Open Access
ARTICLE
Zhiguo Hong1,*, Yongbin Wang2,3, Minyong Shi4
Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 1-13, 2022, DOI:10.32604/jihpp.2022.026440
Abstract With the rapid development of various applications of Information Technology, big data are increasingly generated by social network services (SNS) nowadays. The designers and providers of SNS distribute different client applications for PC, Mobile phone, IPTV etc., so that users can obtain related service via mobile or traditional Internet. Good scalability and considerably short time delay are important indices for evaluating social network systems. As a result, investigating and mining the principle of users’ behaviors is an important issue which can guide service providers to establish optimal systems with SNS. On the basis of analyzing the characteristics of social network… More >
Open Access
ARTICLE
Kai Chen*, Jinwei Wang, Jiawei Zhang
Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 15-24, 2022, DOI:10.32604/jihpp.2022.029006
Abstract In recent years, machine learning has become more and more popular, especially the continuous development of deep learning technology, which has brought great revolutions to many fields. In tasks such as image classification, natural language processing, information hiding, multimedia synthesis, and so on, the performance of deep learning has far exceeded the traditional algorithms. However, researchers found that although deep learning can train an accurate model through a large amount of data to complete various tasks, the model is vulnerable to the example which is modified artificially. This technology is called adversarial attacks, while the examples are called adversarial examples.… More >
Open Access
ARTICLE
Aiming Wu1, Shanshan Tu1,*, Muhammad Wagas1,2,3, Yongjie Yang1, Yihe Zhang1, Xuetao Bai1
Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 25-39, 2022, DOI:10.32604/jihpp.2022.029922
Abstract With the rapid development of the Internet of Things (IoT), all kinds of data are increasing exponentially. Data storage and computing on cloud servers are increasingly restricted by hardware. This has prompted the development of fog computing. Fog computing is to place the calculation and storage of data at the edge of the network, so that the entire Internet of Things system can run more efficiently. The main function of fog computing is to reduce the burden of cloud servers. By placing fog nodes in the IoT network, the data in the IoT devices can be transferred to the fog… More >
Open Access
ARTICLE
Haitao Zhang*
Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 41-51, 2022, DOI:10.32604/jihpp.2022.031707
Abstract Deep learning related technologies, especially generative adversarial network, are widely used in the fields of face image tampering and forgery. Forensics researchers have proposed a variety of passive forensic and related anti-forensic methods for image tampering and forgery, especially face images, but there is still a lack of overview of anti-forensic methods at this stage. Therefore, this paper will systematically discuss the anti-forensic methods for face image tampering and forgery. Firstly, this paper expounds the relevant background, including the relevant tampering and forgery methods and forensic schemes of face images. The former mainly includes four aspects: conventional processing, fake face… More >
Open Access
ARTICLE
Jian-Hua Luo1, Xi Chen1,*, Hua Li1, Yu-Hang Zhou1, Jing-Wen Li2
Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 53-60, 2022, DOI:10.32604/jihpp.2022.032109
Abstract Firstly, this paper expounds the conceptual connotation of in-service assessment in the new system, then applies modeling and Simulation in the field of in-service assessment, establishes the conceptual model of in-service assessment and its process, and finally analyzes the application of modeling and simulation in the specific links of in-service assessment. More >