The situation of intercepted alien pests from imported hides in Hebei during 2013-2014 was systematically analyzed. The results showed that 163 batches of alien pests were intercepted, including 2 batches of quarantin...The situation of intercepted alien pests from imported hides in Hebei during 2013-2014 was systematically analyzed. The results showed that 163 batches of alien pests were intercepted, including 2 batches of quarantine weeds and they both were Italian cocklebur. According to the statistics of original countries, the intercepted hides from 21 countries all had alien pests, in which Australia was the largest number of batches and species of alien pests. The analysis results showed that there was severe risk in the imported hides carrying alien pests, thus to effectively prevent the invasion of alien pests to our country, several quarantine measures should be taken in the future, such as enhancing the quarantine inspection in ports, and promoting the personnel ability of interception and species identification of alien pests.展开更多
A category of chromium (Cr)-containing fertilizers is represented by the fertilizers deriving from byproducts of tanning process. Their use is widespread because of their good agronomic response due to the high conten...A category of chromium (Cr)-containing fertilizers is represented by the fertilizers deriving from byproducts of tanning process. Their use is widespread because of their good agronomic response due to the high content of slow release or- ganic nitrogen (N) and carbon (C). They do not represent an environmental hazard because only the non-toxic form of Cr(III) is present. Productive processes may involve chemical, enzymatic or thermal hydrolysis. The final product is characterized by different contents of peptides and free amino acids depending on the type of hydrolysis. Legislation concerning Cr-containing fertilizers is controversial because often do not consider any scientific evidences;nevertheless, the European Union, the United States and countries as Italy, do not set the restriction to Cr(III) and generally only the presence of the toxic form, Cr(VI), is limited. Depending on its two main oxidation forms, Cr issue has been studied for many years. Several authors confirmed that Cr(VI) is carcinogenic, while Cr(III) is an essential trace element in human and animal diet. In soil Cr(III) has low mobility, whereas Cr(VI) is highly water soluble. However Cr(VI) in soil is quickly reduced to Cr(III);on the contrary oxidation of Cr(III) to Cr(VI) is rarely possible because particular conditions must occur. Only a very small fraction of Cr in soil is available to plant uptake and its translocation in edible parts is limited because it is immobilized in roots as Cr(III). Therefore risks of environmental pollution using these fertilizers are negligible;on the contrary they have positive environmental and agronomical effects. The aim of this review is to deal with the category of the organic fertilizers containing Cr derived from tannery processes focusing on its chemical, productive, legislative, environmental and agronomical aspects. Special attention is given to the ambiguous issue of Cr briefly summarizing the most important studies of the last forty years.展开更多
Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi...Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi-stego images provides good image quality but often results in low embedding capability.To address these challenges,this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image.The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order.Four secret bits are embedded into each block’s maximum pixel value,while three additional bits are embedded into the second-largest value when the pixel difference exceeds a predefined threshold.A similar embedding strategy is also applied to the minimum side of the block,including the second-smallest pixel value.This design enables each block to embed up to 14 bits of secret data.Experimental results demonstrate that the proposed method achieves significantly higher embedding capacity and improved visual quality compared to existing triple-stego RDH approaches,advancing the field of reversible steganography.展开更多
Data hiding methods involve embedding secret messages into cover objects to enable covert communication in a way that is difficult to detect.In data hiding methods based on image interpolation,the image size is reduce...Data hiding methods involve embedding secret messages into cover objects to enable covert communication in a way that is difficult to detect.In data hiding methods based on image interpolation,the image size is reduced and then enlarged through interpolation,followed by the embedding of secret data into the newly generated pixels.A general improving approach for embedding secret messages is proposed.The approach may be regarded a general model for enhancing the data embedding capacity of various existing image interpolation-based data hiding methods.This enhancement is achieved by expanding the range of pixel values available for embedding secret messages,removing the limitations of many existing methods,where the range is restricted to powers of two to facilitate the direct embedding of bit-based messages.This improvement is accomplished through the application of multiple-based number conversion to the secret message data.The method converts the message bits into a multiple-based number and uses an algorithm to embed each digit of this number into an individual pixel,thereby enhancing the message embedding efficiency,as proved by a theorem derived in this study.The proposed improvement method has been tested through experiments on three well-known image interpolation-based data hiding methods.The results show that the proposed method can enhance the three data embedding rates by approximately 14%,13%,and 10%,respectively,create stego-images with good quality,and resist RS steganalysis attacks.These experimental results indicate that the use of the multiple-based number conversion technique to improve the three interpolation-based methods for embedding secret messages increases the number of message bits embedded in the images.For many image interpolation-based data hiding methods,which use power-of-two pixel-value ranges for message embedding,other than the three tested ones,the proposed improvement method is also expected to be effective for enhancing their data embedding capabilities.展开更多
Generative image steganography is a technique that directly generates stego images from secret infor-mation.Unlike traditional methods,it theoretically resists steganalysis because there is no cover image.Currently,th...Generative image steganography is a technique that directly generates stego images from secret infor-mation.Unlike traditional methods,it theoretically resists steganalysis because there is no cover image.Currently,the existing generative image steganography methods generally have good steganography performance,but there is still potential room for enhancing both the quality of stego images and the accuracy of secret information extraction.Therefore,this paper proposes a generative image steganography algorithm based on attribute feature transformation and invertible mapping rule.Firstly,the reference image is disentangled by a content and an attribute encoder to obtain content features and attribute features,respectively.Then,a mean mapping rule is introduced to map the binary secret information into a noise vector,conforming to the distribution of attribute features.This noise vector is input into the generator to produce the attribute transformed stego image with the content feature of the reference image.Additionally,we design an adversarial loss,a reconstruction loss,and an image diversity loss to train the proposed model.Experimental results demonstrate that the stego images generated by the proposed method are of high quality,with an average extraction accuracy of 99.4%for the hidden information.Furthermore,since the stego image has a uniform distribution similar to the attribute-transformed image without secret information,it effectively resists both subjective and objective steganalysis.展开更多
One sunny day,a little dog with the name Max met a little cat named Lily in the backyard.Max:Hi,Lily!I'm looking for something interesting to do.Do you want to play with me?Lily:Sure,Max!But how 1 can we play?Max:...One sunny day,a little dog with the name Max met a little cat named Lily in the backyard.Max:Hi,Lily!I'm looking for something interesting to do.Do you want to play with me?Lily:Sure,Max!But how 1 can we play?Max:How about hide-and-seek?Lily:Sound②great!You count first,and I'll go hide.展开更多
Establish an efficacy evaluation method for foundation products in vivo and vitro.The hiding power,whiteness,waterproof and anti-sweat effect were evaluated in vitro test,where CR ratio,Individual Type Angle (ITA°...Establish an efficacy evaluation method for foundation products in vivo and vitro.The hiding power,whiteness,waterproof and anti-sweat effect were evaluated in vitro test,where CR ratio,Individual Type Angle (ITA°) and chromatic aberration (E) were measured as evaluation indicators by standard black/white cardboard,artificial leather and artificial sweat.In clinical assessment,the anti-stain,waterproof,anti-sweat effect of the foundation products were evaluated through the ΔE change,before and after the treatment of products by staining,wetting,sweating in forearm skin.There were significant differences in CR ratio of different types of samples on standard black and white cardboards (P<0.05),ITA° of artificial leather has a significant increase after treatment (P<0.05),?E﹤1.5 in black cloth after dipping test,while ΔE﹤1.5 in leather after water and artificial sweat treatment.Clinical assessment showed that ?E ﹤50%,which had no significant difference in human skin color,before and after the test (P>0.05).The change trend of efficacy evaluation in vitro test was basically consistent with that of visual evaluation and clinical assessment,indicated that the efficacy evaluation methods of foundation products in vivo and vitro are intuitive,quantifiable,and can be used to evaluate the efficacy of foundation products.展开更多
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schem...Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute content.Additionally,resource-constrained IoT devices,especially those adopting wireless communication,frequently encounter affordability issues regarding decryption costs.In this paper,we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC).FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them.A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access policy.Dictionary attacks are thwarted by providing unauthorized users with invalid values.The heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud servers.Additionally,users can verify the correctness of multiple outsourced decryption results simultaneously.Security analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption.展开更多
With the rapid expansion of multimedia data,protecting digital information has become increasingly critical.Reversible data hiding offers an effective solution by allowing sensitive information to be embedded in multi...With the rapid expansion of multimedia data,protecting digital information has become increasingly critical.Reversible data hiding offers an effective solution by allowing sensitive information to be embedded in multimedia files while enabling full recovery of the original data after extraction.Audio,as a vital medium in communication,entertainment,and information sharing,demands the same level of security as images.However,embedding data in encrypted audio poses unique challenges due to the trade-offs between security,data integrity,and embedding capacity.This paper presents a novel interpolation-based reversible data hiding algorithm for encrypted audio that achieves scalable embedding capacity.By increasing sample density through interpolation,embedding opportunities are significantly enhanced while maintaining encryption throughout the process.The method further integrates multiple most significant bit(multi-MSB)prediction and Huffman coding to optimize compression and embedding efficiency.Experimental results on standard audio datasets demonstrate the proposed algorithm’s ability to embed up to 12.47 bits per sample with over 9.26 bits per sample available for pure embedding capacity,while preserving full reversibility.These results confirm the method’s suitability for secure applications that demand high embedding capacity and perfect reconstruction of original audio.This work advances reversible data hiding in encrypted audio by offering a secure,efficient,and fully reversible data hiding framework.展开更多
In the evolving landscape of secure communication,steganography has become increasingly vital to secure the transmission of secret data through an insecure public network.Several steganographic algorithms have been pr...In the evolving landscape of secure communication,steganography has become increasingly vital to secure the transmission of secret data through an insecure public network.Several steganographic algorithms have been proposed using digital images with a common objective of balancing a trade-off between the payload size and the quality of the stego image.In the existing steganographic works,a remarkable distortion of the stego image persists when the payload size is increased,making several existing works impractical to the current world of vast data.This paper introduces FuzzyStego,a novel approach designed to enhance the stego image’s quality by minimizing the effect of the payload size on the stego image’s quality.In line with the limitations of traditional methods like Pixel Value Differencing(PVD),Transform Domain Techniques,and Least Significant Bit(LSB)insertion,such as image quality degradation,vulnerability to processing attacks,and restricted capacity,FuzzyStego utilizes fuzzy logic to categorize pixels into intensity levels:Low(L),Medium-Low(ML),Medium(M),Medium-High(MH),and High(H).This classification enables adaptive data embedding,minimizing detectability by adjusting the hidden bit count according to the intensity levels.Experimental results show that FuzzyStego achieves an average Peak Signal-to-Noise Ratio(PSNR)of 58.638 decibels(dB)and a Structural Similarity Index Measure(SSIM)of almost 1.00,demonstrating its promising capability to preserve image quality while embedding data effectively.展开更多
This study introduces an Edge-Based Data Hiding and Extraction Algorithm(EBDHEA)to address the problem of data embedding in images while preserving robust security and high image quality.The algorithm produces three c...This study introduces an Edge-Based Data Hiding and Extraction Algorithm(EBDHEA)to address the problem of data embedding in images while preserving robust security and high image quality.The algorithm produces three classes of pixels from the pixels in the cover image:edges found by the Canny edge detection method,pixels arising from the expansion of neighboring edge pixels,and pixels that are neither edges nor components of the neighboring edge pixels.The number of Least Significant Bits(LSBs)that are used to hide data depends on these classifications.Furthermore,the lossless compression method,Huffman coding,improves image data capacity.To increase the security of the steganographic process,secret messages are encrypted using the XOR encryption technique before being embedded.Metrics such as the Mean Squared Error(MSE),Peak Signal-to-Noise Ratio(PSNR),and Structural Similarity Index Measure(SSIM)are used to assess the efficacy of this algorithm and are compared to previous methods.The findings demonstrate that the suggested approach achieves high similarity between the original and modified images with a maximum PSNR of 60.7 dB for a payload of 18,750 bytes,a maximum SSIM of 0.999 for a payload of 314,572.8 bytes,and a maximum Video Information Fidelity(VIF)of 0.95 for a payload of 23,592 bytes.Normalized Cross-Correlation(NCC)values are very close to 1.In addition,the performance of EBDHEA is implemented on Secure Medical Image Transmission as a real-world example,and the performance is tested against three types of attacks:RS Steganalysis,Chi-square attack,and visual attack,and compared with two deep learning models,such as SRNet and XuNet.展开更多
We explored the effects of algorithmic opacity on employees’playing dumb and evasive hiding rather than rationalized hiding.We examined the mediating role of job insecurity and the moderating role of employee-AI coll...We explored the effects of algorithmic opacity on employees’playing dumb and evasive hiding rather than rationalized hiding.We examined the mediating role of job insecurity and the moderating role of employee-AI collaboration.Participants were 421 full-time employees(female=46.32%,junior employees=31.83%)from a variety of organizations and industries that interact with AI.Employees filled out data on algorithm opacity,job insecurity,knowledge hiding,employee-AI collaboration,and control variables.The results of the structural equation modeling indicated that algorithm opacity exacerbated employees’job insecurity,and job insecurity mediated between algorithm opacity and playing dumb and evasive hiding rather than rationalized hiding.The relationship between algorithmic opacity and playing dumb and evasive hiding was more positive when the level of employee-AI collaboration was higher.These findings suggest that employee-AI collaboration reinforces the indirect relationship between algorithmic opacity and playing dumb and evasive hiding.Our study contributes to research on human and AI collaboration by exploring the dark side of employee-AI collaboration.展开更多
Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server i...Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server introduces critical security vulnerabilities:malicious servers can infer private information from received local model updates or deliberately manipulate aggregation results.Consequently,achieving verifiable aggregation without compromising client privacy remains a critical challenge.To address these problem,we propose a reversible data hiding in encrypted domains(RDHED)scheme,which designs joint secret message embedding and extraction mechanism.This approach enables clients to embed secret messages into ciphertext redundancy spaces generated during model encryption.During the server aggregation process,the embedded messages from all clients fuse within the ciphertext space to form a joint embedding message.Subsequently,clients can decrypt the aggregated results and extract this joint embedding message for verification purposes.Building upon this foundation,we integrate the proposed RDHED scheme with linear homomorphic hash and digital signatures to design a verifiable privacy-preserving aggregation protocol for single-server architectures(VPAFL).Theoretical proofs and experimental analyses show that VPAFL can effectively protect user privacy,achieve lightweight computational and communication overhead of users for verification,and present significant advantages with increasing model dimension.展开更多
Medical image segmentation,i.e.,labeling structures of interest in medical images,is crucial for disease diagnosis and treatment in radiology.In reversible data hiding in medical images(RDHMI),segmentation consists of...Medical image segmentation,i.e.,labeling structures of interest in medical images,is crucial for disease diagnosis and treatment in radiology.In reversible data hiding in medical images(RDHMI),segmentation consists of only two regions:the focal and nonfocal regions.The focal region mainly contains information for diagnosis,while the nonfocal region serves as the monochrome background.The current traditional segmentation methods utilized in RDHMI are inaccurate for complex medical images,and manual segmentation is time-consuming,poorly reproducible,and operator-dependent.Implementing state-of-the-art deep learning(DL)models will facilitate key benefits,but the lack of domain-specific labels for existing medical datasets makes it impossible.To address this problem,this study provides labels of existing medical datasets based on a hybrid segmentation approach to facilitate the implementation of DL segmentation models in this domain.First,an initial segmentation based on a 33 kernel is performed to analyze×identified contour pixels before classifying pixels into focal and nonfocal regions.Then,several human expert raters evaluate and classify the generated labels into accurate and inaccurate labels.The inaccurate labels undergo manual segmentation by medical practitioners and are scored based on a hierarchical voting scheme before being assigned to the proposed dataset.To ensure reliability and integrity in the proposed dataset,we evaluate the accurate automated labels with manually segmented labels by medical practitioners using five assessment metrics:dice coefficient,Jaccard index,precision,recall,and accuracy.The experimental results show labels in the proposed dataset are consistent with the subjective judgment of human experts,with an average accuracy score of 94%and dice coefficient scores between 90%-99%.The study further proposes a ResNet-UNet with concatenated spatial and channel squeeze and excitation(scSE)architecture for semantic segmentation to validate and illustrate the usefulness of the proposed dataset.The results demonstrate the superior performance of the proposed architecture in accurately separating the focal and nonfocal regions compared to state-of-the-art architectures.Dataset information is released under the following URL:https://www.kaggle.com/lordamoah/datasets(accessed on 31 March 2025).展开更多
伴随着数据共享、隐私保护、知识发现等多重需求而产生的PPDM(privacy preserving data mining),成为数据挖掘和信息安全领域近几年来的研究热点.PPDM中主要考虑两个层面的问题:一是敏感数据的隐藏与保护;二是数据中蕴涵的敏感知识的隐...伴随着数据共享、隐私保护、知识发现等多重需求而产生的PPDM(privacy preserving data mining),成为数据挖掘和信息安全领域近几年来的研究热点.PPDM中主要考虑两个层面的问题:一是敏感数据的隐藏与保护;二是数据中蕴涵的敏感知识的隐藏与保护(knowledge hiding in database,简称KHD).对目前的KHD技术进行分类和综述.首先介绍KHD产生的背景,然后着重讨论敏感关联规则隐藏技术和分类规则隐藏技术,接着探讨KHD方法的评估指标,最后归结出KHD后续研究的3个方向:数据修改技巧中基于目标距离的优化测度函数设计、数据重构技巧中的反向频繁项集挖掘以及基于数据抽样技巧的通用知识隐藏方法设计.展开更多
To make digital watermarking accomplish several goals, a new method for simultaneously embedding multiple watermarks into the same audio signal is proposed. First, the original audio signal is segmented into frames of...To make digital watermarking accomplish several goals, a new method for simultaneously embedding multiple watermarks into the same audio signal is proposed. First, the original audio signal is segmented into frames of appointed lengths and all the element watermarks are encoded to achieve a mixed watermark. Then, the binary bits in the mixed watermark are embedded into the audio frames with the echo hiding technique. The watermark extraction can be performed without an original audio signal. Furthermore, in order to enhance the extraction accuracy and the robustness of the proposed algorithm against common signal manipulations, the autocorrelafion of the power cepstrum is utilized to estimate the echo delays in the watermarked audio frames to extract the mixed watermark and the corresponding decoding method is applied to achieve the element watermarks. Computer simulation results indicate that the proposed scheme has great robustness against common signal manipulations of Mp3 compressing, re-sampling, re-quantizing, low-pass filtering and white noise addition.展开更多
Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the clou...Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the cloud.In the meantime,some computationally expensive tasks are also undertaken by cloud servers.However,the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data.Recently,this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data.In this paper,two reversible data hiding schemes are proposed for encrypted image data in cloud computing:reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain.The former is that additional bits are extracted after decryption and the latter is that extracted before decryption.Meanwhile,a combined scheme is also designed.This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing,which not only ensures multimedia data security without relying on the trustworthiness of cloud servers,but also guarantees that reversible data hiding can be operated over encrypted images at the different stages.Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme.The computation cost of the proposed scheme is acceptable and adjusts to different security levels.展开更多
In order to track ground moving target, a variable structure interacting multiple model (VS-IMM) using mean shift unscented particle filter (MS-UPF) is proposed in this paper. In model-conditioned filtering, sampl...In order to track ground moving target, a variable structure interacting multiple model (VS-IMM) using mean shift unscented particle filter (MS-UPF) is proposed in this paper. In model-conditioned filtering, sample particles obtained from the unscented particle filter are moved towards the maximal posterior density estimation of the target state through mean shift. On the basis of stop model in VS-IMM, hide model is proposed. Once the target is obscured by terrain, the prediction at prior time is used instead of the measurement at posterior time; in addition, the road model set used is not changed. A ground moving target indication (GMTI) radar is employed in three common simulation scenarios of ground target: entering or leaving a road, crossing a junction and no measurement. Two evaluation indexes, root mean square error (RMSE) and average normalized estimation error squared (ANEES), are used. The results indicate that when the road on which the target moving changes, the tracking accuracy is effectively improved in the proposed algorithm. Moreover, track interruption could be avoided if the target is moving too slowly or masked by terrain.展开更多
基金Supported by the Scientific Research Project of Hebei Entry-Exit Inspection and Quarantine Bureau(HE2013K030)~~
文摘The situation of intercepted alien pests from imported hides in Hebei during 2013-2014 was systematically analyzed. The results showed that 163 batches of alien pests were intercepted, including 2 batches of quarantine weeds and they both were Italian cocklebur. According to the statistics of original countries, the intercepted hides from 21 countries all had alien pests, in which Australia was the largest number of batches and species of alien pests. The analysis results showed that there was severe risk in the imported hides carrying alien pests, thus to effectively prevent the invasion of alien pests to our country, several quarantine measures should be taken in the future, such as enhancing the quarantine inspection in ports, and promoting the personnel ability of interception and species identification of alien pests.
文摘A category of chromium (Cr)-containing fertilizers is represented by the fertilizers deriving from byproducts of tanning process. Their use is widespread because of their good agronomic response due to the high content of slow release or- ganic nitrogen (N) and carbon (C). They do not represent an environmental hazard because only the non-toxic form of Cr(III) is present. Productive processes may involve chemical, enzymatic or thermal hydrolysis. The final product is characterized by different contents of peptides and free amino acids depending on the type of hydrolysis. Legislation concerning Cr-containing fertilizers is controversial because often do not consider any scientific evidences;nevertheless, the European Union, the United States and countries as Italy, do not set the restriction to Cr(III) and generally only the presence of the toxic form, Cr(VI), is limited. Depending on its two main oxidation forms, Cr issue has been studied for many years. Several authors confirmed that Cr(VI) is carcinogenic, while Cr(III) is an essential trace element in human and animal diet. In soil Cr(III) has low mobility, whereas Cr(VI) is highly water soluble. However Cr(VI) in soil is quickly reduced to Cr(III);on the contrary oxidation of Cr(III) to Cr(VI) is rarely possible because particular conditions must occur. Only a very small fraction of Cr in soil is available to plant uptake and its translocation in edible parts is limited because it is immobilized in roots as Cr(III). Therefore risks of environmental pollution using these fertilizers are negligible;on the contrary they have positive environmental and agronomical effects. The aim of this review is to deal with the category of the organic fertilizers containing Cr derived from tannery processes focusing on its chemical, productive, legislative, environmental and agronomical aspects. Special attention is given to the ambiguous issue of Cr briefly summarizing the most important studies of the last forty years.
基金funded by University of Transport and Communications(UTC)under grant number T2025-CN-004.
文摘Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi-stego images provides good image quality but often results in low embedding capability.To address these challenges,this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image.The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order.Four secret bits are embedded into each block’s maximum pixel value,while three additional bits are embedded into the second-largest value when the pixel difference exceeds a predefined threshold.A similar embedding strategy is also applied to the minimum side of the block,including the second-smallest pixel value.This design enables each block to embed up to 14 bits of secret data.Experimental results demonstrate that the proposed method achieves significantly higher embedding capacity and improved visual quality compared to existing triple-stego RDH approaches,advancing the field of reversible steganography.
文摘Data hiding methods involve embedding secret messages into cover objects to enable covert communication in a way that is difficult to detect.In data hiding methods based on image interpolation,the image size is reduced and then enlarged through interpolation,followed by the embedding of secret data into the newly generated pixels.A general improving approach for embedding secret messages is proposed.The approach may be regarded a general model for enhancing the data embedding capacity of various existing image interpolation-based data hiding methods.This enhancement is achieved by expanding the range of pixel values available for embedding secret messages,removing the limitations of many existing methods,where the range is restricted to powers of two to facilitate the direct embedding of bit-based messages.This improvement is accomplished through the application of multiple-based number conversion to the secret message data.The method converts the message bits into a multiple-based number and uses an algorithm to embed each digit of this number into an individual pixel,thereby enhancing the message embedding efficiency,as proved by a theorem derived in this study.The proposed improvement method has been tested through experiments on three well-known image interpolation-based data hiding methods.The results show that the proposed method can enhance the three data embedding rates by approximately 14%,13%,and 10%,respectively,create stego-images with good quality,and resist RS steganalysis attacks.These experimental results indicate that the use of the multiple-based number conversion technique to improve the three interpolation-based methods for embedding secret messages increases the number of message bits embedded in the images.For many image interpolation-based data hiding methods,which use power-of-two pixel-value ranges for message embedding,other than the three tested ones,the proposed improvement method is also expected to be effective for enhancing their data embedding capabilities.
基金supported in part by the National Natural Science Foundation of China(Nos.62202234,62401270)the China Postdoctoral Science Foundation(No.2023M741778)the Natural Science Foundation of Jiangsu Province(Nos.BK20240706,BK20240694).
文摘Generative image steganography is a technique that directly generates stego images from secret infor-mation.Unlike traditional methods,it theoretically resists steganalysis because there is no cover image.Currently,the existing generative image steganography methods generally have good steganography performance,but there is still potential room for enhancing both the quality of stego images and the accuracy of secret information extraction.Therefore,this paper proposes a generative image steganography algorithm based on attribute feature transformation and invertible mapping rule.Firstly,the reference image is disentangled by a content and an attribute encoder to obtain content features and attribute features,respectively.Then,a mean mapping rule is introduced to map the binary secret information into a noise vector,conforming to the distribution of attribute features.This noise vector is input into the generator to produce the attribute transformed stego image with the content feature of the reference image.Additionally,we design an adversarial loss,a reconstruction loss,and an image diversity loss to train the proposed model.Experimental results demonstrate that the stego images generated by the proposed method are of high quality,with an average extraction accuracy of 99.4%for the hidden information.Furthermore,since the stego image has a uniform distribution similar to the attribute-transformed image without secret information,it effectively resists both subjective and objective steganalysis.
文摘One sunny day,a little dog with the name Max met a little cat named Lily in the backyard.Max:Hi,Lily!I'm looking for something interesting to do.Do you want to play with me?Lily:Sure,Max!But how 1 can we play?Max:How about hide-and-seek?Lily:Sound②great!You count first,and I'll go hide.
文摘Establish an efficacy evaluation method for foundation products in vivo and vitro.The hiding power,whiteness,waterproof and anti-sweat effect were evaluated in vitro test,where CR ratio,Individual Type Angle (ITA°) and chromatic aberration (E) were measured as evaluation indicators by standard black/white cardboard,artificial leather and artificial sweat.In clinical assessment,the anti-stain,waterproof,anti-sweat effect of the foundation products were evaluated through the ΔE change,before and after the treatment of products by staining,wetting,sweating in forearm skin.There were significant differences in CR ratio of different types of samples on standard black and white cardboards (P<0.05),ITA° of artificial leather has a significant increase after treatment (P<0.05),?E﹤1.5 in black cloth after dipping test,while ΔE﹤1.5 in leather after water and artificial sweat treatment.Clinical assessment showed that ?E ﹤50%,which had no significant difference in human skin color,before and after the test (P>0.05).The change trend of efficacy evaluation in vitro test was basically consistent with that of visual evaluation and clinical assessment,indicated that the efficacy evaluation methods of foundation products in vivo and vitro are intuitive,quantifiable,and can be used to evaluate the efficacy of foundation products.
基金supported in part by the National Key R&D Program of China(Grant No.2019YFB2101700)the National Natural Science Foundation of China(Grant No.62272102,No.62172320,No.U21A20466)+4 种基金the Open Research Fund of Key Laboratory of Cryptography of Zhejiang Province(Grant No.ZCL21015)the Qinghai Key R&D and Transformation Projects(Grant No.2021-GX-112)the Natural Science Foundation of Nanjing University of Posts and Telecommunications(Grant No.NY222141)the Natural Science Foundation of Jiangsu Higher Education Institutions of China under Grant(No.22KJB520029)Henan Key Laboratory of Network Cryptography Technology(No.LNCT2022-A10)。
文摘Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute content.Additionally,resource-constrained IoT devices,especially those adopting wireless communication,frequently encounter affordability issues regarding decryption costs.In this paper,we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC).FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them.A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access policy.Dictionary attacks are thwarted by providing unauthorized users with invalid values.The heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud servers.Additionally,users can verify the correctness of multiple outsourced decryption results simultaneously.Security analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption.
基金funded by theNational Science and Technology Council of Taiwan under the grant number NSTC 113-2221-E-035-058.
文摘With the rapid expansion of multimedia data,protecting digital information has become increasingly critical.Reversible data hiding offers an effective solution by allowing sensitive information to be embedded in multimedia files while enabling full recovery of the original data after extraction.Audio,as a vital medium in communication,entertainment,and information sharing,demands the same level of security as images.However,embedding data in encrypted audio poses unique challenges due to the trade-offs between security,data integrity,and embedding capacity.This paper presents a novel interpolation-based reversible data hiding algorithm for encrypted audio that achieves scalable embedding capacity.By increasing sample density through interpolation,embedding opportunities are significantly enhanced while maintaining encryption throughout the process.The method further integrates multiple most significant bit(multi-MSB)prediction and Huffman coding to optimize compression and embedding efficiency.Experimental results on standard audio datasets demonstrate the proposed algorithm’s ability to embed up to 12.47 bits per sample with over 9.26 bits per sample available for pure embedding capacity,while preserving full reversibility.These results confirm the method’s suitability for secure applications that demand high embedding capacity and perfect reconstruction of original audio.This work advances reversible data hiding in encrypted audio by offering a secure,efficient,and fully reversible data hiding framework.
文摘In the evolving landscape of secure communication,steganography has become increasingly vital to secure the transmission of secret data through an insecure public network.Several steganographic algorithms have been proposed using digital images with a common objective of balancing a trade-off between the payload size and the quality of the stego image.In the existing steganographic works,a remarkable distortion of the stego image persists when the payload size is increased,making several existing works impractical to the current world of vast data.This paper introduces FuzzyStego,a novel approach designed to enhance the stego image’s quality by minimizing the effect of the payload size on the stego image’s quality.In line with the limitations of traditional methods like Pixel Value Differencing(PVD),Transform Domain Techniques,and Least Significant Bit(LSB)insertion,such as image quality degradation,vulnerability to processing attacks,and restricted capacity,FuzzyStego utilizes fuzzy logic to categorize pixels into intensity levels:Low(L),Medium-Low(ML),Medium(M),Medium-High(MH),and High(H).This classification enables adaptive data embedding,minimizing detectability by adjusting the hidden bit count according to the intensity levels.Experimental results show that FuzzyStego achieves an average Peak Signal-to-Noise Ratio(PSNR)of 58.638 decibels(dB)and a Structural Similarity Index Measure(SSIM)of almost 1.00,demonstrating its promising capability to preserve image quality while embedding data effectively.
文摘This study introduces an Edge-Based Data Hiding and Extraction Algorithm(EBDHEA)to address the problem of data embedding in images while preserving robust security and high image quality.The algorithm produces three classes of pixels from the pixels in the cover image:edges found by the Canny edge detection method,pixels arising from the expansion of neighboring edge pixels,and pixels that are neither edges nor components of the neighboring edge pixels.The number of Least Significant Bits(LSBs)that are used to hide data depends on these classifications.Furthermore,the lossless compression method,Huffman coding,improves image data capacity.To increase the security of the steganographic process,secret messages are encrypted using the XOR encryption technique before being embedded.Metrics such as the Mean Squared Error(MSE),Peak Signal-to-Noise Ratio(PSNR),and Structural Similarity Index Measure(SSIM)are used to assess the efficacy of this algorithm and are compared to previous methods.The findings demonstrate that the suggested approach achieves high similarity between the original and modified images with a maximum PSNR of 60.7 dB for a payload of 18,750 bytes,a maximum SSIM of 0.999 for a payload of 314,572.8 bytes,and a maximum Video Information Fidelity(VIF)of 0.95 for a payload of 23,592 bytes.Normalized Cross-Correlation(NCC)values are very close to 1.In addition,the performance of EBDHEA is implemented on Secure Medical Image Transmission as a real-world example,and the performance is tested against three types of attacks:RS Steganalysis,Chi-square attack,and visual attack,and compared with two deep learning models,such as SRNet and XuNet.
基金supported by the Social Science Foundation of Liaoning Province(L23BJY022).
文摘We explored the effects of algorithmic opacity on employees’playing dumb and evasive hiding rather than rationalized hiding.We examined the mediating role of job insecurity and the moderating role of employee-AI collaboration.Participants were 421 full-time employees(female=46.32%,junior employees=31.83%)from a variety of organizations and industries that interact with AI.Employees filled out data on algorithm opacity,job insecurity,knowledge hiding,employee-AI collaboration,and control variables.The results of the structural equation modeling indicated that algorithm opacity exacerbated employees’job insecurity,and job insecurity mediated between algorithm opacity and playing dumb and evasive hiding rather than rationalized hiding.The relationship between algorithmic opacity and playing dumb and evasive hiding was more positive when the level of employee-AI collaboration was higher.These findings suggest that employee-AI collaboration reinforces the indirect relationship between algorithmic opacity and playing dumb and evasive hiding.Our study contributes to research on human and AI collaboration by exploring the dark side of employee-AI collaboration.
基金supported in part by the National Natural Science Foundation of China under Grants 62102450,62272478the Independent Research Project of a Certain Unit under Grant ZZKY20243127.
文摘Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server introduces critical security vulnerabilities:malicious servers can infer private information from received local model updates or deliberately manipulate aggregation results.Consequently,achieving verifiable aggregation without compromising client privacy remains a critical challenge.To address these problem,we propose a reversible data hiding in encrypted domains(RDHED)scheme,which designs joint secret message embedding and extraction mechanism.This approach enables clients to embed secret messages into ciphertext redundancy spaces generated during model encryption.During the server aggregation process,the embedded messages from all clients fuse within the ciphertext space to form a joint embedding message.Subsequently,clients can decrypt the aggregated results and extract this joint embedding message for verification purposes.Building upon this foundation,we integrate the proposed RDHED scheme with linear homomorphic hash and digital signatures to design a verifiable privacy-preserving aggregation protocol for single-server architectures(VPAFL).Theoretical proofs and experimental analyses show that VPAFL can effectively protect user privacy,achieve lightweight computational and communication overhead of users for verification,and present significant advantages with increasing model dimension.
基金supported by the National Natural Science Foundation of China(Grant Nos.62072250,61772281,61702235,U1636117,U1804263,62172435,61872203 and 61802212)the Zhongyuan Science and Technology Innovation Leading Talent Project of China(Grant No.214200510019)+3 种基金the Suqian Municipal Science and Technology Plan Project in 2020(S202015)the Plan for Scientific Talent of Henan Province(Grant No.2018JR0018)the Opening Project of Guangdong Provincial Key Laboratory of Information Security Technology(Grant No.2020B1212060078)the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)Fund.
文摘Medical image segmentation,i.e.,labeling structures of interest in medical images,is crucial for disease diagnosis and treatment in radiology.In reversible data hiding in medical images(RDHMI),segmentation consists of only two regions:the focal and nonfocal regions.The focal region mainly contains information for diagnosis,while the nonfocal region serves as the monochrome background.The current traditional segmentation methods utilized in RDHMI are inaccurate for complex medical images,and manual segmentation is time-consuming,poorly reproducible,and operator-dependent.Implementing state-of-the-art deep learning(DL)models will facilitate key benefits,but the lack of domain-specific labels for existing medical datasets makes it impossible.To address this problem,this study provides labels of existing medical datasets based on a hybrid segmentation approach to facilitate the implementation of DL segmentation models in this domain.First,an initial segmentation based on a 33 kernel is performed to analyze×identified contour pixels before classifying pixels into focal and nonfocal regions.Then,several human expert raters evaluate and classify the generated labels into accurate and inaccurate labels.The inaccurate labels undergo manual segmentation by medical practitioners and are scored based on a hierarchical voting scheme before being assigned to the proposed dataset.To ensure reliability and integrity in the proposed dataset,we evaluate the accurate automated labels with manually segmented labels by medical practitioners using five assessment metrics:dice coefficient,Jaccard index,precision,recall,and accuracy.The experimental results show labels in the proposed dataset are consistent with the subjective judgment of human experts,with an average accuracy score of 94%and dice coefficient scores between 90%-99%.The study further proposes a ResNet-UNet with concatenated spatial and channel squeeze and excitation(scSE)architecture for semantic segmentation to validate and illustrate the usefulness of the proposed dataset.The results demonstrate the superior performance of the proposed architecture in accurately separating the focal and nonfocal regions compared to state-of-the-art architectures.Dataset information is released under the following URL:https://www.kaggle.com/lordamoah/datasets(accessed on 31 March 2025).
文摘伴随着数据共享、隐私保护、知识发现等多重需求而产生的PPDM(privacy preserving data mining),成为数据挖掘和信息安全领域近几年来的研究热点.PPDM中主要考虑两个层面的问题:一是敏感数据的隐藏与保护;二是数据中蕴涵的敏感知识的隐藏与保护(knowledge hiding in database,简称KHD).对目前的KHD技术进行分类和综述.首先介绍KHD产生的背景,然后着重讨论敏感关联规则隐藏技术和分类规则隐藏技术,接着探讨KHD方法的评估指标,最后归结出KHD后续研究的3个方向:数据修改技巧中基于目标距离的优化测度函数设计、数据重构技巧中的反向频繁项集挖掘以及基于数据抽样技巧的通用知识隐藏方法设计.
文摘To make digital watermarking accomplish several goals, a new method for simultaneously embedding multiple watermarks into the same audio signal is proposed. First, the original audio signal is segmented into frames of appointed lengths and all the element watermarks are encoded to achieve a mixed watermark. Then, the binary bits in the mixed watermark are embedded into the audio frames with the echo hiding technique. The watermark extraction can be performed without an original audio signal. Furthermore, in order to enhance the extraction accuracy and the robustness of the proposed algorithm against common signal manipulations, the autocorrelafion of the power cepstrum is utilized to estimate the echo delays in the watermarked audio frames to extract the mixed watermark and the corresponding decoding method is applied to achieve the element watermarks. Computer simulation results indicate that the proposed scheme has great robustness against common signal manipulations of Mp3 compressing, re-sampling, re-quantizing, low-pass filtering and white noise addition.
基金This work was supported by the National Natural Science Foundation of China(No.61702276)the Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology under Grant 2016r055 and the Priority Academic Program Development(PAPD)of Jiangsu Higher Education Institutions.The authors are grateful for the anonymous reviewers who made constructive comments and improvements.
文摘Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the cloud.In the meantime,some computationally expensive tasks are also undertaken by cloud servers.However,the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data.Recently,this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data.In this paper,two reversible data hiding schemes are proposed for encrypted image data in cloud computing:reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain.The former is that additional bits are extracted after decryption and the latter is that extracted before decryption.Meanwhile,a combined scheme is also designed.This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing,which not only ensures multimedia data security without relying on the trustworthiness of cloud servers,but also guarantees that reversible data hiding can be operated over encrypted images at the different stages.Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme.The computation cost of the proposed scheme is acceptable and adjusts to different security levels.
文摘In order to track ground moving target, a variable structure interacting multiple model (VS-IMM) using mean shift unscented particle filter (MS-UPF) is proposed in this paper. In model-conditioned filtering, sample particles obtained from the unscented particle filter are moved towards the maximal posterior density estimation of the target state through mean shift. On the basis of stop model in VS-IMM, hide model is proposed. Once the target is obscured by terrain, the prediction at prior time is used instead of the measurement at posterior time; in addition, the road model set used is not changed. A ground moving target indication (GMTI) radar is employed in three common simulation scenarios of ground target: entering or leaving a road, crossing a junction and no measurement. Two evaluation indexes, root mean square error (RMSE) and average normalized estimation error squared (ANEES), are used. The results indicate that when the road on which the target moving changes, the tracking accuracy is effectively improved in the proposed algorithm. Moreover, track interruption could be avoided if the target is moving too slowly or masked by terrain.