Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21)
  • Open Access


    High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification

    Li Liu1, Jing Li1, Yingchun Wu1, Chin-Chen Chang2,*, Anhong Wang1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1415-1432, 2023, DOI:10.32604/csse.2023.040039

    Abstract Data hiding (DH) is an important technology for securely transmitting secret data in networks, and has increasing become a research hotspot throughout the world. However, for Joint photographic experts group (JPEG) images, it is difficult to balance the contradiction among embedded capacity, visual quality and the file size increment in existing data hiding schemes. Thus, to deal with this problem, a high-imperceptibility data hiding for JPEG images is proposed based on direction modification. First, this proposed scheme sorts all of the quantized discrete cosine transform (DCT) block in ascending order according to the number of non-consecutive-zero alternating current (AC) coefficients.… More >

  • Open Access


    A Deep Learning Driven Feature Based Steganalysis Approach

    Yuchen Li1, Baohong Ling1,2,*, Donghui Hu1, Shuli Zheng1, Guoan Zhang3

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2213-2225, 2023, DOI:10.32604/iasc.2023.029983

    Abstract The goal of steganalysis is to detect whether the cover carries the secret information which is embedded by steganographic algorithms. The traditional steganalysis detector is trained on the stego images created by a certain type of steganographic algorithm, whose detection performance drops rapidly when it is applied to detect another type of steganographic algorithm. This phenomenon is called as steganographic algorithm mismatch in steganalysis. To resolve this problem, we propose a deep learning driven feature-based approach. An advanced steganalysis neural network is used to extract steganographic features, different pairs of training images embedded with steganographic algorithms can obtain diverse features… More >

  • Open Access


    Effect of PEG Incorporation on Physicochemical and in vitro Degradation of PLLA/PDLLA Blends: Application in Biodegradable Implants

    Mochamad Chalid1,*, Gifrandy Gustiraharjo1, Azizah Intan Pangesty1, Alyssa Adyandra1, Yudan Whulanza2, Sugeng Supriadi2

    Journal of Renewable Materials, Vol.11, No.7, pp. 3043-3056, 2023, DOI:10.32604/jrm.2023.026788

    Abstract Polyethylene glycol (PEG) was added at different concentrations to the blend of poly(L-lactic acid) (PLLA) and poly(D,L-lactic acid)(PDLLA) to tailor the properties. The differential scanning calorimetry (DSC) measurement showed that all blends were miscible due to shifting a single glass transition temperature into a lower temperature for increasing PEG content. The DSC, FTIR, and XRD results implied the crystallinity enhancement for PEG content until 8 wt%, then decreased at 12 wt% PEG. The XRD result indicated the homo crystalline phase formation in all blends and no stereocomplex crystal. The in vitro degradation study indicated that PEG content is proportional to… More > Graphic Abstract

    Effect of PEG Incorporation on Physicochemical and <i>in vitro</i> Degradation of PLLA/PDLLA Blends: Application in Biodegradable Implants

  • Open Access


    An Overview of Double JPEG Compression Detection and Anti-detection

    Kun Wan*

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 89-101, 2022, DOI:10.32604/jihpp.2022.039764

    Abstract JPEG (Joint Image Experts Group) is currently the most widely used image format on the Internet. Existing cases show that many tampering operations occur on JPEG images. The basic process of the operation is that the JPEG file is first decompressed, modified in the null field, and then the tampered image is compressed and saved in JPEG format, so that the tampered image may be compressed several times. Therefore, the double compression detection of JPEG images can be an important part for determining whether an image has been tampered with, and the study of double JPEG compression anti-detection can further… More >

  • Open Access


    Influence of High-Robustness Polycarboxylate Superplasticizer on the Performances of Concrete Incorporating Fly Ash and Manufactured Sand

    Panpan Cao1,2, Xiulin Huang1,3,*, Shenxu Bao4, Jin Yang5,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.8, pp. 2041-2051, 2023, DOI:10.32604/fdmp.2023.027399

    Abstract Using ethylene glycol monovinyl polyoxyethylene ether, 2-acrylamido-2-methylpropane sulfonic acid (AMPS) and acrylic acid as the main synthetic monomers, a high robustness polycarboxylate superplasticizer was prepared. The effects of initial temperature, ratio of acid to ether, amount of chain transfer agent, and synthesis process on the properties of the superplasticizer were studied. The molecular structure was characterized by GPC (Gel Permeation Chromatography) and IR (Infrared Spectrometer). As shown by the results, when the initial reaction temperature is 15°C, the ratio of acid to ether is 3.4:1 and the acrylic acid pre-neutralization is 15%, The AMPS substitution is 10%, the amount of… More > Graphic Abstract

    Influence of High-Robustness Polycarboxylate Superplasticizer on the Performances of Concrete Incorporating Fly Ash and Manufactured Sand

  • Open Access


    Detecting Double JPEG Compressed Color Images via an Improved Approach

    Xiaojie Zhao1, Xiankui Meng1, Ruyong Ren2, Shaozhang Niu2,*, Zhenguang Gao3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1765-1781, 2023, DOI:10.32604/cmc.2023.029552

    Abstract Detecting double Joint Photographic Experts Group (JPEG) compression for color images is vital in the field of image forensics. In previous researches, there have been various approaches to detecting double JPEG compression with different quantization matrices. However, the detection of double JPEG color images with the same quantization matrix is still a challenging task. An effective detection approach to extract features is proposed in this paper by combining traditional analysis with Convolutional Neural Networks (CNN). On the one hand, the number of nonzero pixels and the sum of pixel values of color space conversion error are provided with 12-dimensional features… More >

  • Open Access


    FSpot: Fast and Efficient Video Encoding Workloads Over Amazon Spot Instances

    Anatoliy Zabrovskiy1,3, Prateek Agrawal1,2,*, Vladislav Kashansky1, Roland Kersche4, Christian Timmerer1,4, Radu Prodan1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5677-5697, 2022, DOI:10.32604/cmc.2022.023630

    Abstract HTTP Adaptive Streaming (HAS) of video content is becoming an undivided part of the Internet and accounts for most of today's network traffic. Video compression technology plays a vital role in efficiently utilizing network channels, but encoding videos into multiple representations with selected encoding parameters is a significant challenge. However, video encoding is a computationally intensive and time-consuming operation that requires high-performance resources provided by on-premise infrastructures or public clouds. In turn, the public clouds, such as Amazon elastic compute cloud (EC2), provide hundreds of computing instances optimized for different purposes and clients’ budgets. Thus, there is a need for… More >

  • Open Access


    Changes in Germination and Seedling Traits of Sesame under Simulated Drought

    Mukhtar Ahmed1,*, Ahmed M. S. Kheir2,3, Muhammad Zeeshan Mehmood1, Shakeel Ahmad4, Mirza Hasanuzzaman5,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.4, pp. 713-726, 2022, DOI:10.32604/phyton.2022.018552

    Abstract Drought is considered one of the leading abiotic constraints to agricultural crop production globally. Present study was conducted to assess the effects of different drought treatments (viz. Control, 10% PEG, and 20% PEG) on seed germination, germination indices, seedling traits, and drought tolerance indices of sesame. Our results showed that maximum reduction in the studied parameters was observed at higher PEG concentration (i.e., 20% PEG). As compared to control, the drought treatments viz. 10% and 20% PEG decreased the values for germination indices, such as germination percentage, coefficient of variation of germination time, germination index, and seedling vigor index. Similarly,… More >

  • Open Access


    Analytic Beta-Wavelet Transform-Based Digital Image Watermarking for Secure Transmission

    Hesham Alhumyani1,*, Ibrahim Alrube1, Sameer Alsharif1, Ashraf Afifi1, Chokri Ben Amar1, Hala S. El-Sayed2, Osama S. Faragallah3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4657-4673, 2022, DOI:10.32604/cmc.2022.020338

    Abstract The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data. This article introduces a self-embedded image verification and integrity scheme. The images are firstly split into dedicated segments of the same block sizes. Then, different Analytic Beta-Wavelet (ABW) orthogonal filters are utilized for embedding a self-segment watermark for image segment using a predefined method. ABW orthogonal filter coefficients are estimated to improve image reconstruction under different block sizes. We conduct a comparative study comparing the watermarked images using three kinds of ABW filters for block sizes… More >

  • Open Access


    CNN-Based Forensic Method on Contrast Enhancement with JPEG Post-Processing

    Ziqing Yan1,2, Pengpeng Yang1,2, Rongrong Ni1,2,*, Yao Zhao1,2, Hairong Qi3

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3205-3216, 2021, DOI:10.32604/cmc.2021.020324

    Abstract As one of the most popular digital image manipulations, contrast enhancement (CE) is frequently applied to improve the visual quality of the forged images and conceal traces of forgery, therefore it can provide evidence of tampering when verifying the authenticity of digital images. Contrast enhancement forensics techniques have always drawn significant attention for image forensics community, although most approaches have obtained effective detection results, existing CE forensic methods exhibit poor performance when detecting enhanced images stored in the JPEG format. The detection of forgery on contrast adjustments in the presence of JPEG post processing is still a challenging task. In… More >

Displaying 1-10 on page 1 of 21. Per Page