Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,678)
  • Open Access

    ARTICLE

    Reversible Natural Language Watermarking Using Synonym Substitution and Arithmetic Coding

    Lingyun Xiang1,2, Yan Li2, Wei Hao3,*, Peng Yang4, Xiaobo Shen5

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 541-559, 2018, DOI:10.3970/cmc.2018.03510

    Abstract For protecting the copyright of a text and recovering its original content harmlessly, this paper proposes a novel reversible natural language watermarking method that combines arithmetic coding and synonym substitution operations. By analyzing relative frequencies of synonymous words, synonyms employed for carrying payload are quantized into an unbalanced and redundant binary sequence. The quantized binary sequence is compressed by adaptive binary arithmetic coding losslessly to provide a spare for accommodating additional data. Then, the compressed data appended with the watermark are embedded into the cover text via synonym substitutions in an invertible manner. On the More >

  • Open Access

    ARTICLE

    Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification

    Yang Du1, Zhaoxia Yin1,2,*, Xinpeng Zhang3

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 495-507, 2018, DOI:10.3970/cmc.2018.02440

    Abstract This paper proposes a lossless and high payload data hiding scheme for JPEG images by histogram modification. The most in JPEG bitstream consists of a sequence of VLCs (variable length codes) and the appended bits. Each VLC has a corresponding RLV (run/length value) to record the AC/DC coefficients. To achieve lossless data hiding with high payload, we shift the histogram of VLCs and modify the DHT segment to embed data. Since we sort the histogram of VLCs in descending order, the filesize expansion is limited. The paper’s key contribution includes: Lossless data hiding, less filesize More >

  • Open Access

    ARTICLE

    Robust Image Hashing via Random Gabor Filtering and DWT

    Zhenjun Tang1,*, Man Ling1, Heng Yao1, Zhenxing Qian2, Xianquan Zhang1, Jilian Zhang3, Shijie Xu1

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 331-344, 2018, DOI:10.3970/cmc.2018.02222

    Abstract Image hashing is a useful multimedia technology for many applications, such as image authentication, image retrieval, image copy detection and image forensics. In this paper, we propose a robust image hashing based on random Gabor filtering and discrete wavelet transform (DWT). Specifically, robust and secure image features are first extracted from the normalized image by Gabor filtering and a chaotic map called Skew tent map, and then are compressed via a single-level 2-D DWT. Image hash is finally obtained by concatenating DWT coefficients in the LL sub-band. Many experiments with open image datasets are carried More >

  • Open Access

    ARTICLE

    A Cryptograph Domain Image Retrieval Method Based on Paillier Homomorphic Block Encryption

    Wenjia Xu1, Shijun Xiang1,*, Vasily Sachnev2

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 285-295, 2018, DOI:10.3970/cmc.2018.01719

    Abstract With the rapid development of information network, the computing resources and storage capacity of ordinary users cannot meet their needs of data processing. The emergence of cloud computing solves this problem but brings data security problems. How to manage and retrieve ciphertext data effectively becomes a challenging problem. To these problems, a new image retrieval method in ciphertext domain by block image encrypting based on Paillier homomophic cryptosystem is proposed in this paper. This can be described as follows: According to the Paillier encryption technology, the image owner encrypts the original image in blocks, obtains… More >

  • Open Access

    ARTICLE

    Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual Cryptography

    Yangyang Wang1, Rongrong Ni1,*, Yao Zhao1, Min Xian2

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 255-265, 2018, DOI:10.3970/cmc.2018.01732

    Abstract In this paper, two methods are proposed to embed visual watermark into direct binary search (DBS) halftone images, which are called Adjusted Direct Binary Search (ADBS) and Dual Adjusted Direct Binary Search (DADBS). DADBS is an improved version of ADBS. By using the proposed methods, the visual watermark will be embedded into two halftone images separately, thus, the watermark can be revealed when these two halftone images are overlaid. Experimental results show that both methods can achieve excellent image visual quality and decoded visual patterns. More >

  • Open Access

    ARTICLE

    Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs

    Qi Cui1,2,*, Suzanne McIntosh3, Huiyu Sun3

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 229-241, 2018, DOI:10.3970/cmc.2018.01693

    Abstract Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems. The aim of this work is to use a deep neural network to detect photographic images (PI) versus computer generated graphics (CG). In existing approaches, image feature classification is computationally intensive and fails to achieve real-time analysis. This paper presents an effective approach to automatically identify PI and CG based on deep convolutional neural networks (DCNNs). Compared with some existing methods, the proposed method achieves real-time forensic tasks by deepening More >

  • Open Access

    ARTICLE

    Binary Image Steganalysis Based on Distortion Level Co-Occurrence Matrix

    Junjia Chen1, Wei Lu1,2,*, Yuileong Yeung1, Yingjie Xue1, Xianjin Liu1, Cong Lin1,3, Yue Zhang4

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 201-211, 2018, DOI:10.3970/cmc.2018.01781

    Abstract In recent years, binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information security. In most state-of-the-art binary image steganographic schemes, they always find out the flippable pixels to minimize the embedding distortions. For this reason, the stego images generated by the previous schemes maintain visual quality and it is hard for steganalyzer to capture the embedding trace in spacial domain. However, the distortion maps can be calculated for cover and stego images and the difference between them is significant. In this paper, a novel binary More >

  • Open Access

    ARTICLE

    Early Stage of Oxidation on Titanium Surface by Reactive Molecular Dynamics Simulation

    Liang Yang1,2, Caizhuang Wang3,*, Shiwei Lin2,*, Yang Cao2, Xiaoheng Liu1

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 177-188, 2018, DOI:10.3970/cmc.2018.055.177

    Abstract Understanding of metal oxidation is very critical to corrosion control, catalysis synthesis, and advanced materials engineering. Metal oxidation is a very complex phenomenon, with many different processes which are coupled and involved from the onset of reaction. In this work, the initial stage of oxidation on titanium surface was investigated in atomic scale by molecular dynamics (MD) simulations using a reactive force field (ReaxFF). We show that oxygen transport is the dominant process during the initial oxidation. Our simulation also demonstrate that a compressive stress was generated in the oxide layer which blocked the oxygen More >

  • Open Access

    ARTICLE

    Coverless Information Hiding Based on the Molecular Structure Images of Material

    Yi Cao1,2, Zhili Zhou1,2,3, Xingming Sun1,2, Chongzhi Gao4,*

    CMC-Computers, Materials & Continua, Vol.54, No.2, pp. 197-207, 2018, DOI:10.3970/cmc.2018.054.197

    Abstract The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm. To address this problem, the concept of coverless information hiding was proposed. Coverless information hiding can effectively resist steganalysis algorithm, since it uses unmodified natural stego-carriers to represent and convey confidential information. However, the state-of-the-arts method has a low hidden capacity, which makes it less appealing. Because the pixel values of different regions of the molecular structure images of… More >

  • Open Access

    ARTICLE

    Seepage-Stress-Damage Coupled Model of Coal Under Geo-Stress Influence

    Yi Xue1,2,3, Faning Dang2, Rongjian Li2, Liuming Fan2, Qin Hao4, Lin Mu2, Yuanyuan Xia2

    CMC-Computers, Materials & Continua, Vol.54, No.1, pp. 43-59, 2018, DOI:10.3970/cmc.2018.054.043

    Abstract In the seepage-stress-damage coupled process, the mechanical properties and seepage characteristics of coal are distinctly different between pre-peak stage and post-peak stage. This difference is mainly caused by damage of coal. Therefore, in the process of seepage and stress analysis of coal under the influence of excavation or mining, we need to consider the weakening of mechanical properties and the development of fractures of damaged coal. Based on this understanding, this paper analyzes the influence of damage on mechanics and seepage behavior of coal. A coupled model is established to analyze the seepage-stress-damage coupled process More >

Displaying 3241-3250 on page 325 of 3678. Per Page