期刊文献+
共找到213篇文章
< 1 2 11 >
每页显示 20 50 100
Analysis on the Epidemic Situation of Intercepted Alien Pests from Imported Hides in Hebei and the Countermeasures during 2013-2014
1
作者 王建昌 高瑞清 +2 位作者 张帅 王珅 王照华 《Agricultural Science & Technology》 CAS 2015年第9期2007-2010,共4页
The situation of intercepted alien pests from imported hides in Hebei during 2013-2014 was systematically analyzed. The results showed that 163 batches of alien pests were intercepted, including 2 batches of quarantin... The situation of intercepted alien pests from imported hides in Hebei during 2013-2014 was systematically analyzed. The results showed that 163 batches of alien pests were intercepted, including 2 batches of quarantine weeds and they both were Italian cocklebur. According to the statistics of original countries, the intercepted hides from 21 countries all had alien pests, in which Australia was the largest number of batches and species of alien pests. The analysis results showed that there was severe risk in the imported hides carrying alien pests, thus to effectively prevent the invasion of alien pests to our country, several quarantine measures should be taken in the future, such as enhancing the quarantine inspection in ports, and promoting the personnel ability of interception and species identification of alien pests. 展开更多
关键词 Imported hides Alien pests Quarantine measures
在线阅读 下载PDF
Chromium-Containing Organic Fertilizers from Tanned Hides and Skins: A Review on Chemical, Environmental, Agronomical and Legislative Aspects 被引量:1
2
作者 Claudio Ciavatta Chiara Manoli +2 位作者 Luciano Cavani Clizia Franceschi Paolo Sequi 《Journal of Environmental Protection》 2012年第11期1532-1541,共10页
A category of chromium (Cr)-containing fertilizers is represented by the fertilizers deriving from byproducts of tanning process. Their use is widespread because of their good agronomic response due to the high conten... A category of chromium (Cr)-containing fertilizers is represented by the fertilizers deriving from byproducts of tanning process. Their use is widespread because of their good agronomic response due to the high content of slow release or- ganic nitrogen (N) and carbon (C). They do not represent an environmental hazard because only the non-toxic form of Cr(III) is present. Productive processes may involve chemical, enzymatic or thermal hydrolysis. The final product is characterized by different contents of peptides and free amino acids depending on the type of hydrolysis. Legislation concerning Cr-containing fertilizers is controversial because often do not consider any scientific evidences;nevertheless, the European Union, the United States and countries as Italy, do not set the restriction to Cr(III) and generally only the presence of the toxic form, Cr(VI), is limited. Depending on its two main oxidation forms, Cr issue has been studied for many years. Several authors confirmed that Cr(VI) is carcinogenic, while Cr(III) is an essential trace element in human and animal diet. In soil Cr(III) has low mobility, whereas Cr(VI) is highly water soluble. However Cr(VI) in soil is quickly reduced to Cr(III);on the contrary oxidation of Cr(III) to Cr(VI) is rarely possible because particular conditions must occur. Only a very small fraction of Cr in soil is available to plant uptake and its translocation in edible parts is limited because it is immobilized in roots as Cr(III). Therefore risks of environmental pollution using these fertilizers are negligible;on the contrary they have positive environmental and agronomical effects. The aim of this review is to deal with the category of the organic fertilizers containing Cr derived from tannery processes focusing on its chemical, productive, legislative, environmental and agronomical aspects. Special attention is given to the ambiguous issue of Cr briefly summarizing the most important studies of the last forty years. 展开更多
关键词 ORGANIC Fertilizers Tanned hides and Skins Hydrolyzed LEATHER TRIVALENT CHROMIUM Hexavalent CHROMIUM Soil
暂未订购
Enhanced Capacity Reversible Data Hiding Based on Pixel Value Ordering in Triple Stego Images
3
作者 Kim Sao Nguyen Ngoc Dung Bui 《Computers, Materials & Continua》 2026年第1期1571-1586,共16页
Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi... Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi-stego images provides good image quality but often results in low embedding capability.To address these challenges,this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image.The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order.Four secret bits are embedded into each block’s maximum pixel value,while three additional bits are embedded into the second-largest value when the pixel difference exceeds a predefined threshold.A similar embedding strategy is also applied to the minimum side of the block,including the second-smallest pixel value.This design enables each block to embed up to 14 bits of secret data.Experimental results demonstrate that the proposed method achieves significantly higher embedding capacity and improved visual quality compared to existing triple-stego RDH approaches,advancing the field of reversible steganography. 展开更多
关键词 RDH reversible data hiding PVO RDH base three stego images
在线阅读 下载PDF
General Improvement of Image Interpolation-Based Data Hiding Methods Using Multiple-Based Number Conversion
4
作者 Da-Chun Wu Bing-Han 《Computer Modeling in Engineering & Sciences》 2025年第7期535-580,共46页
Data hiding methods involve embedding secret messages into cover objects to enable covert communication in a way that is difficult to detect.In data hiding methods based on image interpolation,the image size is reduce... Data hiding methods involve embedding secret messages into cover objects to enable covert communication in a way that is difficult to detect.In data hiding methods based on image interpolation,the image size is reduced and then enlarged through interpolation,followed by the embedding of secret data into the newly generated pixels.A general improving approach for embedding secret messages is proposed.The approach may be regarded a general model for enhancing the data embedding capacity of various existing image interpolation-based data hiding methods.This enhancement is achieved by expanding the range of pixel values available for embedding secret messages,removing the limitations of many existing methods,where the range is restricted to powers of two to facilitate the direct embedding of bit-based messages.This improvement is accomplished through the application of multiple-based number conversion to the secret message data.The method converts the message bits into a multiple-based number and uses an algorithm to embed each digit of this number into an individual pixel,thereby enhancing the message embedding efficiency,as proved by a theorem derived in this study.The proposed improvement method has been tested through experiments on three well-known image interpolation-based data hiding methods.The results show that the proposed method can enhance the three data embedding rates by approximately 14%,13%,and 10%,respectively,create stego-images with good quality,and resist RS steganalysis attacks.These experimental results indicate that the use of the multiple-based number conversion technique to improve the three interpolation-based methods for embedding secret messages increases the number of message bits embedded in the images.For many image interpolation-based data hiding methods,which use power-of-two pixel-value ranges for message embedding,other than the three tested ones,the proposed improvement method is also expected to be effective for enhancing their data embedding capabilities. 展开更多
关键词 Data hiding image interpolation interpolation-based hiding methods steganography multiple-based number conversion
在线阅读 下载PDF
A Generative Image Steganography Based on Disentangled Attribute Feature Transformation and Invertible Mapping Rule
5
作者 Xiang Zhang Shenyan Han +1 位作者 Wenbin Huang Daoyong Fu 《Computers, Materials & Continua》 2025年第4期1149-1171,共23页
Generative image steganography is a technique that directly generates stego images from secret infor-mation.Unlike traditional methods,it theoretically resists steganalysis because there is no cover image.Currently,th... Generative image steganography is a technique that directly generates stego images from secret infor-mation.Unlike traditional methods,it theoretically resists steganalysis because there is no cover image.Currently,the existing generative image steganography methods generally have good steganography performance,but there is still potential room for enhancing both the quality of stego images and the accuracy of secret information extraction.Therefore,this paper proposes a generative image steganography algorithm based on attribute feature transformation and invertible mapping rule.Firstly,the reference image is disentangled by a content and an attribute encoder to obtain content features and attribute features,respectively.Then,a mean mapping rule is introduced to map the binary secret information into a noise vector,conforming to the distribution of attribute features.This noise vector is input into the generator to produce the attribute transformed stego image with the content feature of the reference image.Additionally,we design an adversarial loss,a reconstruction loss,and an image diversity loss to train the proposed model.Experimental results demonstrate that the stego images generated by the proposed method are of high quality,with an average extraction accuracy of 99.4%for the hidden information.Furthermore,since the stego image has a uniform distribution similar to the attribute-transformed image without secret information,it effectively resists both subjective and objective steganalysis. 展开更多
关键词 Image information hiding generative information hiding disentangled attribute feature transformation invertible mapping rule steganalysis resistance
在线阅读 下载PDF
A Special Friendship
6
作者 张超 张素芬 《中学生英语》 2025年第13期6-6,共1页
One sunny day,a little dog with the name Max met a little cat named Lily in the backyard.Max:Hi,Lily!I'm looking for something interesting to do.Do you want to play with me?Lily:Sure,Max!But how 1 can we play?Max:... One sunny day,a little dog with the name Max met a little cat named Lily in the backyard.Max:Hi,Lily!I'm looking for something interesting to do.Do you want to play with me?Lily:Sure,Max!But how 1 can we play?Max:How about hide-and-seek?Lily:Sound②great!You count first,and I'll go hide. 展开更多
关键词 PLAY FRIENDSHIP cat BACKYARD hide seek DOG
在线阅读 下载PDF
Efficacy Evaluation Method for Foundation Products in vivo and vitro
7
作者 Peng Tingting Guo Junbin +2 位作者 He Lina Guo Shentao Tan Yong 《China Detergent & Cosmetics》 2025年第2期38-44,共7页
Establish an efficacy evaluation method for foundation products in vivo and vitro.The hiding power,whiteness,waterproof and anti-sweat effect were evaluated in vitro test,where CR ratio,Individual Type Angle (ITA°... Establish an efficacy evaluation method for foundation products in vivo and vitro.The hiding power,whiteness,waterproof and anti-sweat effect were evaluated in vitro test,where CR ratio,Individual Type Angle (ITA°) and chromatic aberration (E) were measured as evaluation indicators by standard black/white cardboard,artificial leather and artificial sweat.In clinical assessment,the anti-stain,waterproof,anti-sweat effect of the foundation products were evaluated through the ΔE change,before and after the treatment of products by staining,wetting,sweating in forearm skin.There were significant differences in CR ratio of different types of samples on standard black and white cardboards (P<0.05),ITA° of artificial leather has a significant increase after treatment (P<0.05),?E﹤1.5 in black cloth after dipping test,while ΔE﹤1.5 in leather after water and artificial sweat treatment.Clinical assessment showed that ?E ﹤50%,which had no significant difference in human skin color,before and after the test (P>0.05).The change trend of efficacy evaluation in vitro test was basically consistent with that of visual evaluation and clinical assessment,indicated that the efficacy evaluation methods of foundation products in vivo and vitro are intuitive,quantifiable,and can be used to evaluate the efficacy of foundation products. 展开更多
关键词 foundation products hiding power physical whitening anti-stain WATERPROOF anti-sweat
在线阅读 下载PDF
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
8
作者 Qi Li Gaozhan Liu +4 位作者 Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong 《Digital Communications and Networks》 2025年第2期473-481,共9页
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schem... Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute content.Additionally,resource-constrained IoT devices,especially those adopting wireless communication,frequently encounter affordability issues regarding decryption costs.In this paper,we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC).FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them.A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access policy.Dictionary attacks are thwarted by providing unauthorized users with invalid values.The heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud servers.Additionally,users can verify the correctness of multiple outsourced decryption results simultaneously.Security analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption. 展开更多
关键词 Access control Policy hiding Verifiable outsourced computation CLOUD IOT
在线阅读 下载PDF
Interpolation-Based Reversible Data Hiding in Encrypted Audio with Scalable Embedding Capacity
9
作者 Yuan-Yu Tsai Alfrindo Lin +1 位作者 Wen-Ting Jao Yi-Hui Chen 《Computers, Materials & Continua》 2025年第7期681-697,共17页
With the rapid expansion of multimedia data,protecting digital information has become increasingly critical.Reversible data hiding offers an effective solution by allowing sensitive information to be embedded in multi... With the rapid expansion of multimedia data,protecting digital information has become increasingly critical.Reversible data hiding offers an effective solution by allowing sensitive information to be embedded in multimedia files while enabling full recovery of the original data after extraction.Audio,as a vital medium in communication,entertainment,and information sharing,demands the same level of security as images.However,embedding data in encrypted audio poses unique challenges due to the trade-offs between security,data integrity,and embedding capacity.This paper presents a novel interpolation-based reversible data hiding algorithm for encrypted audio that achieves scalable embedding capacity.By increasing sample density through interpolation,embedding opportunities are significantly enhanced while maintaining encryption throughout the process.The method further integrates multiple most significant bit(multi-MSB)prediction and Huffman coding to optimize compression and embedding efficiency.Experimental results on standard audio datasets demonstrate the proposed algorithm’s ability to embed up to 12.47 bits per sample with over 9.26 bits per sample available for pure embedding capacity,while preserving full reversibility.These results confirm the method’s suitability for secure applications that demand high embedding capacity and perfect reconstruction of original audio.This work advances reversible data hiding in encrypted audio by offering a secure,efficient,and fully reversible data hiding framework. 展开更多
关键词 Reversible data hiding encrypted audio INTERPOLATION sampling multi-MSB prediction Huffman coding
在线阅读 下载PDF
FuzzyStego:An Adaptive Steganographic Scheme Using Fuzzy Logic for Optimizing Embeddable Areas in Spatial Domain Images
10
作者 Mardhatillah Shevy Ananti Adifa Widyadhani Chanda D’Layla +1 位作者 Ntivuguruzwa JeanDe La Croix Tohari Ahmad 《Computers, Materials & Continua》 2025年第7期1031-1054,共24页
In the evolving landscape of secure communication,steganography has become increasingly vital to secure the transmission of secret data through an insecure public network.Several steganographic algorithms have been pr... In the evolving landscape of secure communication,steganography has become increasingly vital to secure the transmission of secret data through an insecure public network.Several steganographic algorithms have been proposed using digital images with a common objective of balancing a trade-off between the payload size and the quality of the stego image.In the existing steganographic works,a remarkable distortion of the stego image persists when the payload size is increased,making several existing works impractical to the current world of vast data.This paper introduces FuzzyStego,a novel approach designed to enhance the stego image’s quality by minimizing the effect of the payload size on the stego image’s quality.In line with the limitations of traditional methods like Pixel Value Differencing(PVD),Transform Domain Techniques,and Least Significant Bit(LSB)insertion,such as image quality degradation,vulnerability to processing attacks,and restricted capacity,FuzzyStego utilizes fuzzy logic to categorize pixels into intensity levels:Low(L),Medium-Low(ML),Medium(M),Medium-High(MH),and High(H).This classification enables adaptive data embedding,minimizing detectability by adjusting the hidden bit count according to the intensity levels.Experimental results show that FuzzyStego achieves an average Peak Signal-to-Noise Ratio(PSNR)of 58.638 decibels(dB)and a Structural Similarity Index Measure(SSIM)of almost 1.00,demonstrating its promising capability to preserve image quality while embedding data effectively. 展开更多
关键词 Data hiding digital images fuzzy selection information security STEGANOGRAPHY
在线阅读 下载PDF
Edge-Based Data Hiding and Extraction Algorithm to Increase Payload Capacity and Data Security
11
作者 Hanan Hardan Osama A.Khashan Mohammad Alshinwan 《Computers, Materials & Continua》 2025年第7期1681-1710,共30页
This study introduces an Edge-Based Data Hiding and Extraction Algorithm(EBDHEA)to address the problem of data embedding in images while preserving robust security and high image quality.The algorithm produces three c... This study introduces an Edge-Based Data Hiding and Extraction Algorithm(EBDHEA)to address the problem of data embedding in images while preserving robust security and high image quality.The algorithm produces three classes of pixels from the pixels in the cover image:edges found by the Canny edge detection method,pixels arising from the expansion of neighboring edge pixels,and pixels that are neither edges nor components of the neighboring edge pixels.The number of Least Significant Bits(LSBs)that are used to hide data depends on these classifications.Furthermore,the lossless compression method,Huffman coding,improves image data capacity.To increase the security of the steganographic process,secret messages are encrypted using the XOR encryption technique before being embedded.Metrics such as the Mean Squared Error(MSE),Peak Signal-to-Noise Ratio(PSNR),and Structural Similarity Index Measure(SSIM)are used to assess the efficacy of this algorithm and are compared to previous methods.The findings demonstrate that the suggested approach achieves high similarity between the original and modified images with a maximum PSNR of 60.7 dB for a payload of 18,750 bytes,a maximum SSIM of 0.999 for a payload of 314,572.8 bytes,and a maximum Video Information Fidelity(VIF)of 0.95 for a payload of 23,592 bytes.Normalized Cross-Correlation(NCC)values are very close to 1.In addition,the performance of EBDHEA is implemented on Secure Medical Image Transmission as a real-world example,and the performance is tested against three types of attacks:RS Steganalysis,Chi-square attack,and visual attack,and compared with two deep learning models,such as SRNet and XuNet. 展开更多
关键词 STEGANOGRAPHY least significant bit(LSB) edge detection STEGO-IMAGE data hiding
在线阅读 下载PDF
Algorithmic opacity and employees’knowledge hiding:medication by job insecurity and moderation by employee-AI collaboration
12
作者 Chunhong Guo Huifang Liu Jingfu Guo 《Journal of Psychology in Africa》 2025年第3期411-418,共8页
We explored the effects of algorithmic opacity on employees’playing dumb and evasive hiding rather than rationalized hiding.We examined the mediating role of job insecurity and the moderating role of employee-AI coll... We explored the effects of algorithmic opacity on employees’playing dumb and evasive hiding rather than rationalized hiding.We examined the mediating role of job insecurity and the moderating role of employee-AI collaboration.Participants were 421 full-time employees(female=46.32%,junior employees=31.83%)from a variety of organizations and industries that interact with AI.Employees filled out data on algorithm opacity,job insecurity,knowledge hiding,employee-AI collaboration,and control variables.The results of the structural equation modeling indicated that algorithm opacity exacerbated employees’job insecurity,and job insecurity mediated between algorithm opacity and playing dumb and evasive hiding rather than rationalized hiding.The relationship between algorithmic opacity and playing dumb and evasive hiding was more positive when the level of employee-AI collaboration was higher.These findings suggest that employee-AI collaboration reinforces the indirect relationship between algorithmic opacity and playing dumb and evasive hiding.Our study contributes to research on human and AI collaboration by exploring the dark side of employee-AI collaboration. 展开更多
关键词 algorithmic opacity job insecurity knowledge hiding employee-AI collaboration
在线阅读 下载PDF
VPAFL: Verifiable Privacy-Preserving Aggregation for Federated Learning Based on Single Server
13
作者 Peizheng Lai Minqing Zhang +2 位作者 Yixin Tang Ya Yue Fuqiang Di 《Computers, Materials & Continua》 2025年第8期2935-2957,共23页
Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server i... Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server introduces critical security vulnerabilities:malicious servers can infer private information from received local model updates or deliberately manipulate aggregation results.Consequently,achieving verifiable aggregation without compromising client privacy remains a critical challenge.To address these problem,we propose a reversible data hiding in encrypted domains(RDHED)scheme,which designs joint secret message embedding and extraction mechanism.This approach enables clients to embed secret messages into ciphertext redundancy spaces generated during model encryption.During the server aggregation process,the embedded messages from all clients fuse within the ciphertext space to form a joint embedding message.Subsequently,clients can decrypt the aggregated results and extract this joint embedding message for verification purposes.Building upon this foundation,we integrate the proposed RDHED scheme with linear homomorphic hash and digital signatures to design a verifiable privacy-preserving aggregation protocol for single-server architectures(VPAFL).Theoretical proofs and experimental analyses show that VPAFL can effectively protect user privacy,achieve lightweight computational and communication overhead of users for verification,and present significant advantages with increasing model dimension. 展开更多
关键词 Verifiable federated learning PRIVACY-PRESERVING homomorphic encryption reversible data hiding in encrypted domain secret sharing
在线阅读 下载PDF
A Novel Data-Annotated Label Collection and Deep-Learning Based Medical Image Segmentation in Reversible Data Hiding Domain
14
作者 Lord Amoah Jinwei Wang Bernard-Marie Onzo 《Computer Modeling in Engineering & Sciences》 2025年第5期1635-1660,共26页
Medical image segmentation,i.e.,labeling structures of interest in medical images,is crucial for disease diagnosis and treatment in radiology.In reversible data hiding in medical images(RDHMI),segmentation consists of... Medical image segmentation,i.e.,labeling structures of interest in medical images,is crucial for disease diagnosis and treatment in radiology.In reversible data hiding in medical images(RDHMI),segmentation consists of only two regions:the focal and nonfocal regions.The focal region mainly contains information for diagnosis,while the nonfocal region serves as the monochrome background.The current traditional segmentation methods utilized in RDHMI are inaccurate for complex medical images,and manual segmentation is time-consuming,poorly reproducible,and operator-dependent.Implementing state-of-the-art deep learning(DL)models will facilitate key benefits,but the lack of domain-specific labels for existing medical datasets makes it impossible.To address this problem,this study provides labels of existing medical datasets based on a hybrid segmentation approach to facilitate the implementation of DL segmentation models in this domain.First,an initial segmentation based on a 33 kernel is performed to analyze×identified contour pixels before classifying pixels into focal and nonfocal regions.Then,several human expert raters evaluate and classify the generated labels into accurate and inaccurate labels.The inaccurate labels undergo manual segmentation by medical practitioners and are scored based on a hierarchical voting scheme before being assigned to the proposed dataset.To ensure reliability and integrity in the proposed dataset,we evaluate the accurate automated labels with manually segmented labels by medical practitioners using five assessment metrics:dice coefficient,Jaccard index,precision,recall,and accuracy.The experimental results show labels in the proposed dataset are consistent with the subjective judgment of human experts,with an average accuracy score of 94%and dice coefficient scores between 90%-99%.The study further proposes a ResNet-UNet with concatenated spatial and channel squeeze and excitation(scSE)architecture for semantic segmentation to validate and illustrate the usefulness of the proposed dataset.The results demonstrate the superior performance of the proposed architecture in accurately separating the focal and nonfocal regions compared to state-of-the-art architectures.Dataset information is released under the following URL:https://www.kaggle.com/lordamoah/datasets(accessed on 31 March 2025). 展开更多
关键词 Reversible data hiding medical image segmentation medical image dataset deep learning
在线阅读 下载PDF
数据库中的知识隐藏 被引量:14
15
作者 郭宇红 童云海 +1 位作者 唐世渭 杨冬青 《软件学报》 EI CSCD 北大核心 2007年第11期2782-2799,共18页
伴随着数据共享、隐私保护、知识发现等多重需求而产生的PPDM(privacy preserving data mining),成为数据挖掘和信息安全领域近几年来的研究热点.PPDM中主要考虑两个层面的问题:一是敏感数据的隐藏与保护;二是数据中蕴涵的敏感知识的隐... 伴随着数据共享、隐私保护、知识发现等多重需求而产生的PPDM(privacy preserving data mining),成为数据挖掘和信息安全领域近几年来的研究热点.PPDM中主要考虑两个层面的问题:一是敏感数据的隐藏与保护;二是数据中蕴涵的敏感知识的隐藏与保护(knowledge hiding in database,简称KHD).对目前的KHD技术进行分类和综述.首先介绍KHD产生的背景,然后着重讨论敏感关联规则隐藏技术和分类规则隐藏技术,接着探讨KHD方法的评估指标,最后归结出KHD后续研究的3个方向:数据修改技巧中基于目标距离的优化测度函数设计、数据重构技巧中的反向频繁项集挖掘以及基于数据抽样技巧的通用知识隐藏方法设计. 展开更多
关键词 知识隐藏 KHD(knowledge hiding in database) 敏感规则 隐私保护 反向挖掘
在线阅读 下载PDF
一种基于MPEG编码规范的隐藏算法
16
作者 游启友 戴一奇 《计算机工程》 EI CAS CSCD 北大核心 2006年第8期170-172,共3页
在比较了当前各种经典音频隐藏算法的优缺点及其无法抵抗的攻击算法后,提出了一种非常有效的mp3文件中隐藏秘密信息的算法,它将数据隐藏在一个复合空间内。和现有算法相比,它具有更高的隐藏率、健壮性和不可感知性,能有效抵抗统计攻击。
关键词 信息隐藏 统计攻击 音频隐藏 mp3hide
在线阅读 下载PDF
Blind multiple watermarking algorithm for audio 被引量:2
17
作者 陈宁 朱杰 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期206-210,共5页
To make digital watermarking accomplish several goals, a new method for simultaneously embedding multiple watermarks into the same audio signal is proposed. First, the original audio signal is segmented into frames of... To make digital watermarking accomplish several goals, a new method for simultaneously embedding multiple watermarks into the same audio signal is proposed. First, the original audio signal is segmented into frames of appointed lengths and all the element watermarks are encoded to achieve a mixed watermark. Then, the binary bits in the mixed watermark are embedded into the audio frames with the echo hiding technique. The watermark extraction can be performed without an original audio signal. Furthermore, in order to enhance the extraction accuracy and the robustness of the proposed algorithm against common signal manipulations, the autocorrelafion of the power cepstrum is utilized to estimate the echo delays in the watermarked audio frames to extract the mixed watermark and the corresponding decoding method is applied to achieve the element watermarks. Computer simulation results indicate that the proposed scheme has great robustness against common signal manipulations of Mp3 compressing, re-sampling, re-quantizing, low-pass filtering and white noise addition. 展开更多
关键词 multiple watermarking echo hiding power cepstrum blind detection
在线阅读 下载PDF
糖尿病肾病与GHb、TC及apoB代谢紊乱的关系
18
作者 李晓红 《青岛医药卫生》 2001年第4期260-260,共1页
本文对32例Ⅱ型糖尿病肾病病人测定其GHb、TC、apoB水平,并与30例无糖尿病肾病的Ⅱ型糖尿病病人的各项水平间作了比较,以观察各项指标代谢紊乱的关系。1 对象与方法 1.1 根据WHO诊断标准诊断的Ⅱ型糖尿病患者62例(男30例,女32例),其中... 本文对32例Ⅱ型糖尿病肾病病人测定其GHb、TC、apoB水平,并与30例无糖尿病肾病的Ⅱ型糖尿病病人的各项水平间作了比较,以观察各项指标代谢紊乱的关系。1 对象与方法 1.1 根据WHO诊断标准诊断的Ⅱ型糖尿病患者62例(男30例,女32例),其中糖尿病肾病者32例(男17例,女15例),平均年龄为58±10岁;无糖尿病肾病者30例(男13例,女17例)。 展开更多
关键词 APOB水平 Ⅱ型糖尿病肾病 代谢紊乱 无糖 平均年龄 对象与方法 市立医院 HIDE 心血管并发症 诊断标准
暂未订购
On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing 被引量:11
19
作者 Lizhi Xiong Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2018年第6期523-539,共17页
Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the clou... Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the cloud.In the meantime,some computationally expensive tasks are also undertaken by cloud servers.However,the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data.Recently,this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data.In this paper,two reversible data hiding schemes are proposed for encrypted image data in cloud computing:reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain.The former is that additional bits are extracted after decryption and the latter is that extracted before decryption.Meanwhile,a combined scheme is also designed.This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing,which not only ensures multimedia data security without relying on the trustworthiness of cloud servers,but also guarantees that reversible data hiding can be operated over encrypted images at the different stages.Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme.The computation cost of the proposed scheme is acceptable and adjusts to different security levels. 展开更多
关键词 Cloud data security re-encryption reversible data hiding cloud computing privacy-preserving.
在线阅读 下载PDF
Ground Moving Target Tracking with VS-IMM Using Mean Shift Unscented Particle Filter 被引量:12
20
作者 GAO Caicai CHEN Wei 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2011年第5期622-630,共9页
In order to track ground moving target, a variable structure interacting multiple model (VS-IMM) using mean shift unscented particle filter (MS-UPF) is proposed in this paper. In model-conditioned filtering, sampl... In order to track ground moving target, a variable structure interacting multiple model (VS-IMM) using mean shift unscented particle filter (MS-UPF) is proposed in this paper. In model-conditioned filtering, sample particles obtained from the unscented particle filter are moved towards the maximal posterior density estimation of the target state through mean shift. On the basis of stop model in VS-IMM, hide model is proposed. Once the target is obscured by terrain, the prediction at prior time is used instead of the measurement at posterior time; in addition, the road model set used is not changed. A ground moving target indication (GMTI) radar is employed in three common simulation scenarios of ground target: entering or leaving a road, crossing a junction and no measurement. Two evaluation indexes, root mean square error (RMSE) and average normalized estimation error squared (ANEES), are used. The results indicate that when the road on which the target moving changes, the tracking accuracy is effectively improved in the proposed algorithm. Moreover, track interruption could be avoided if the target is moving too slowly or masked by terrain. 展开更多
关键词 ground moving target tracking mean shift unscented particle filter hide model road information variable structure interacting multiple model
原文传递
上一页 1 2 11 下一页 到第
使用帮助 返回顶部