Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (68)
  • Open Access

    ARTICLE

    Heart Rate Detection Based on Facial Video

    Yudan Zhao*, Chaoyu Wang

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 121-130, 2021, DOI:10.32604/jihpp.2021.026380 - 07 February 2022

    Abstract Heart rate is an important data reflecting human vital characteristics and an important reference index to describe human physical and mental state. Currently, widely used heart rate measurement devices require direct contact with a person’s skin, which is not suitable for people with burns, delicate skin, newborns and the elderly. Therefore, the research of non-contact heart rate measurement method is of great significance. Based on the basic principle of Photoplethysmography, we use the camera of computer equipment to capture the face image, detect the face region accurately, and detect multiple faces in the image based More >

  • Open Access

    ARTICLE

    Quantum Steganography Application in the Electrical Network for Quantum Image and Watermark with Self-Adaptive

    Jie Shen1,3,*,#, Wenqi Dong2,#, Jing Wang1,2,3,#, Yang Wang1, Haiyan Li4

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 109-120, 2021, DOI:10.32604/jihpp.2021.025602 - 07 February 2022

    Abstract With the development of Globe Energy Internet, quantum steganography has been used for information hiding to improve copyright protection. Based on secure quantum communication protocol, and flexible steganography, secret information is embedded in quantum images in covert communication. Under the premise of guaranteeing the quality of the quantum image, the secret information is transmitted safely with virtue of good imperceptibility. A novel quantum watermark algorithm is proposed in the paper, based on the shared group key value of the communication parties and the transmission of the selected carrier map pixel gray higher than 8 bits. More >

  • Open Access

    ARTICLE

    Channel Coding Based on Power Line Communication

    Xiaojun Chen*, Yunxiao Zu

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 101-107, 2021, DOI:10.32604/jihpp.2021.025225 - 07 February 2022

    Abstract This paper focuses on the forward error correction (FEC), the basic parameters determination of the RS convolution code, Turbo code and the LDPC code, and the corresponding encoding and decoding algorithm in power line communication (PLC) standard. Simulation experiment which is designed for narrow-band power line communication system based on OFDM is done. The coding using RS convolution code, Turbo code and LDPC code are compared, and further it is determined that which encoding method is more suitable for power line communication in China. More >

  • Open Access

    ARTICLE

    Provenance Method of Electronic Archives Based on Knowledge Graph in Big Data Environment

    Chun Xu1, Jiang Xu1,2,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 91-99, 2021, DOI:10.32604/jihpp.2021.019883 - 30 July 2021

    Abstract With the advent of the era of big data, the Provenance Method of electronic archives based on knowledge graph under the environment of big data has produced a large number of electronic archives due to the development of science and technology. How to guarantee the credential characteristics of electronic archives in the big data environment has attracted wide attention of the academic community. Provenance is an important technical means to guarantee the certification of electronic archives. In this paper, knowledge graph technology is used to provide the concept provenance of electronic archives in large data More >

  • Open Access

    ARTICLE

    Adaptive Multi-Scale HyperNet with Bi-Direction Residual Attention Module for Scene Text Detection

    Junjie Qu, Jin Liu*, Chao Yu

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 83-89, 2021, DOI:10.32604/jihpp.2021.017181 - 30 July 2021

    Abstract Scene text detection is an important step in the scene text reading system. There are still two problems during the existing text detection methods: (1) The small receptive of the convolutional layer in text detection is not sufficiently sensitive to the target area in the image; (2) The deep receptive of the convolutional layer in text detection lose a lot of spatial feature information. Therefore, detecting scene text remains a challenging issue. In this work, we design an effective text detector named Adaptive Multi-Scale HyperNet (AMSHN) to improve texts detection performance. Specifically, AMSHN enhances the More >

  • Open Access

    ARTICLE

    A Reversible Data Hiding Algorithm Based on Secret Sharing

    Xin Jin*, Lanxin Su, Jitao Huang

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 69-82, 2021, DOI:10.32604/jihpp.2021.014108 - 30 July 2021

    Abstract In traditional secret sharing schemes, all shared images containing secret segments are needed to recover secret information. In this paper, a reversible data hiding scheme based on Shamir secret sharing is used. Secret information can be recovered even if only part of the encrypted sharing is owned. This method can reduce the vulnerability of traditional encryption sharing schemes to attack. Before uploading the secret information to the cloud server, embed the encrypted n segments of secret information into n different pictures. The receiver downloads t images from the cloud server (t < n), extracts the More >

  • Open Access

    ARTICLE

    The Design of Intelligent Wastebin Based on AT89S52

    Juan Guo*, Xiaoying Yu

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 61-68, 2021, DOI:10.32604/jihpp.2021.017451 - 30 July 2021

    Abstract Mainly introduces intelligent classification trash can be dedicated to solving indoor household garbage classification. The trash can is based on AT89S52 single-chip microcomputer as the main control chip. The single-chip microcomputer realizes the intelligent classification of garbage by controlling the voice module, mechanical drive module, and infrared detection module. The use of voice control technology and infrared detection technology makes the trash can have voice control and overflow alarm functions. The design has the advantages of simple and intelligent operation, simple structure, stable performance, low investment, etc., which can further effectively isolate people and garbage, More >

  • Open Access

    ARTICLE

    Realization of Mobile Augmented Reality System Based on Image Recognition

    Shanshan Liu1, Yukun Cao1, Lu Gao1, Jian Xu1,2,*, Wu Zeng1,2

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 55-59, 2021, DOI:10.32604/jihpp.2021.017254 - 30 July 2021

    Abstract With the development of computation technology, the augmented reality (AR) is widely applied in many fields as well as the image recognition. However, the AR application on mobile platform is not developed enough in the past decades due to the capability of the mobile processors. In recent years, the performance of mobile processors has changed rapidly, which makes it comparable to the desktop processors. This paper proposed and realized an AR system to be used on the Android mobile platform based on the image recognition through EasyAR engine and Unity 3D development tools. In this More >

  • Open Access

    ARTICLE

    A Broadcast Storm Detection and Treatment Method Based on Situational Awareness

    Zhe Zhu1, Mingjian Zhang2, Yong Liu1, Lan Ma1, Xin Liu1,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 47-54, 2021, DOI:10.32604/jihpp.2021.016690 - 21 April 2021

    Abstract At present, the research of blockchain is very popular, but the practical application of blockchain is very few. The main reason is that the concurrency of blockchain is not enough to support application scenarios. After that, applications such as Intervalue increase the concurrency of blockchain transactions. However, due to the problems of network bandwidth and algorithm performance, there is always a broadcast storm, which affects the normal use of nodes in the whole network. However, the emergence of broadcast storms needs to rely on the node itself, which may be very slow. Even if developers… More >

  • Open Access

    REVIEW

    Survey on the Loss Function of Deep Learning in Face Recognition

    Jun Wang1, Suncheng Feng2,*, Yong Cheng3, Najla Al-Nabhan4

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 29-45, 2021, DOI:10.32604/jihpp.2021.016835 - 21 April 2021

    Abstract With the continuous development of face recognition network, the selection of loss function plays an increasingly important role in improving accuracy. The loss function of face recognition network needs to minimize the intra-class distance while expanding the inter-class distance. So far, one of our mainstream loss function optimization methods is to add penalty terms, such as orthogonal loss, to further constrain the original loss function. The other is to optimize using the loss based on angular/cosine margin. The last is Triplet loss and a new type of joint optimization based on HST Loss and ACT More >

Displaying 21-30 on page 3 of 68. Per Page