Home / Journals / JIHPP / Vol.3, No.3, 2021
  • Open AccessOpen Access

    ARTICLE

    Channel Coding Based on Power Line Communication

    Xiaojun Chen*, Yunxiao Zu
    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 101-107, 2021, DOI:10.32604/jihpp.2021.025225
    Abstract This paper focuses on the forward error correction (FEC), the basic parameters determination of the RS convolution code, Turbo code and the LDPC code, and the corresponding encoding and decoding algorithm in power line communication (PLC) standard. Simulation experiment which is designed for narrow-band power line communication system based on OFDM is done. The coding using RS convolution code, Turbo code and LDPC code are compared, and further it is determined that which encoding method is more suitable for power line communication in China. More >

  • Open AccessOpen Access

    ARTICLE

    Quantum Steganography Application in the Electrical Network for Quantum Image and Watermark with Self-Adaptive

    Jie Shen1,3,*,#, Wenqi Dong2,#, Jing Wang1,2,3,#, Yang Wang1, Haiyan Li4
    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 109-120, 2021, DOI:10.32604/jihpp.2021.025602
    Abstract With the development of Globe Energy Internet, quantum steganography has been used for information hiding to improve copyright protection. Based on secure quantum communication protocol, and flexible steganography, secret information is embedded in quantum images in covert communication. Under the premise of guaranteeing the quality of the quantum image, the secret information is transmitted safely with virtue of good imperceptibility. A novel quantum watermark algorithm is proposed in the paper, based on the shared group key value of the communication parties and the transmission of the selected carrier map pixel gray higher than 8 bits. According to the shared group… More >

  • Open AccessOpen Access

    ARTICLE

    Heart Rate Detection Based on Facial Video

    Yudan Zhao*, Chaoyu Wang
    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 121-130, 2021, DOI:10.32604/jihpp.2021.026380
    Abstract Heart rate is an important data reflecting human vital characteristics and an important reference index to describe human physical and mental state. Currently, widely used heart rate measurement devices require direct contact with a person’s skin, which is not suitable for people with burns, delicate skin, newborns and the elderly. Therefore, the research of non-contact heart rate measurement method is of great significance. Based on the basic principle of Photoplethysmography, we use the camera of computer equipment to capture the face image, detect the face region accurately, and detect multiple faces in the image based on multi-target tracking algorithm. Then… More >

  • Open AccessOpen Access

    ARTICLE

    A Image Copyright Protection Method Using Zero-Watermark by Blockchain and IPFS

    Tao Chen1, Zhao Qiu1,*, Gengquan Xie1, Lin Yuan1, Shaohua Duan1, Hao Guo1, Dahao Fu1, Hancheng Huang2
    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 131-142, 2021, DOI:10.32604/jihpp.2021.026606
    Abstract Behind the popularity of multimedia technology, the dispute over image copyright is getting worse. In the digital watermark prevention technology for copyright infringement, watermark technology is considered to be an important technology to overcome data protection problems and verify the relationship between data ownership. Among the many digital watermarking technologies, zero watermarking technology has been favored in recent years. However, the existing zero watermark technology in the implementation process often needs a trusted third party to store watermarks, which may make the data too central, data storage security is low and copyright registration costs are too high, which creates a… More >

  • Open AccessOpen Access

    ARTICLE

    Pixel Based Steganography for Secure Information Hiding

    N. Shyla*, K. Kalimuthu
    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 143-149, 2021, DOI:10.32604/jihpp.2021.026760
    Abstract The term “steganography” is derived from the Greek words steganos, which means “verified, concealed, or guaranteed”, and graphein, which means “writing”. The primary motivation for considering steganography is to prevent unapproved individuals from obtaining disguised data. With the ultimate goal of comprehending the fundamental inspiration driving the steganography procedures, there should be no significant change in the example report. The Least Significant Bit (LSB) system, which is one of the methodologies for concealing propelled picture data, is examined in this assessment. In this evaluation, another procedure for data stowing indefinitely is proposed with the ultimate goal of limiting the progressions… More >

Per Page:

Share Link