Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (441)
  • Open Access

    ARTICLE

    Anti-JPEG Compression Steganography Based on the High Tense Region Locating Method

    Yang Wu1, Weiping Shang2,*, Jiahao Chen3

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 199-214, 2019, DOI:10.32604/cmc.2019.05194

    Abstract Robust data hiding techniques attempt to construct covert communication in a lossy public channel. Nowadays, the existing robust JPEG steganographic algorithms cannot overcome the side-information missing situation. Thus, this paper proposes a new robust JPEG steganographic algorithm based on the high tense region location method which needs no side-information of lossy channel. First, a tense region locating method is proposed based on the Harris-Laplacian feature point. Then, robust cover object generating processes are described. Last, the advanced embedding cost function is proposed. A series of experiments are conducted on various JPEG image sets and the results show that the proposed… More >

  • Open Access

    ARTICLE

    An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection

    Yue Zhang1, Dengpan Ye2, Junjun Gan1, Zhenyu Li3, Qingfeng Cheng1,*

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 151-167, 2018, DOI: 10.3970/cmc.2018.02464

    Abstract In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method, this paper proposes an image steganography algorithm based on quantization index modulation resisting both scaling attacks and statistical detection. For the spatial image, this paper uses the watermarking algorithm based on quantization index modulation to extract the embedded domain. Then construct the embedding distortion function of the new embedded domain based on S-UNIWARD steganography, and use the minimum distortion coding to realize the embedding of the secret messages.… More >

  • Open Access

    ARTICLE

    A Novel Quantum Stegonagraphy Based on Brown States

    Zhiguo Qu1,*, Tiancheng Zhu2, Jinwei Wang1, Xiaojun Wang3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 47-59, 2018, DOI: 10.3970/cmc.2018.02215

    Abstract In this paper, a novel quantum steganography protocol based on Brown entangled states is proposed. The new protocol adopts the CNOT operation to achieve the transmission of secret information by the best use of the characteristics of entangled states. Comparing with the previous quantum steganography algorithms, the new protocol focuses on its anti-noise capability for the phase-flip noise, which proved its good security resisting on quantum noise. Furthermore, the covert communication of secret information in the quantum secure direct communication channel would not affect the normal information transmission process due to the new protocol’s good imperceptibility. If the number of… More >

  • Open Access

    ARTICLE

    On Hiding Secret Information in Medium Frequency DCT Components Using Least Significant Bits Steganography

    Sahib Khan1,*, M A Irfan1, Arslan Arif1, Syed Tahir Hussain Rizvi2, Asma Gul3, Muhammad Naeem4, Nasir Ahmad5

    CMES-Computer Modeling in Engineering & Sciences, Vol.118, No.3, pp. 529-546, 2019, DOI:10.31614/cmes.2019.06179

    Abstract This work presents a new method of data hiding in digital images, in discrete cosine transform domain. The proposed method uses the least significant bits of the medium frequency components of the cover image for hiding the secret information, while the low and high frequency coefficients are kept unaltered. The unaltered low frequency DCT coefficients preserves the quality of the smooth region of the cover image, while no changes in the high DCT coefficient preserve the quality of the edges. As the medium frequency components have less contribution towards energy and image details, so the modification of these coefficients for… More >

  • Open Access

    ARTICLE

    Data Mining and Machine Learning Methods Applied to 3 A Numerical Clinching Model

    Marco Götz1,*, Ferenc Leichsenring1, Thomas Kropp2, Peter Müller2, Tobias Falk2, Wolfgang Graf1, Michael Kaliske1, Welf-Guntram Drossel2

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.3, pp. 387-423, 2018, DOI:10.31614/cmes.2018.04112

    Abstract Numerical mechanical models used for design of structures and processes are very complex and high-dimensionally parametrised. The understanding of the model characteristics is of interest for engineering tasks and subsequently for an efficient design. Multiple analysis methods are known and available to gain insight into existing models. In this contribution, selected methods from various fields are applied to a real world mechanical engineering example of a currently developed clinching process. The selection of introduced methods comprises techniques of machine learning and data mining, in which the utilization is aiming at a decreased numerical effort. The methods of choice are basically… More >

  • Open Access

    ARTICLE

    A Survey of Image Information Hiding Algorithms Based on Deep Learning

    Ruohan Meng1,2,*, Qi Cui1,2, Chengsheng Yuan1,2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.3, pp. 425-454, 2018, DOI:10.31614/cmes.2018.04765

    Abstract With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed. Image information hiding is to make use of the redundancy of the cover image to hide secret information in it. Ensuring that the stego image cannot be distinguished from the cover image, and sending secret information to receiver through the transmission of the stego image. At present, the model based on deep learning is also widely applied to the field of information hiding. This… More >

  • Open Access

    ARTICLE

    A Numerical Study of Passive Receptor-Mediated Endocytosis of Nanoparticles: The Effect of Mechanical Properties

    Xinyue Liu1, Yunqiao Liu1, Xiaobo Gong1,*, Huaxiong Huang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.116, No.2, pp. 281-300, 2018, DOI: 10.31614/cmes.2018.04989

    Abstract In this work, a three-dimensional axisymmetric model with nanoparticle, receptor-ligand bonds and cell membrane as a system was used to study the quasi-static receptor-mediated endocytosis process of spherical nanoparticles in drug delivery. The minimization of the system energy function was carried out numerically, and the deformations of nanoparticle, receptor-ligand bonds and cell membrane were predicted. Results show that passive endocytosis may fail due to the rupture of receptor-ligand bonds during the wrapping process, and the size and rigidity of nanoparticles affect the total deformation energy and the terminal wrapping stage. Our results suggest that, in addition to the energy requirement,… More >

  • Open Access

    ARTICLE

    Loose Gangues Backfill Body’s Acoustic Emissions Rules During Compaction Test: Based on Solid Backfill Mining

    Junmeng Li1, Yanli Huang1, Wenyue Qi1, Guoqiang Kong1, Tianqi Song1

    CMES-Computer Modeling in Engineering & Sciences, Vol.115, No.1, pp. 85-103, 2018, DOI:10.3970/cmes.2018.115.085

    Abstract In fully mechanized solid backfilling mining (FMSBM), the loose gangues backfill body (LGBB) that filled into the goaf becomes the main body of bearing the overburden load. The deformation resistance of LGBB is critical for controlling overburden movement and surface subsidence. During the process of load bearing, LGBB will experience grain crushing, which has a significant effect on its deformation resistance. Gangues block will be accompanied with obvious acoustic emissions (AE) features in process of slipping, flipping and damaging. Under confined compression test, monitoring the AE parameters of LGBB can reveal the impact mechanism of grain crushing on LGBB deformation.… More >

  • Open Access

    ARTICLE

    On Solving Linear and Nonlinear Sixth-Order Two Point Boundary Value Problems Via an Elegant Harmonic Numbers Operational Matrix of Derivatives

    W.M. Abd- Elhameed1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.101, No.3, pp. 159-185, 2014, DOI:10.3970/cmes.2014.101.159

    Abstract This paper is concerned with developing two new algorithms for direct solutions of linear and nonlinear sixth-order two point boundary value problems. These algorithms are based on the application of the two spectral methods namely, collocation and Petrov-Galerkin methods. The suggested algorithms are completely new and they depend on introducing a novel operational matrix of derivatives which is expressed in terms of the well-known harmonic numbers. The basic idea for the suggested algorithms rely on reducing the linear or nonlinear sixth-order boundary value problem governed by its boundary conditions to a system of linear or nonlinear algebraic equations which can… More >

  • Open Access

    ARTICLE

    Application of Self-Organizing Feature Map Neural Network Based on K-means Clustering in Network Intrusion Detection

    Ling Tan1,*, Chong Li2, Jingming Xia2, Jun Cao3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 275-288, 2019, DOI:10.32604/cmc.2019.03735

    Abstract Due to the widespread use of the Internet, customer information is vulnerable to computer systems attack, which brings urgent need for the intrusion detection technology. Recently, network intrusion detection has been one of the most important technologies in network security detection. The accuracy of network intrusion detection has reached higher accuracy so far. However, these methods have very low efficiency in network intrusion detection, even the most popular SOM neural network method. In this paper, an efficient and fast network intrusion detection method was proposed. Firstly, the fundamental of the two different methods are introduced respectively. Then, the self-organizing feature… More >

Displaying 421-430 on page 43 of 441. Per Page