Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (65)
  • Open Access

    ARTICLE

    Dynamic Resource Scheduling in Emergency Environment

    Yuankun Yan1,*, Yan Kong1, Zhangjie Fu1,2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 143-155, 2019, DOI:10.32604/jihpp.2019.07772

    Abstract Nowadays, emergency accidents could happen at any time. The accidents occur unpredictably and the accidents requirements are diversely. The accidents happen in a dynamic environment and the resource should be cooperative to solve the accidents. Most methods are focusing on minimizing the casualties and property losses in a static environment. However, they are lack in considering the dynamic and unpredictable event handling. In this paper, we propose a representative environmental model in representation of emergency and dynamic resource allocation model, and an adaptive mathematical model based on Genetic Algorithm (GA) to generate an optimal set of solution domain. The experimental… More >

  • Open Access

    ARTICLE

    An Enhanced Nonlocal Self-Similarity Technique for Fabric Defect Detection

    Boheng Wang1, Li Ma1, Jielin Jiang1,2,*

    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 135-142, 2019, DOI:10.32604/jihpp.2019.07432

    Abstract Fabric defect detection has been an indispensable and important link in fabric production, many studies on the development of vision based automated inspection techniques have been reported. The main drawback of existing methods is that they can only inspect a particular type of fabric pattern in controlled environment. Recently, nonlocal self-similarity (NSS) based method is used for fabric defect detection. This method achieves good defect detection performance for small defects with uneven illumination, the disadvantage of NNS based method is poor for detecting linear defects. Based on this reason, we improve NSS based defect detection method by introducing a gray… More >

  • Open Access

    ARTICLE

    Analysis of Underlay Cognitive Radio Networks Based on Interference Cancellation Mechanism

    Lei Wang1, Jian Liu1,*, Alan Yang2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 119-133, 2019, DOI:10.32604/jihpp.2019.07296

    Abstract In this paper, we study the state-dependent interference channel, where the Rayleigh channel is non-causally known at cognitive network. We propose an active secondary transmission mechanism with interference cancellation technique according to the ON-OFF status of primary network. the secondary transmission mechanism is divided into four cases according to the active state of the primary user in the two time slots. For these interference cases, numerical results are provided to show that active interference cancellation mechanism significantly reduces the secondary transmission performance in terms of secondary outage probability and energy efficiency. More >

  • Open Access

    ARTICLE

    A Multi-Scale Network with the Encoder-Decoder Structure for CMR Segmentation

    Chaoyang Xia1, Jing Peng1, Zongqing Ma2, Xiaojie Li1,*

    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 109-117, 2019, DOI:10.32604/jihpp.2019.07198

    Abstract Cardiomyopathy is one of the most serious public health threats. The precise structural and functional cardiac measurement is an essential step for clinical diagnosis and follow-up treatment planning. Cardiologists are often required to draw endocardial and epicardial contours of the left ventricle (LV) manually in routine clinical diagnosis or treatment planning period. This task is time-consuming and error-prone. Therefore, it is necessary to develop a fully automated end-to-end semantic segmentation method on cardiac magnetic resonance (CMR) imaging datasets. However, due to the low image quality and the deformation caused by heartbeat, there is no effective tool for fully automated end-to-end… More >

  • Open Access

    ARTICLE

    Study on Initial Alignment Under Large Misalignment Angle

    Qi Wang1,2,*, Changsong Yang2,4, Shaoen Wu3

    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 95-108, 2019, DOI:10.32604/jihpp.2019.06054

    Abstract Misalignment angle error model describing the SINS mathematical platform error is presented in this paper following the idea of small misalignment angle error model and large azimuth misalignment angle error model. It can be considered that the three misalignment angles are independent of the rotational sequence in the misalignment error model, but not suitable in the large misalignment error model. The error angle of Euler platform is used to represent the three misalignment angles from theoretical navigation coordinate system to computational navigation coordinate system. The Euler platform error angle is utilized to represent the mathematical platform error and its physical… More >

  • Open Access

    ARTICLE

    A Survey on Digital Image Steganography

    Jiaxin Wang1,*, Mengxin Cheng1, Peng Wu1, Beijing Chen1,2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 87-93, 2019, DOI:10.32604/jihpp.2019.07189

    Abstract Internet brings us not only the convenience of communication but also some security risks, such as intercepting information and stealing information. Therefore, some important information needs to be hidden during communication. Steganography is the most common information hiding technology. This paper provides a literature review on digital image steganography. The existing steganography algorithms are classified into traditional algorithms and deep learning-based algorithms. Moreover, their advantages and weaknesses are pointed out. Finally, further research directions are discussed. More >

  • Open Access

    ARTICLE

    Splicing Image and Its Localization: A Survey

    Jinwei Wang1,*, Yangyang Li2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 77-86, 2019, DOI:10.32604/jihpp.2019.07186

    Abstract With the rapid development of information technology, digital images have become an important medium for information transmission. However, manipulating images is becoming a common task with the powerful image editing tools and software, and people can tamper the images content without leaving any visible traces of splicing in order to gain personal goal. Images are easily spliced and distributed, and the situation will be a great threat to social security. The survey covers splicing image and its localization. The present status of splicing image localization approaches is discussed along with a recommendation for future research. More >

  • Open Access

    ARTICLE

    Joint Self-Attention Based Neural Networks for Semantic Relation Extraction

    Jun Sun1, Yan Li1, Yatian Shen1,*, Wenke Ding1, Xianjin Shi1, Lei Zhang1, Xiajiong Shen1, Jing He2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 69-75, 2019, DOI:10.32604/jihpp.2019.06357

    Abstract Relation extraction is an important task in NLP community. However, some models often fail in capturing Long-distance dependence on semantics, and the interaction between semantics of two entities is ignored. In this paper, we propose a novel neural network model for semantic relation classification called joint self-attention bi-LSTM (SA-Bi-LSTM) to model the internal structure of the sentence to obtain the importance of each word of the sentence without relying on additional information, and capture Long-distance dependence on semantics. We conduct experiments using the SemEval-2010 Task 8 dataset. Extensive experiments and the results demonstrated that the proposed method is effective against… More >

  • Open Access

    ARTICLE

    Research on Privacy Preserving Data Mining

    Pingshui Wang1,*, Tao Chen1,2, Zecheng Wang1

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 61-68, 2019, DOI:10.32604/jihpp.2019.05943

    Abstract In recent years, with the explosive development in Internet, data storage and data processing technologies, privacy preservation has been one of the greater concerns in data mining. A number of methods and techniques have been developed for privacy preserving data mining. This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation. The existing problems and directions for future research are also discussed. More >

  • Open Access

    ARTICLE

    Coverless Image Steganography Method Based on Feature Selection

    Anqi Qiu1,2, Xianyi Chen1,2, Xingming Sun1,2,*, Shuai Wang3, Guo Wei4

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 49-60, 2019, DOI:10.32604/jihpp.2019.05881

    Abstract A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use three kinds of features which are Local Binary Pattern (LBP), the mean value of pixels and the variance value of pixels. On this basis, we realize the transmission of secret information. Firstly, the hash sequence of the original cover image is obtained according to the description of… More >

Displaying 51-60 on page 6 of 65. Per Page