Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,157)
  • Open Access

    ARTICLE

    A Novel Time-aware Frame Adjustment Strategy for RFID Anti-collision

    Haipeng Chen1, Kexiong Liu2, Chunyang Ma3, Yu Han4, Jian Su5,*

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 195-204, 2018, DOI:10.32604/cmc.2018.03592

    Abstract Recently, object identification with radio frequency identification (RFID) technology is becoming increasingly popular. Identification time is a key performance metric to evaluate the RFID system. The present paper analyzes the deficiencies of the state-of-the-arts algorithms and proposes a novel sub-frame-based algorithm with adaptive frame breaking policy to lower the tag identification time for EPC global C1 Gen2 UHF RFID standard. Through the observation of slot statistics in a sub-frame, the reader estimates the tag quantity and efficiently calculates an optimal frame size to fit the unread tags. Only when the expected average identification time in the calculated frame size is… More >

  • Open Access

    ARTICLE

    Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial Network

    Chuanlong Li1,2,*, Yumeng Jiang3, Marta Cheslyar1

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 313-324, 2018, DOI: 10.3970/cmc.2018.03950

    Abstract Deep neural network has proven to be very effective in computer vision fields. Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing methods. Generative adversarial network (GAN) is becoming one of the highlights among these deep neural networks. GAN is capable of generating realistic images which are imperceptible to the human vision system so that the generated images can be directly used as intermediate medium for many tasks. One promising application of using GAN generated images would be image concealing which requires the embedded image looks… More >

  • Open Access

    ARTICLE

    A Novel Universal Steganalysis Algorithm Based on the IQM and the SRM

    Yu Yang1,2,*, Yuwei Chen1,2, Yuling Chen2, Wei Bi3,4

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 261-272, 2018, DOI: 10.3970/cmc.2018.02736

    Abstract The state-of-the-art universal steganalysis method, spatial rich model (SRM), and the steganalysis method using image quality metrics (IQM) are both based on image residuals, while they use 34671 and 10 features respectively. This paper proposes a novel steganalysis scheme that combines their advantages in two ways. First, filters used in the IQM are designed according to the models of the SRM owning to their strong abilities for detecting the content adaptive steganographic methods. In addition, a total variant (TV) filter is also used due to its good performance of preserving image edge properties during filtering. Second, due to each type… More >

  • Open Access

    ARTICLE

    Coverless Steganography for Digital Images Based on a Generative Model

    Xintao Duan1,*, Haoxian Song1, Chuan Qin2, Muhammad Khurram Khan3

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 483-493, 2018, DOI: 10.3970/cmc.2018.01798

    Abstract In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the secret image. The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image. Thus, we only need to transmit the meaning-normal image which is not related to the secret image, and we can achieve the same effect as the transmission of the secret image.… More >

  • Open Access

    ARTICLE

    A Spark Scheduling Strategy for Heterogeneous Cluster

    Xuewen Zhang1, Zhonghao Li1, Gongshen Liu1,*, Jiajun Xu1, Tiankai Xie2, Jan Pan Nees1

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 405-417, 2018, DOI: 10.3970/cmc.2018.02527

    Abstract As a main distributed computing system, Spark has been used to solve problems with more and more complex tasks. However, the native scheduling strategy of Spark assumes it works on a homogenized cluster, which is not so effective when it comes to heterogeneous cluster. The aim of this study is looking for a more effective strategy to schedule tasks and adding it to the source code of Spark. After investigating Spark scheduling principles and mechanisms, we developed a stratifying algorithm and a node scheduling algorithm is proposed in this paper to optimize the native scheduling strategy of Spark. In this… More >

  • Open Access

    ARTICLE

    Binary Image Steganalysis Based on Distortion Level Co-Occurrence Matrix

    Junjia Chen1, Wei Lu1,2,*, Yuileong Yeung1, Yingjie Xue1, Xianjin Liu1, Cong Lin1,3, Yue Zhang4

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 201-211, 2018, DOI:10.3970/cmc.2018.01781

    Abstract In recent years, binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information security. In most state-of-the-art binary image steganographic schemes, they always find out the flippable pixels to minimize the embedding distortions. For this reason, the stego images generated by the previous schemes maintain visual quality and it is hard for steganalyzer to capture the embedding trace in spacial domain. However, the distortion maps can be calculated for cover and stego images and the difference between them is significant. In this paper, a novel binary image steganalytic scheme is proposed,… More >

  • Open Access

    ARTICLE

    Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB

    Qili Zhou1, Yongbin Qiu1, Li Li1,*, Jianfeng Lu1, Wenqiang Yuan1, Xiaoqing Feng2, Xiaoyang Mao3

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 151-163, 2018, DOI:10.3970/cmc.2018.055.151

    Abstract Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee security. To solve these problems, steganography using reversible texture synthesis based on seeded region growing and LSB is proposed. Secret information is embedded in the process of synthesizing texture image from the existing natural texture. Firstly, we refine the visual effect. Abnormality of synthetic texture cannot be fully prevented if no approach of controlling visual effect is applied in the process of generating synthetic texture.… More >

  • Open Access

    ARTICLE

    Defining Embedding Distortion for Intra Prediction Mode-Based Video Steganography

    Qiankai Nie1, Xuba Xu1, Bingwen Feng1,*, Leo Yu Zhang2

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 59-70, 2018, DOI:10.3970/cmc.2018.055.059

    Abstract In this paper, an effective intra prediction mode-based video strganography is proposed. Secret messages are embedded during the intra prediction of the video encoding without causing large embedding impact. The influence on the sum of absolute difference (SAD) in intra prediction modes (IPMs) reversion phenomenon is sharp when modifying IPMs. It inspires us to take the SAD prediction deviation (SPD) to define the distortion function. What is more, the mapping rule between IPMs and the codewords is introduced to further reduce the SPD values of each intra block. Syndrome-trellis code (STC) is used as the practical embedding implementation. Experimental results… More >

  • Open Access

    ARTICLE

    A Fusion Steganographic Algorithm Based on Faster R-CNN

    Ruohan Meng1,2, Steven G. Rice3, Jin Wang4, Xingming Sun1,2,*

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 1-16, 2018, DOI:10.3970/cmc.2018.055.001

    Abstract The aim of information hiding is to embed the secret message in a normal cover media such as image, video, voice or text, and then the secret message is transmitted through the transmission of the cover media. The secret message should not be damaged on the process of the cover media. In order to ensure the invisibility of secret message, complex texture objects should be chosen for embedding information. In this paper, an approach which corresponds multiple steganographic algorithms to complex texture objects was presented for hiding secret message. Firstly, complex texture regions are selected based on a kind of… More >

  • Open Access

    ARTICLE

    Solving Fractional Integro-Differential Equations by Using Sumudu Transform Method and Hermite Spectral Collocation Method

    Y. A. Amer1, A. M. S. Mahdy1, 2, *, E. S. M. Youssef1

    CMC-Computers, Materials & Continua, Vol.54, No.2, pp. 161-180, 2018, DOI:10.3970/cmc.2018.054.161

    Abstract In this paper we are looking forward to finding the approximate analytical solutions for fractional integro-differential equations by using Sumudu transform method and Hermite spectral collocation method. The fractional derivatives are described in the Caputo sense. The applications related to Sumudu transform method and Hermite spectral collocation method have been developed for differential equations to the extent of access to approximate analytical solutions of fractional integro-differential equations. More >

Displaying 1121-1130 on page 113 of 1157. Per Page