexagon. Many topological indexes of Great rhom-bitrihexagonal have being investigated, such as sum-connectivity index, atom-bond connectivity index, geometric-arithmetic index, fifth, harmonic index, Randić connectivity index, first Zagreb index, second Zagreb… More >

  • Open AccessOpen Access

    ARTICLE

    Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage

    Zhiliang Deng1,2, Yongjun Ren3,4, Yepeng Liu3,4, Xiang Yin5, Zixuan Shen3,4, Hye-Jin Kim6,*
    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 135-151, 2019, DOI:10.32604/cmc.2019.02967
    Abstract Cloud storage represents the trend of intensive, scale and specialization of information technology, which has changed the technical architecture and implementation method of electronic records management. Moreover, it will provide a convenient way to generate more advanced and efficient management of the electronic data records. However, in cloud storage environment, it is difficult to guarantee the trustworthiness of electronic records, which results in a series of severe challenges to electronic records management. Starting from the definition and specification of electronic records, this paper firstly analyzes the requirements of the trustworthiness in cloud storage during their long-term preservation according to the… More >

  • Open AccessOpen Access

    ARTICLE

    GFCache: A Greedy Failure Cache Considering Failure Recency and Failure Frequency for an Erasure-Coded Storage System

    Mingzhu Deng1, Fang Liu2,*, Ming Zhao3, Zhiguang Chen2, Nong Xiao2,1
    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 153-167, 2019, DOI:10.32604/cmc.2019.03585
    Abstract In the big data era, data unavailability, either temporary or permanent, becomes a normal occurrence on a daily basis. Unlike the permanent data failure, which is fixed through a background job, temporarily unavailable data is recovered on-the-fly to serve the ongoing read request. However, those newly revived data is discarded after serving the request, due to the assumption that data experiencing temporary failures could come back alive later. Such disposal of failure data prevents the sharing of failure information among clients, and leads to many unnecessary data recovery processes, (e.g. caused by either recurring unavailability of a data or multiple… More >

Per Page:

Share Link

WeChat scan