Home / Journals / JIHPP / Vol.1, No.1, 2019
  • Open AccessOpen Access

    ARTICLE

    A Survey on Cryptographic Security and Information Hiding Technology for Cloud or Fog-Based IoT System

    Liang Bai1, Yuzhen Liu1, Xiaoliang Wang1,*, Nick Patterson2, F. Jiang2
    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 1-10, 2019, DOI:10.32604/jihpp.2019.06043
    Abstract Internet of Things (IoT) is an emerging paradigm involving intelligent sensor networks that incorporates embedded technology for collecting data, communicating with external environments. Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities. It is a promising technology that utilizes cloud or fog computing / architecture to improve sensor computing, storage, and communication capabilities. However, recently it has been shown that this computing/architecture may be vulnerable to various attacks because of the openness nature of the wireless network. Therefore, it becomes more and more important to… More >

  • Open AccessOpen Access

    ARTICLE

    A Survey on Machine Learning Algorithms in Little-Labeled Data for Motor Imagery-Based Brain-Computer Interfaces

    Yuxi Jia1, Feng Li1,2, Fei Wang1,2,*, Yan Gui1,2,3
    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 11-21, 2019, DOI:10.32604/jihpp.2019.05979
    Abstract The Brain-Computer Interfaces (BCIs) had been proposed and used in therapeutics for decades. However, the need of time-consuming calibration phase and the lack of robustness, which are caused by little-labeled data, are restricting the advance and application of BCI, especially for the BCI based on motor imagery (MI). In this paper, we reviewed the recent development in the machine learning algorithm used in the MI-based BCI, which may provide potential solutions for addressing the issue. We classified these algorithms into two categories, namely, and enhancing the representation and expanding the training set. Specifically, these methods of enhancing the representation of… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Trackers Review and Challenge

    Yongxiang Gu1, Beijing Chen1, Xu Cheng1,*, Yifeng Zhang2,3, Jingang Shi4
    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 23-33, 2019, DOI:10.32604/jihpp.2019.05938
    Abstract Recently, deep learning has achieved great success in visual tracking. The goal of this paper is to review the state-of-the-art tracking methods based on deep learning. First, we categorize the existing deep learning based trackers into three classes according to network structure, network function and network training. For each categorize, we analyze papers in different categories. Then, we conduct extensive experiments to compare the representative methods on the popular OTB-100, TC-128 and VOT2015 benchmarks. Based on our observations. We conclude that: (1) The usage of the convolutional neural network (CNN) model could significantly improve the tracking performance. (2) The trackers… More >

  • Open AccessOpen Access

    ARTICLE

    Research on the Association of Mobile Social Network Users Privacy Information Based on Big Data Analysis

    Pingshui Wang1,*, Zecheng Wang1, Qinjuan Ma1
    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 35-42, 2019, DOI:10.32604/jihpp.2019.05942
    Abstract The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications. The existing researches on user privacy protection in mobile social network mainly focus on privacy preserving data publishing and access control. There is little research on the association of user privacy information, so it is not easy to design personalized privacy protection strategy, but also increase the complexity of user privacy settings. Therefore, this paper concentrates on the association of user privacy information taking big data analysis tools, so as to provide data support for personalized privacy protection strategy design. More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography

    Ruohan Meng1,2, Zhili Zhou1,2, Qi Cui1,2, Xingming Sun1,2,*, Chengsheng Yuan1,2,3
    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 43-48, 2019, DOI:10.32604/jihpp.2019.05797
    Abstract At present, the coverless information hiding has been developed. However, due to the limited mapping relationship between secret information and feature selection, it is challenging to further enhance the hiding capacity of coverless information hiding. At the same time, the steganography algorithm based on object detection only hides secret information in foreground objects, which contribute to the steganography capacity is reduced. Since object recognition contains multiple objects and location, secret information can be mapped to object categories, the relationship of location and so on. Therefore, this paper proposes a new steganography algorithm based on object detection and relationship mapping, which… More >

Per Page:

Share Link