Home / Journals / JIHPP / Vol.1, No.2, 2019
  • Open AccessOpen Access

    ARTICLE

    Coverless Image Steganography Method Based on Feature Selection

    Anqi Qiu1,2, Xianyi Chen1,2, Xingming Sun1,2,*, Shuai Wang3, Guo Wei4
    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 49-60, 2019, DOI:10.32604/jihpp.2019.05881
    Abstract A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use three kinds of features which are Local Binary Pattern (LBP), the mean value of pixels and the variance value of pixels. On this basis, we realize the transmission of secret information. Firstly, the hash sequence of the original cover image is obtained More >

  • Open AccessOpen Access

    ARTICLE

    Research on Privacy Preserving Data Mining

    Pingshui Wang1,*, Tao Chen1,2, Zecheng Wang1
    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 61-68, 2019, DOI:10.32604/jihpp.2019.05943
    Abstract In recent years, with the explosive development in Internet, data storage and data processing technologies, privacy preservation has been one of the greater concerns in data mining. A number of methods and techniques have been developed for privacy preserving data mining. This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation. The existing problems and directions for future research are also discussed. More >

  • Open AccessOpen Access

    ARTICLE

    Joint Self-Attention Based Neural Networks for Semantic Relation Extraction

    Jun Sun1, Yan Li1, Yatian Shen1,*, Wenke Ding1, Xianjin Shi1, Lei Zhang1, Xiajiong Shen1, Jing He2
    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 69-75, 2019, DOI:10.32604/jihpp.2019.06357
    Abstract Relation extraction is an important task in NLP community. However, some models often fail in capturing Long-distance dependence on semantics, and the interaction between semantics of two entities is ignored. In this paper, we propose a novel neural network model for semantic relation classification called joint self-attention bi-LSTM (SA-Bi-LSTM) to model the internal structure of the sentence to obtain the importance of each word of the sentence without relying on additional information, and capture Long-distance dependence on semantics. We conduct experiments using the SemEval-2010 Task 8 dataset. Extensive experiments and the results demonstrated that the More >

  • Open AccessOpen Access

    ARTICLE

    Splicing Image and Its Localization: A Survey

    Jinwei Wang1,*, Yangyang Li2
    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 77-86, 2019, DOI:10.32604/jihpp.2019.07186
    Abstract With the rapid development of information technology, digital images have become an important medium for information transmission. However, manipulating images is becoming a common task with the powerful image editing tools and software, and people can tamper the images content without leaving any visible traces of splicing in order to gain personal goal. Images are easily spliced and distributed, and the situation will be a great threat to social security. The survey covers splicing image and its localization. The present status of splicing image localization approaches is discussed along with a recommendation for future research. More >

  • Open AccessOpen Access

    ARTICLE

    A Survey on Digital Image Steganography

    Jiaxin Wang1,*, Mengxin Cheng1, Peng Wu1, Beijing Chen1,2
    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 87-93, 2019, DOI:10.32604/jihpp.2019.07189
    Abstract Internet brings us not only the convenience of communication but also some security risks, such as intercepting information and stealing information. Therefore, some important information needs to be hidden during communication. Steganography is the most common information hiding technology. This paper provides a literature review on digital image steganography. The existing steganography algorithms are classified into traditional algorithms and deep learning-based algorithms. Moreover, their advantages and weaknesses are pointed out. Finally, further research directions are discussed. More >

Per Page:

Share Link