Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (65)
  • Open Access

    ARTICLE

    SPN-Based Performance Analysis of Multiple Users’ Behaviors for SNS

    Zhiguo Hong1,*, Yongbin Wang2,3, Minyong Shi4

    Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 1-13, 2022, DOI:10.32604/jihpp.2022.026440

    Abstract With the rapid development of various applications of Information Technology, big data are increasingly generated by social network services (SNS) nowadays. The designers and providers of SNS distribute different client applications for PC, Mobile phone, IPTV etc., so that users can obtain related service via mobile or traditional Internet. Good scalability and considerably short time delay are important indices for evaluating social network systems. As a result, investigating and mining the principle of users’ behaviors is an important issue which can guide service providers to establish optimal systems with SNS. On the basis of analyzing the characteristics of social network… More >

  • Open Access

    ARTICLE

    A Performance Study of Membership Inference Attacks on Different Machine Learning Algorithms

    Jumana Alsubhi1, Abdulrahman Gharawi1, Mohammad Alahmadi2,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 193-200, 2021, DOI:10.32604/jihpp.2021.027871

    Abstract Nowadays, machine learning (ML) algorithms cannot succeed without the availability of an enormous amount of training data. The data could contain sensitive information, which needs to be protected. Membership inference attacks attempt to find out whether a target data point is used to train a certain ML model, which results in security and privacy implications. The leakage of membership information can vary from one machine-learning algorithm to another. In this paper, we conduct an empirical study to explore the performance of membership inference attacks against three different machine learning algorithms, namely, K-nearest neighbors, random forest, support vector machine, and logistic… More >

  • Open Access

    ARTICLE

    An Explanatory Strategy for Reducing the Risk of Privacy Leaks

    Mingting Liu1, Xiaozhang Liu1,*, Anli Yan1, Xiulai Li1,2, Gengquan Xie1, Xin Tang3

    Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 181-192, 2021, DOI:10.32604/jihpp.2021.027385

    Abstract As machine learning moves into high-risk and sensitive applications such as medical care, autonomous driving, and financial planning, how to interpret the predictions of the black-box model becomes the key to whether people can trust machine learning decisions. Interpretability relies on providing users with additional information or explanations to improve model transparency and help users understand model decisions. However, these information inevitably leads to the dataset or model into the risk of privacy leaks. We propose a strategy to reduce model privacy leakage for instance interpretability techniques. The following is the specific operation process. Firstly, the user inputs data into… More >

  • Open Access

    ARTICLE

    A Survey on Binary Code Vulnerability Mining Technology

    Pengzhi Xu1,2, Zetian Mai1,2, Yuhao Lin1, Zhen Guo1,2,*, Victor S. Sheng3

    Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 165-179, 2021, DOI:10.32604/jihpp.2021.027280

    Abstract With the increase of software complexity, the security threats faced by the software are also increasing day by day. So people pay more and more attention to the mining of software vulnerabilities. Although source code has rich semantics and strong comprehensibility, source code vulnerability mining has been widely used and has achieved significant development. However, due to the protection of commercial interests and intellectual property rights, it is difficult to obtain source code. Therefore, the research on the vulnerability mining technology of binary code has strong practical value. Based on the investigation of related technologies, this article firstly introduces the… More >

  • Open Access

    ARTICLE

    Verifiable Privacy-Preserving Neural Network on Encrypted Data

    Yichuan Liu1, Chungen Xu1,*, Lei Xu1, Lin Mei1, Xing Zhang2, Cong Zuo3

    Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 151-164, 2021, DOI:10.32604/jihpp.2021.026944

    Abstract The widespread acceptance of machine learning, particularly of neural networks leads to great success in many areas, such as recommender systems, medical predictions, and recognition. It is becoming possible for any individual with a personal electronic device and Internet access to complete complex machine learning tasks using cloud servers. However, it must be taken into consideration that the data from clients may be exposed to cloud servers. Recent work to preserve data confidentiality has allowed for the outsourcing of services using homomorphic encryption schemes. But these architectures are based on honest but curious cloud servers, which are unable to tell… More >

  • Open Access

    ARTICLE

    Pixel Based Steganography for Secure Information Hiding

    N. Shyla*, K. Kalimuthu

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 143-149, 2021, DOI:10.32604/jihpp.2021.026760

    Abstract The term “steganography” is derived from the Greek words steganos, which means “verified, concealed, or guaranteed”, and graphein, which means “writing”. The primary motivation for considering steganography is to prevent unapproved individuals from obtaining disguised data. With the ultimate goal of comprehending the fundamental inspiration driving the steganography procedures, there should be no significant change in the example report. The Least Significant Bit (LSB) system, which is one of the methodologies for concealing propelled picture data, is examined in this assessment. In this evaluation, another procedure for data stowing indefinitely is proposed with the ultimate goal of limiting the progressions… More >

  • Open Access

    ARTICLE

    A Image Copyright Protection Method Using Zero-Watermark by Blockchain and IPFS

    Tao Chen1, Zhao Qiu1,*, Gengquan Xie1, Lin Yuan1, Shaohua Duan1, Hao Guo1, Dahao Fu1, Hancheng Huang2

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 131-142, 2021, DOI:10.32604/jihpp.2021.026606

    Abstract Behind the popularity of multimedia technology, the dispute over image copyright is getting worse. In the digital watermark prevention technology for copyright infringement, watermark technology is considered to be an important technology to overcome data protection problems and verify the relationship between data ownership. Among the many digital watermarking technologies, zero watermarking technology has been favored in recent years. However, the existing zero watermark technology in the implementation process often needs a trusted third party to store watermarks, which may make the data too central, data storage security is low and copyright registration costs are too high, which creates a… More >

  • Open Access

    ARTICLE

    Heart Rate Detection Based on Facial Video

    Yudan Zhao*, Chaoyu Wang

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 121-130, 2021, DOI:10.32604/jihpp.2021.026380

    Abstract Heart rate is an important data reflecting human vital characteristics and an important reference index to describe human physical and mental state. Currently, widely used heart rate measurement devices require direct contact with a person’s skin, which is not suitable for people with burns, delicate skin, newborns and the elderly. Therefore, the research of non-contact heart rate measurement method is of great significance. Based on the basic principle of Photoplethysmography, we use the camera of computer equipment to capture the face image, detect the face region accurately, and detect multiple faces in the image based on multi-target tracking algorithm. Then… More >

  • Open Access

    ARTICLE

    Quantum Steganography Application in the Electrical Network for Quantum Image and Watermark with Self-Adaptive

    Jie Shen1,3,*,#, Wenqi Dong2,#, Jing Wang1,2,3,#, Yang Wang1, Haiyan Li4

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 109-120, 2021, DOI:10.32604/jihpp.2021.025602

    Abstract With the development of Globe Energy Internet, quantum steganography has been used for information hiding to improve copyright protection. Based on secure quantum communication protocol, and flexible steganography, secret information is embedded in quantum images in covert communication. Under the premise of guaranteeing the quality of the quantum image, the secret information is transmitted safely with virtue of good imperceptibility. A novel quantum watermark algorithm is proposed in the paper, based on the shared group key value of the communication parties and the transmission of the selected carrier map pixel gray higher than 8 bits. According to the shared group… More >

  • Open Access

    ARTICLE

    Channel Coding Based on Power Line Communication

    Xiaojun Chen*, Yunxiao Zu

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 101-107, 2021, DOI:10.32604/jihpp.2021.025225

    Abstract This paper focuses on the forward error correction (FEC), the basic parameters determination of the RS convolution code, Turbo code and the LDPC code, and the corresponding encoding and decoding algorithm in power line communication (PLC) standard. Simulation experiment which is designed for narrow-band power line communication system based on OFDM is done. The coding using RS convolution code, Turbo code and LDPC code are compared, and further it is determined that which encoding method is more suitable for power line communication in China. More >

Displaying 11-20 on page 2 of 65. Per Page