ISSN:2637-4234(print)
ISSN:2637-4226(online)
Publication Frequency:Continuously
Journal of Information Hiding and Privacy Protectionfocuses on original papers addressing novel ideas, issues, theoretical analysis, implementation, experimental results, systems and applications in the field of Watermarking, Data Hiding, Multimedia Security, and Privacy Protection.
Starting from July 2023, Journal of Information Hiding and Privacy Protection will transition to a continuous publication model, accepted articles will be promptly published online upon completion of the peer review and production processes.
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.5, pp. 1-18, 2023, DOI:10.32604/jihpp.2023.041972
Abstract In the contemporary era, the abundant availability of health information through internet and mobile technology raises concerns. Safeguarding and maintaining the confidentiality of patients’ medical data becomes paramount when sharing such information with authorized healthcare providers. Although electronic patient records and the internet have facilitated the exchange of medical information among healthcare providers, concerns persist regarding the security of the data. The security of Electronic Health Record Systems (EHRS) can be improved by employing the Cuckoo Search Algorithm (CS), the SHA-256 algorithm, and the Elliptic Curve Cryptography (ECC), as proposed in this study. The suggested approach involves using CS to… More >
Open Access
REVIEW
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 29-45, 2021, DOI:10.32604/jihpp.2021.016835
Abstract With the continuous development of face recognition network, the
selection of loss function plays an increasingly important role in improving
accuracy. The loss function of face recognition network needs to minimize the
intra-class distance while expanding the inter-class distance. So far, one of our
mainstream loss function optimization methods is to add penalty terms, such as
orthogonal loss, to further constrain the original loss function. The other is to
optimize using the loss based on angular/cosine margin. The last is Triplet loss
and a new type of joint optimization based on HST Loss and ACT Loss. In this
paper, based… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 9-16, 2021, DOI:10.32604/jihpp.2021.012193
Abstract Privacy protection is a hot research topic in information security field.
An improved XGBoost algorithm is proposed to protect the privacy in
classification tasks. By combining with differential privacy protection, the
XGBoost can improve the classification accuracy while protecting privacy
information. When using CART regression tree to build a single decision tree,
noise is added according to Laplace mechanism. Compared with random forest
algorithm, this algorithm can reduce computation cost and prevent overfitting to a
certain extent. The experimental results show that the proposed algorithm is more
effective than other traditional algorithms while protecting the privacy information
in training data. More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 61-68, 2021, DOI:10.32604/jihpp.2021.017451
Abstract Mainly introduces intelligent classification trash can be dedicated to
solving indoor household garbage classification. The trash can is based on
AT89S52 single-chip microcomputer as the main control chip. The single-chip
microcomputer realizes the intelligent classification of garbage by controlling the
voice module, mechanical drive module, and infrared detection module. The use
of voice control technology and infrared detection technology makes the trash
can have voice control and overflow alarm functions. The design has the
advantages of simple and intelligent operation, simple structure, stable
performance, low investment, etc., which can further effectively isolate people
and garbage, reduce human infection with bacteria,… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 17-28, 2021, DOI:10.32604/jihpp.2021.017497
Abstract In order to quickly and accurately find the implementer of the network
crime, based on the user portrait technology, a rapid detection method for users
with abnormal behaviorsis proposed. This method needs to construct the abnormal
behavior rule base on various kinds of abnormal behaviors in advance, and
construct the user portrait including basic attribute tags, behavior attribute tags and
abnormal behavior similarity tagsfor network users who have abnormal behaviors.
When a network crime occurs, firstly get the corresponding tag values in all user
portraits according to the category of the network crime. Then, use the Naive
Bayesian method matching… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 15-24, 2022, DOI:10.32604/jihpp.2022.029006
Abstract In recent years, machine learning has become more and more popular, especially the continuous development of deep learning technology, which has brought great revolutions to many fields. In tasks such as image classification, natural language processing, information hiding, multimedia synthesis, and so on, the performance of deep learning has far exceeded the traditional algorithms. However, researchers found that although deep learning can train an accurate model through a large amount of data to complete various tasks, the model is vulnerable to the example which is modified artificially. This technology is called adversarial attacks, while the examples are called adversarial examples.… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 1-8, 2021, DOI:10.32604/jihpp.2021.010065
Abstract Object detection has been studied for many years. The convolutional
neural network has made great progress in the accuracy and speed of object
detection. However, due to the low resolution of small objects and the
representation of fuzzy features, one of the challenges now is how to effectively
detect small objects in images. Existing target detectors for small objects: one is
to use high-resolution images as input, the other is to increase the depth of the
CNN network, but these two methods will undoubtedly increase the cost of
calculation and time-consuming. In this paper, based on the RefineDet network
framework,… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 83-89, 2021, DOI:10.32604/jihpp.2021.017181
Abstract Scene text detection is an important step in the scene text reading
system. There are still two problems during the existing text detection methods:
(1) The small receptive of the convolutional layer in text detection is not
sufficiently sensitive to the target area in the image; (2) The deep receptive of the
convolutional layer in text detection lose a lot of spatial feature information.
Therefore, detecting scene text remains a challenging issue. In this work, we
design an effective text detector named Adaptive Multi-Scale HyperNet
(AMSHN) to improve texts detection performance. Specifically, AMSHN
enhances the sensitivity of target semantics in… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 55-59, 2021, DOI:10.32604/jihpp.2021.017254
Abstract With the development of computation technology, the augmented
reality (AR) is widely applied in many fields as well as the image recognition.
However, the AR application on mobile platform is not developed enough in the
past decades due to the capability of the mobile processors. In recent years, the
performance of mobile processors has changed rapidly, which makes it
comparable to the desktop processors. This paper proposed and realized an AR
system to be used on the Android mobile platform based on the image
recognition through EasyAR engine and Unity 3D development tools. In this
system, the image recognition could… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 47-54, 2021, DOI:10.32604/jihpp.2021.016690
Abstract At present, the research of blockchain is very popular, but the
practical application of blockchain is very few. The main reason is that the
concurrency of blockchain is not enough to support application scenarios. After
that, applications such as Intervalue increase the concurrency of blockchain
transactions. However, due to the problems of network bandwidth and algorithm
performance, there is always a broadcast storm, which affects the normal use of
nodes in the whole network. However, the emergence of broadcast storms needs
to rely on the node itself, which may be very slow. Even if developers debug the
corresponding code, they… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 91-99, 2021, DOI:10.32604/jihpp.2021.019883
Abstract With the advent of the era of big data, the Provenance Method of
electronic archives based on knowledge graph under the environment of big data
has produced a large number of electronic archives due to the development of
science and technology. How to guarantee the credential characteristics of
electronic archives in the big data environment has attracted wide attention of the
academic community. Provenance is an important technical means to guarantee
the certification of electronic archives. In this paper, knowledge graph
technology is used to provide the concept provenance of electronic archives in
large data environment. It not only enriches… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 43-48, 2019, DOI:10.32604/jihpp.2019.05797
Abstract At present, the coverless information hiding has been developed. However, due to the limited mapping relationship between secret information and feature selection, it is challenging to further enhance the hiding capacity of coverless information hiding. At the same time, the steganography algorithm based on object detection only hides secret information in foreground objects, which contribute to the steganography capacity is reduced. Since object recognition contains multiple objects and location, secret information can be mapped to object categories, the relationship of location and so on. Therefore, this paper proposes a new steganography algorithm based on object detection and relationship mapping, which… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 49-60, 2019, DOI:10.32604/jihpp.2019.05881
Abstract A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use three kinds of features which are Local Binary Pattern (LBP), the mean value of pixels and the variance value of pixels. On this basis, we realize the transmission of secret information. Firstly, the hash sequence of the original cover image is obtained according to the description of… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 61-68, 2019, DOI:10.32604/jihpp.2019.05943
Abstract In recent years, with the explosive development in Internet, data storage and data processing technologies, privacy preservation has been one of the greater concerns in data mining. A number of methods and techniques have been developed for privacy preserving data mining. This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation. The existing problems and directions for future research are also discussed. More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 87-93, 2019, DOI:10.32604/jihpp.2019.07189
Abstract Internet brings us not only the convenience of communication but also some security risks, such as intercepting information and stealing information. Therefore, some important information needs to be hidden during communication. Steganography is the most common information hiding technology. This paper provides a literature review on digital image steganography. The existing steganography algorithms are classified into traditional algorithms and deep learning-based algorithms. Moreover, their advantages and weaknesses are pointed out. Finally, further research directions are discussed. More >
Open Access
REVIEW
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 29-45, 2021, DOI:10.32604/jihpp.2021.016835
Abstract With the continuous development of face recognition network, the
selection of loss function plays an increasingly important role in improving
accuracy. The loss function of face recognition network needs to minimize the
intra-class distance while expanding the inter-class distance. So far, one of our
mainstream loss function optimization methods is to add penalty terms, such as
orthogonal loss, to further constrain the original loss function. The other is to
optimize using the loss based on angular/cosine margin. The last is Triplet loss
and a new type of joint optimization based on HST Loss and ACT Loss. In this
paper, based… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 1-10, 2019, DOI:10.32604/jihpp.2019.06043
Abstract Internet of Things (IoT) is an emerging paradigm involving intelligent sensor networks that incorporates embedded technology for collecting data, communicating with external environments. Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities. It is a promising technology that utilizes cloud or fog computing / architecture to improve sensor computing, storage, and communication capabilities. However, recently it has been shown that this computing/architecture may be vulnerable to various attacks because of the openness nature of the wireless network. Therefore, it becomes more and more important to… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 69-75, 2019, DOI:10.32604/jihpp.2019.06357
Abstract Relation extraction is an important task in NLP community. However, some models often fail in capturing Long-distance dependence on semantics, and the interaction between semantics of two entities is ignored. In this paper, we propose a novel neural network model for semantic relation classification called joint self-attention bi-LSTM (SA-Bi-LSTM) to model the internal structure of the sentence to obtain the importance of each word of the sentence without relying on additional information, and capture Long-distance dependence on semantics. We conduct experiments using the SemEval-2010 Task 8 dataset. Extensive experiments and the results demonstrated that the proposed method is effective against… More >
Open Access
REVIEW
Journal of Information Hiding and Privacy Protection, Vol.2, No.2, pp. 87-94, 2020, DOI:10.32604/jihpp.2020.09839
Abstract In recent years, with the rapid growth of generative adversarial
networks (GANs), a photo-realistic face can be easily generated from a random
vector. Moreover, the faces generated by advanced GANs are very realistic. It is
reasonable to acknowledge that even a well-trained viewer has difficulties to
distinguish artificial from real faces. Therefore, detecting the face generated by
GANs is a necessary work. This paper mainly introduces some methods to detect
GAN-generated fake faces, and analyzes the advantages and disadvantages of
these models based on the network structure and evaluation indexes, and the
results obtained in the respective data sets. On… More >
Open Access
ARTICLE
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 17-28, 2021, DOI:10.32604/jihpp.2021.017497
Abstract In order to quickly and accurately find the implementer of the network
crime, based on the user portrait technology, a rapid detection method for users
with abnormal behaviorsis proposed. This method needs to construct the abnormal
behavior rule base on various kinds of abnormal behaviors in advance, and
construct the user portrait including basic attribute tags, behavior attribute tags and
abnormal behavior similarity tagsfor network users who have abnormal behaviors.
When a network crime occurs, firstly get the corresponding tag values in all user
portraits according to the category of the network crime. Then, use the Naive
Bayesian method matching… More >