Interpolation technology has evolved into a powerful tool for reversible data hiding in the image processing ***,existing interpolated algorithms only have a trivial impact on image *** this paper,an innovative interp...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
Interpolation technology has evolved into a powerful tool for reversible data hiding in the image processing ***,existing interpolated algorithms only have a trivial impact on image *** this paper,an innovative interpolation and matrix-based algorithm is proposed.A novel concept of the difference between interpolated pixels is represented to dramatically improve the visual quality of the image,which lays a solid foundation for the subsequent data hiding *** is growing evidence that the Tetris matrix plays a vital role in improving embedding *** is worth mentioning that our scheme can intensely resist different attacks of various *** experimental findings demonstrate that the effect of our proposed scheme is unprecedentedly perfect even though a higher capacity is embedded than with traditional steganography approaches.
Adding subtle perturbations to an image can cause the classification model to misclassify, and such images are called adversarial examples. Adversarial examples threaten the safe use of deep neural networks, but when ...
Adding subtle perturbations to an image can cause the classification model to misclassify, and such images are called adversarial examples. Adversarial examples threaten the safe use of deep neural networks, but when combined with reversible data hiding(RDH) technology, they can protect images from being correctly identified by unauthorized models and recover the image lossless under authorized models. Based on this, the reversible adversarial example(RAE) is rising. However, existing RAE technology focuses on feasibility, attack success rate and image quality, but ignores transferability and time complexity. In this paper,we optimize the data hiding structure and combine data augmentation technology,which flips the input image in probability to avoid overfitting phenomenon on the dataset. On the premise of maintaining a high success rate of white-box attacks and the image's visual quality, the proposed method improves the transferability of reversible adversarial examples by approximately 1.% and reduces the computational cost by approximately 43% compared to the state-of-the-art method. In addition, the appropriate flip probability can be selected for different application scenarios.
Membrane algorithms are a new class of heuristic algorithms, which attempt to incorporate some components of membrane computing models (also called P systems) for designing efficient optimization algorithms, such as t...
详细信息
Membrane algorithms are a new class of heuristic algorithms, which attempt to incorporate some components of membrane computing models (also called P systems) for designing efficient optimization algorithms, such as the structure of P systems, the way of communication between cells, etc. Membrane algorithms are a kind of parallel methods, where many operations can be performed in parallel. Although the importance of the parallelism of such algorithms is recognized, membrane algorithms were often implemented on the serial computing device Central processing Unit (CPU), which makes the algorithms cannot work in a more efficient way. In this work, we consider the implementation of membrane algorithms on the parallel computing device Graphics processing Unit (GPU). Under such implementation, all cells of membrane algorithms can work simultaneously. Experiment results on two classical intractable problems, point set matching problem and TSP, show that GPU implementation of membrane algorithms is much more efficient than CPU implementation in terms of runtime, especially for solving the problems with a high complexity.
In the theory of compressive sensing, the selection of the basis functions directly affects the sparse transformation, observation number and reconstruction accuracy. In this paper, we introduce the structure of three...
详细信息
A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equiv...
A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equivalent relationship between induced current and the measured CS-current was build, while the CS-current can be computed directly under the new incident source. Finally, we can reconstruct the induce current by utilizing the theory of compressive sensing (CS). Compared with traditional MOM, the computational complexity can be greatly reduced.
Although many methods of refining initialization have appeared, the sensitivity of K-Means to initial centers is still an obstacle in applications. In this paper, we investigate a new class of clustering algorithm, K-...
详细信息
This letter presents the graphic processor unit (GPU)implementation of the finite-difference time-domain (FDTD)method for the solution of the two-dimensional electromagnetic fields inside dispersive *** improved Z-tra...
详细信息
This letter presents the graphic processor unit (GPU)implementation of the finite-difference time-domain (FDTD)method for the solution of the two-dimensional electromagnetic fields inside dispersive *** improved Z-transform-based finite-difference time-domain (ZTFDTD) method was presented for simulating the interaction of electromagnetic wave with unmagnetized *** using the newly introduced Compute Unified Device Architecture (CUDA) technology, we illustrate the efficacy of GPU in accelerating the FDTD computations by achieving significant speedups with great ease and at no extra hardware *** effect of the GPU-CPU memory transfers on the speedup will be also studied.
Aiming at the traditional blind source separation for the received single-channel mixed radar signal makes it difficult to accurately recover the source signal, a single-channel radar signal comprehensive separation m...
ISBN:
(数字)9781837240982
Aiming at the traditional blind source separation for the received single-channel mixed radar signal makes it difficult to accurately recover the source signal, a single-channel radar signal comprehensive separation method based on the combination of the FastICA algorithm and the variational modal decomposition (VMD) algorithm is proposed. The method utilizes VMD to first perform modal separation of single-channel mixed Linear Frequency Modulation (LFM) signal, then selects the modal component signal with the largest correlation coefficient with the mixed signal and expands it with single-channel mixed LFM signal into a virtual multi-channel mixed signal, and finally inputs it into FastICA algorithm to obtain the source signal. The simulation experiment results show that the comprehensive separation algorithm can accurately separate the LFM signal, overcoming the limitation that the FastICA algorithm cannot directly separate the single-channel mixed radar signal.
Due to the large error of LMS algorithm and the slow convergence rate, the recursive least squares(RLS) algorithm is proposed. Although the recursive estimation error is greatly reduced, the convergence rate is one or...
详细信息
Due to the large error of LMS algorithm and the slow convergence rate, the recursive least squares(RLS) algorithm is proposed. Although the recursive estimation error is greatly reduced, the convergence rate is one order of magnitude higher than that of the general LMS filter. When the order N increases, the amount of calculation for a single iteration of the RLS algorithm is increased significantly. Aiming at these problems, this paper proposes an improved FTRLS filtering algorithm, which is to find out the amount of large error and accumulate the error, and then make the error feedback to make the algorithm more stable. The analysis of MATlab simulation results show that the improved algorithm can improve the convergence speed and stability of the algorithm, and effectively reduce the convergence of the noise.
Reversible data hiding in encrypted domain (RDH-ED) has received tremendous attention from the research community because data can be embedded into cover media without exposing it to the third party data hider and the...
详细信息
暂无评论