Open Access
ARTICLE
Xiaojun Chen*, Yunxiao Zu
Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 101-107, 2021, DOI:10.32604/jihpp.2021.025225
Abstract This paper focuses on the forward error correction (FEC), the basic
parameters determination of the RS convolution code, Turbo code and the LDPC
code, and the corresponding encoding and decoding algorithm in power line
communication (PLC) standard. Simulation experiment which is designed for
narrow-band power line communication system based on OFDM is done. The
coding using RS convolution code, Turbo code and LDPC code are compared,
and further it is determined that which encoding method is more suitable for
power line communication in China. More >
Open Access
ARTICLE
Jie Shen1,3,*,#, Wenqi Dong2,#, Jing Wang1,2,3,#, Yang Wang1, Haiyan Li4
Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 109-120, 2021, DOI:10.32604/jihpp.2021.025602
Abstract With the development of Globe Energy Internet, quantum
steganography has been used for information hiding to improve copyright
protection. Based on secure quantum communication protocol, and flexible
steganography, secret information is embedded in quantum images in covert
communication. Under the premise of guaranteeing the quality of the quantum
image, the secret information is transmitted safely with virtue of good
imperceptibility. A novel quantum watermark algorithm is proposed in the paper,
based on the shared group key value of the communication parties and the
transmission of the selected carrier map pixel gray higher than 8 bits. According
to the shared group… More >
Open Access
ARTICLE
Yudan Zhao*, Chaoyu Wang
Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 121-130, 2021, DOI:10.32604/jihpp.2021.026380
Abstract Heart rate is an important data reflecting human vital characteristics
and an important reference index to describe human physical and mental state.
Currently, widely used heart rate measurement devices require direct contact
with a person’s skin, which is not suitable for people with burns, delicate skin,
newborns and the elderly. Therefore, the research of non-contact heart rate
measurement method is of great significance. Based on the basic principle of
Photoplethysmography, we use the camera of computer equipment to capture the
face image, detect the face region accurately, and detect multiple faces in the
image based on multi-target tracking algorithm. Then… More >
Open Access
ARTICLE
Tao Chen1, Zhao Qiu1,*, Gengquan Xie1, Lin Yuan1, Shaohua Duan1, Hao Guo1, Dahao Fu1, Hancheng Huang2
Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 131-142, 2021, DOI:10.32604/jihpp.2021.026606
Abstract Behind the popularity of multimedia technology, the dispute over
image copyright is getting worse. In the digital watermark prevention technology
for copyright infringement, watermark technology is considered to be an
important technology to overcome data protection problems and verify the
relationship between data ownership. Among the many digital watermarking
technologies, zero watermarking technology has been favored in recent years.
However, the existing zero watermark technology in the implementation process
often needs a trusted third party to store watermarks, which may make the data
too central, data storage security is low and copyright registration costs are too
high, which creates a… More >
Open Access
ARTICLE
N. Shyla*, K. Kalimuthu
Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 143-149, 2021, DOI:10.32604/jihpp.2021.026760
Abstract The term “steganography” is derived from the Greek words steganos,
which means “verified, concealed, or guaranteed”, and graphein, which means
“writing”. The primary motivation for considering steganography is to prevent
unapproved individuals from obtaining disguised data. With the ultimate goal of
comprehending the fundamental inspiration driving the steganography procedures,
there should be no significant change in the example report. The Least Significant
Bit (LSB) system, which is one of the methodologies for concealing propelled
picture data, is examined in this assessment. In this evaluation, another procedure
for data stowing indefinitely is proposed with the ultimate goal of limiting the
progressions… More >